Cyber Defense
- Certificate
- 30 credits
- 1 Year
- Delivery Method: Hybrid
Why Study Cyber Defense at LSC?
The Cyber Defense certificate is designed to prepare participants with foundation-level skills for a job in computer networking and security. The curriculum in this program will help prepare students for the following certifications: CompTIA Net+, CompTIA Security+, Cisco RSTECH, and EC-Council Certified Ethical Hacker (CEH).
The 30-credit Cyber Defense Certificate transfers seamlessly into LSC's Network Administration and Security Diploma (58 credits), and AAS degree (72 credits).
Career Information
Below you will find the Career Field and Career Cluster that this program is related to. Learn more about if this career area fits your interests!
Is Computer Science and Information Technology right for you?
Information technology workers are in a growing and always changing field. You might work with computer hardware, software, multimedia, or network systems. You might design new computer equipment or work on a new computer game.
This data is delivered by an API from CareerOneStop, sponsored by U.S. Department of Labor, Employment and Training Administration. www.careeronestop.org Find more information including data update schedules at CareerOneStop's Data Sources (https://www.careeronestop.org/Help/data-sources.aspx). Full list of datasources.
Median Annual Salary/Wage Earnings for Information Security Analysts
the United States
$125K
$60/hr
$70K - $186K
$33/hr - $89/hr
Minnesota
$129K
$61/hr
$79K - $169K
$38/hr - $81/hr
Duluth, MN Area
$104K
$50/hr
$63K - $136K
$30/hr - $65/hr
The Occupational Employment and Wage Statistics (OEWS) program produces employment and wage estimates annually for over 800 occupations. These estimates are available for the nation as a whole, for individual states, and for metropolitan and nonmetropolitan areas; national occupational estimates for specific industries are also available.
Salary data are from U.S. Department of Labor, Bureau of Labor Statistics, Occupational Employment and Wage Statistics (OEWS) program (www.bls.gov/oes/). Current as of May 2024.
Projected 10-Year Job Growth for Information Security Analysts
Outlook: Bright
the United States
29%
Projected Annual Job Openings: 16,000
2024 to 2034
Minnesota
28%
Projected Annual Job Openings: 280
2022 to 2032
My Next Move provides career outlook designations that include Bright, Average, or Below Average. Bright Outlook occupations are expected to grow rapidly in the next several years, will have large numbers of job openings, or are new and emerging occupations.
Occupation outlook data come from O*NET Bright Outlook occupations (www.onetonline.org/find/bright) and My Next Move career outlook designations (www.onetcenter.org/bright/current/mnm_outlook.html). Note this information is only available at a national level, so even if you selected a state, you’ll see this information for the whole country. Current as of November 2024.
Employment Numbers for Information Security Analysts
the United States
Estimated Employment:
182,800
Minnesota
Estimated Employment:
2,910
My Next Move provides career outlook designations that include Bright, Average, or Below Average. Bright Outlook occupations are expected to grow rapidly in the next several years, will have large numbers of job openings, or are new and emerging occupations.
Occupation outlook data come from O*NET Bright Outlook occupations (www.onetonline.org/find/bright) and My Next Move career outlook designations (www.onetcenter.org/bright/current/mnm_outlook.html). Note this information is only available at a national level, so even if you selected a state, you’ll see this information for the whole country. Current as of November 2024.
Alternative Job Titles for Information Security Analysts
- Information Security Officer
- Information Security Specialist
- Information Systems Security Analyst
- Information Systems Security Officer (ISSO)
- Information Technology Security Analyst (IT Security Analyst)
- Network Security Analyst
- Security Analyst
- Systems Analyst
The O*NET database contains a rich set of variables that describe work and worker characteristics, including skill requirements.
Occupation data (titles, sample titles, descriptions, daily work activities, knowledge, skills, abilities, tasks, related occupations, technologies and tools, and work values) come from the O*NET 29.0 Database (www.onetcenter.org/database.html) by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 (creativecommons.org/licenses/by/4.0/) license. O*NET® is a trademark of USDOL/ETA. Current as of October 2024.
Job Tasks and Activities for Information Security Analysts
- Collaborate with others to resolve information technology issues.
- Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
- Coordinate implementation of computer system plan with establishment personnel and outside vendors.
- Coordinate project activities with other personnel or departments.
- Develop computer or information security policies or procedures.
- Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
- Document computer security and emergency measures policies, procedures, and tests.
