"*" indicates required fields
The Security Analyst specialization focuses on testing methods and techniques to effectively identify and mitigate risks to the security of a company’s infrastructure while providing application and network-based security vulnerability assessments, pen testing, and securing wireless networks including authentication, authorization, and encryption in accordance with industry-accepted methods and protocols.
By specializing as a Security Analyst, you will be trained in various domains through specialized online ethical hacking and penetration testing courses.
Graduate
2 Years – 10-week terms (4 per year)
Online (Flexible with Hands-On Experience)
12 (36 Credit Hours)
January 6, 2025
EC-Council University has been ranked in the “Top 45 Online Master’s in Internet Security Degree Programs” by Intelligent.com, highlighting our high standards of quality postsecondary education.
Certifications | Master’ Degree Courses | ECCU Student Price |
ECCU 500 Managing Secure Network Systems | Included | |
ECCU 501 Ethical Hacking & Countermeasures | Included | |
ECCU 503 Security Analyst and Vulnerability Assessment ECCU 506 Conducting Penetration and Security Tests | Included Exam Fee: $799 |
Ans. Candidates interested in cybersecurity can opt for a Master of Science in Cyber Security (MSCS) with a Security Analyst specialization to become a professional cybersecurity analyst. An MSCS degree from EC-Council University (ECCU) will not only help aspirants gain important skills, but it will also help them gain relevant industry-ready certifications.
Ans. An information security analyst is responsible for monitoring, preventing, and stopping any attack from affecting the company and its private data. They create and implement firewalls and software systems to protect the network infrastructure and sensitive data from being stolen. Security analysts can work as freelance consultants in the public sector or for businesses.
Ans. An aspiring security analyst professional need to have some fundamental skills that will help them fulfill job roles. Those skills include — networking, security, communicating and documenting incidents, and incident response and handling.
Ans. A cybersecurity analyst, after completing an online security analyst program and gaining an experience of 1 to 4 years, can earn an average compensation of $70,906 according to PayScale. Whereas, a cybersecurity analyst with an experience of 5-9 years of experience earns an average compensation of $88,104.
Disclaimer – EC-Council University does not guarantee jobs or salary packages mentioned -above. Please refer to the sources mentioned to learn more.
This foundational core course introduces students to basic English writing skills and research methods also including APA style writing, citing sources, determining when a website is credible, effective communication, outlines, and collaboration. Students will write/present portions of the above in the course in various formats.
This course will lay a broad foundation of understanding the processes of global business principles for a varied population of students who work in businesses of all kinds (including the IT and IA fields). It covers the latest changes in Information Technology for Business, including computer-aided manufacturing (CAM), application software, and recent ethical issues arising from IT. Real-life business examples are added throughout the course that reinforce the business principles.
This foundation course deals with organizational behavior and allows the technology practitioner to experience the basic facets of organizational theory and define the skills required to understand and apply the theory to a real organizational setting. Elements of the course are organizational structure, effective communication, team building, ethics, and project management as seen through the organizational lens.
Cyberspace has increased human communication, connectivity, creativity, capacity and crime by leaps and bounds in the last decade. For all of the positive aspects it offers, it offers as many negative aspects. Those negative aspects are explored and developed by everyone from the high school challenge hacker to an international terrorist. The IT criminal threatens businesses, governmental agencies, militaries, and organizations of every kind. This course will survey the spectrum of psychological attributes that may make up the profile of the IT criminal.
This course encompasses an extensive research project about cross-cultural differences in leadership conducted by a group of researchers in 62 countries. It lays a foundation for understanding the process of leadership. The study describes the roles, functions, and impact of global leadership concepts. Many team exercises provide the speed at which leaders must work. Research and views into how most cultures respond to this area of management are provided.
This course focuses on evaluating network and Internet security issues, designing and implementing successful security policies and firewall strategies, and exposing the system and network vulnerabilities and defending against them. Topics include network protocols, network attacks, intrusion detection systems, packet filtering, proxy servers, Bastion hosts and honey pots, hardening routers, hardening security, email security, virtual private networks, and creating fault tolerance.
This course focuses on configuring a secure Linux network using the command line and graphical utilities. Emphasis is placed on file-sharing technologies such as the Network File System, NetWare’s NCP file sharing, and File Transfer Protocol. Additional topics include making data secure, user security, file security, and network intrusion detection. Students will be required to take on the role of problem solvers and apply the concepts presented to situations that might occur in a work environment.
This course focuses on how perimeter defenses work, how intruders escalate privileges, and methods of securing systems. Additional topics include intrusion detection, policy creation, social engineering, DoS attacks, buffer overflows, and virus creation.
This course focuses on how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended. This course investigates ways of applying knowledge to real-world problems. Topics include Introduction to Penetration Testing and Methodologies, Penetration Testing Scoping and Engagement, Open-Source Intelligence (OSINT), Social Engineering Penetration Testing, External Network Penetration Testing, Internal Network Penetration Testing, and Network Penetration Testing for Perimeter Devices.
This course focuses on the various methods of wireless networks, including authentication, securing authorization, and encryption. Topics include radio frequency communications, infrared, Bluetooth, low-speed wireless local area networks, highspeed WLANs and WLAN Security, digital cellular telephone, fixed wireless, and wireless communications in business.
This course focuses on the various methods of wireless networks, including authentication, securing authorization, and encryption. Topics include radio frequency communications, infrared, Bluetooth, low-speed wireless local area networks, highspeed WLANs and WLAN Security, digital cellular telephone, fixed wireless, and wireless communications in business.
The Capstone is the summative experience designed to allow students to demonstrate all program outcomes and draw on the knowledge and skills learned throughout the entire program. Students can enroll in the Capstone after successful completion of all core degree requirements but must be within six semester credit hours of graduation. Students must demonstrate attainment of a 3.0 cumulative grade point average and have the Registrar approval to registering this class.