Cybersecurity Analyst Program – Digital Nova Scotia – Leading Digital Industry
Get into IT

Launch a Career in Cybersecurity

Home PageApply Now!

What You'll Learn

[ click on a question to view the answer ]

Introduction to Cybersecurity Tools & Cyber Attacks

This course gives you the background needed to understand basic Cybersecurity. You will learn:

  • The history of Cybersecurity
  • Types and motives of cyber attacks
  • Key terminology
  • Basic system concepts and tools 

Cybersecurity Roles, Processes & Operating System Security

This course gives you the background needed to understand basic Cybersecurity around people. process and technology. You will:

  • Learn how to understand the key cybersecurity roles within an organization
  • Learn how to list key cybersecurity processes and provide an example of each process
  • Learn how to Describe the architecture, file systems, and basic commands for multiple operating systems including Windows, Mac/OS, Linux and Mobile
  • Understand the concept of Virtualization as it relates to cybersecurity

Cybersecurity Compliance Framework & System Administration

This course is intended for anyone who wants to gain a basic understanding of Security Frameworks, Compliance, endpoint management, encryption or cryptography. You will learn about:

  • The background needed to understand the key cybersecurity compliance and industry standards
  • The basic commands for user and server administration as it relates to security
  • The concepts of endpoint security and patch management
  • In-depth skills around cryptography and encryption

Network Security & Database Vulnerabilities

This course gives you the background needed to understand basic network security. You will learn about:

  • Local Area Networks, TCP/IP, the OSI Framework and routing basics
  • How networking affects security systems within an organization and the network components that guard an organization from cybersecurity attacks
  • Database vulnerabilities and the tools/knowledge needed to research a database vulnerability for a variety of databases (including SQL Injection, Oracle, Mongo and Couch)
  • Various security breach types associated with databases and organizations that define standards and provide tools for cybersecurity professionals

Penetration Testing, Incident Response and Forensics

In this course, you will learn about:

  • The different phases of penetration testing
  • How to gather data for your penetration test and popular penetration testing tools
  • The phases of an incident response, important documentation to collect, and the components of an incident response policy and team
  • Key steps in the forensic process 
  • Scripting and the importance to a system analyst

Cyber Threat Intelligence

This course gives you the background needed to understand network defensive tactics, define network access control and use network monitoring tools. You will learn:

  • How to understand data protection risks and mobile endpoint protection
  • How to recognize various scanning technologies, application security vulnerabilities and threat intelligence platforms

Cybersecurity Capstone: Breach Response Case Studies

This course requires you to select and research a cybersecurity breach in the news today and apply your knowledge and skills to analyze the type of attack, attack timeline, vulnerable systems, and any missed opportunities. This project will be graded by your peers in the course. In this course, you will:

  • Explore incident response methodologies and security models
  • Learn to recognize and categorize key types of vulnerabilities and associated attacks against today’s organizations
  • Explore in depth several past and recent breaches to learn how they were detected and what was done or could have been done to reduce the threat risk to the organization
  • Explore the costs of data breaches through research studies and well known breaches

IBM Cybersecurity Analyst Assessment

A growing number of exciting, well-paying jobs in today’s security industry do not require a college degree. This is the final course required to assess your acquired knowledge and skills to become job-ready for a cybersecurity analyst role. In this course, you will:

  • Be expected to pass a final assessment quiz for each of the seven prior courses within the IBM Cybersecurity Analyst Professional Certificate
  • Acquire the IBM Cybersecurity Analyst Professional Certificate upon successful completion of the quizzes 

In-Program Support Offered

Live TA Sessions

Online Community

Program Mentors

Meet Our Cybersecurity Teaching Assistant

Harsh Khilnani

Still not sure which program is the best fit for you?

Take the 2-minute personality quiz to help you decide between these two programs.

Take the Quiz