- Document operational procedures.
- Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
- Implement security measures for computer or information systems.
- Modify computer security files to incorporate new software, correct errors, or change individual access status.
- Monitor current reports of computer viruses to determine when to update virus protection systems.
- Monitor the security of digital information.
- Monitor use of data files and regulate access to safeguard information in computer files.
- Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
- Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
- Test computer system operations to ensure proper functioning.
- Train others in computer interface or software use.
- Train users and promote security awareness to ensure system security and to improve server and network efficiency.
- Troubleshoot issues with computer applications or systems.
- Update knowledge about emerging industry or technology trends.
The O*NET database contains a rich set of variables that describe work and worker characteristics, including skill requirements.
Occupation data (titles, sample titles, descriptions, daily work activities, knowledge, skills, abilities, tasks, related occupations, technologies and tools, and work values) come from the O*NET 29.0 Database (www.onetcenter.org/database.html) by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 (creativecommons.org/licenses/by/4.0/) license. O*NET® is a trademark of USDOL/ETA. Current as of October 2024.
Interests for Information Security Analysts
- Conventional
Following procedures and regulations to organize information or data, typically in a business setting. - Investigative
Studying and researching scientific subjects and human behavior.
The O*NET database contains a rich set of variables that describe work and worker characteristics, including skill requirements.
Occupation data (titles, sample titles, descriptions, daily work activities, knowledge, skills, abilities, tasks, related occupations, technologies and tools, and work values) come from the O*NET 29.0 Database (www.onetcenter.org/database.html) by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 (creativecommons.org/licenses/by/4.0/) license. O*NET® is a trademark of USDOL/ETA. Current as of October 2024.
Skills for Information Security Analysts
In order of importance
- Reading Comprehension
Reading work-related information.
Importance: 75/100 - Critical Thinking
Thinking about the pros and cons of different ways to solve a problem.
Importance: 72/100 - Active Listening
Listening to others, not interrupting, and asking good questions.
Importance: 69/100 - Complex Problem Solving
Noticing a problem and figuring out the best way to solve it.
Importance: 69/100 - Speaking
Talking to others.
Importance: 66/100 - Writing
Writing things for co-workers or customers.
Importance: 63/100 - Systems Analysis
Figuring out how a system should work and how changes in the future will affect it.
Importance: 60/100 - Monitoring
Keeping track of how well people and/or groups are doing in order to make improvements.
Importance: 60/100 - Judgment and Decision Making
Thinking about the pros and cons of different options and picking the best one.
Importance: 60/100 - Active Learning
Figuring out how to use new ideas or things.
Importance: 56/100 - Time Management
Managing your time and the time of other people.
Importance: 53/100 - Quality Control Analysis
Testing how well a product or service works.
Importance: 50/100 - Systems Evaluation
Measuring how well a system is working and how to improve it.
Importance: 50/100 - Coordination
Changing what is done based on other people's actions.
Importance: 50/100 - Operations Monitoring
Watching gauges, dials, or display screens to make sure a machine is working.
Importance: 50/100 - Learning Strategies
Using the best training or teaching strategies for learning new things.
Importance: 47/100 - Service Orientation
Looking for ways to help people.
Importance: 47/100 - Instructing
Teaching people how to do something.
Importance: 47/100 - Management of Personnel Resources
Selecting and managing the best workers for a job.
Importance: 47/100 - Social Perceptiveness
Understanding people's reactions.
Importance: 44/100 - Negotiation
Bringing people together to solve differences.
Importance: 41/100 - Programming
Writing computer programs.
Importance: 41/100 - Persuasion
Talking people into changing their minds or their behavior.
Importance: 41/100 - Operations Analysis
Figuring out what a product or service needs to be able to do.
Importance: 38/100 - Mathematics
Using math to solve problems.
Importance: 31/100 - Troubleshooting
Figuring out what is causing equipment, machines, wiring, or computer programs to not work.
Importance: 28/100 - Technology Design
Making equipment and technology useful for customers.
Importance: 28/100 - Science
Using scientific rules and strategies to solve problems.
Importance: 22/100 - Management of Material Resources
Managing equipment and materials.
Importance: 19/100 - Equipment Selection
Deciding what kind of tools and equipment are needed to do a job.
Importance: 19/100 - Management of Financial Resources
Making spending decisions and keeping track of what is spent.
Importance: 19/100 - Operation and Control
Using equipment or systems.
Importance: 19/100 - Equipment Maintenance
Planning and doing the basic maintenance on equipment.
Importance: 16/100 - Repairing
Repairing machines or systems using the right tools.
Importance: 16/100 - Installation
Installing equipment, machines, wiring, or computer programs.
Importance: 13/100
The O*NET database contains a rich set of variables that describe work and worker characteristics, including skill requirements.
Occupation data (titles, sample titles, descriptions, daily work activities, knowledge, skills, abilities, tasks, related occupations, technologies and tools, and work values) come from the O*NET 29.0 Database (www.onetcenter.org/database.html) by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 (creativecommons.org/licenses/by/4.0/) license. O*NET® is a trademark of USDOL/ETA. Current as of October 2024.
Knowledge for Information Security Analysts
In order of importance
- Computers and Electronics
Knowledge of circuit boards, processors, chips, electronic equipment, and computer hardware and software, including applications and programming.
Importance: 84/100 - English Language
Knowledge of the structure and content of the English language including the meaning and spelling of words, and rules of composition and grammar.
Importance: 82/100 - Administration and Management
Knowledge of business and management principles involved in strategic planning, resource allocation, human resources modeling, leadership technique, production methods, and coordination of people and resources.
Importance: 67/100 - Telecommunications
Knowledge of transmission, broadcasting, switching, control, and operation of telecommunications systems.
Importance: 66/100 - Engineering and Technology
Knowledge of the practical application of engineering science and technology. This includes applying principles, techniques, procedures, and equipment to the design and production of various goods and services.
Importance: 66/100 - Customer and Personal Service
Knowledge of principles and processes for providing customer and personal services. This includes customer needs assessment, meeting quality standards for services, and evaluation of customer satisfaction.
Importance: 61/100 - Public Safety and Security
Knowledge of relevant equipment, policies, procedures, and strategies to promote effective local, state, or national security operations for the protection of people, data, property, and institutions.
Importance: 57/100 - Education and Training
Knowledge of principles and methods for curriculum and training design, teaching and instruction for individuals and groups, and the measurement of training effects.
Importance: 55/100 - Mathematics
Knowledge of arithmetic, algebra, geometry, calculus, statistics, and their applications.
Importance: 47/100 - Communications and Media
Knowledge of media production, communication, and dissemination techniques and methods. This includes alternative ways to inform and entertain via written, oral, and visual media.
Importance: 45/100 - Law and Government
Knowledge of laws, legal codes, court procedures, precedents, government regulations, executive orders, agency rules, and the democratic political process.
Importance: 43/100 - Administrative
Knowledge of administrative and office procedures and systems such as word processing, managing files and records, stenography and transcription, designing forms, and workplace terminology.
Importance: 42/100 - Personnel and Human Resources
Knowledge of principles and procedures for personnel recruitment, selection, training, compensation and benefits, labor relations and negotiation, and personnel information systems.
Importance: 36/100 - Design
Knowledge of design techniques, tools, and principles involved in production of precision technical plans, blueprints, drawings, and models.
Importance: 35/100 - Production and Processing
Knowledge of raw materials, production processes, quality control, costs, and other techniques for maximizing the effective manufacture and distribution of goods.
Importance: 35/100 - Economics and Accounting
Knowledge of economic and accounting principles and practices, the financial markets, banking, and the analysis and reporting of financial data.
Importance: 32/100 - Psychology
Knowledge of human behavior and performance; individual differences in ability, personality, and interests; learning and motivation; psychological research methods; and the assessment and treatment of behavioral and affective disorders.
Importance: 27/100 - Sociology and Anthropology
Knowledge of group behavior and dynamics, societal trends and influences, human migrations, ethnicity, cultures, and their history and origins.
Importance: 18/100 - Mechanical
Knowledge of machines and tools, including their designs, uses, repair, and maintenance.
Importance: 17/100 - Geography
Knowledge of principles and methods for describing the features of land, sea, and air masses, including their physical characteristics, locations, interrelationships, and distribution of plant, animal, and human life.
Importance: 15/100 - Transportation
Knowledge of principles and methods for moving people or goods by air, rail, sea, or road, including the relative costs and benefits.
Importance: 15/100 - Sales and Marketing
Knowledge of principles and methods for showing, promoting, and selling products or services. This includes marketing strategy and tactics, product demonstration, sales techniques, and sales control systems.
Importance: 13/100 - Physics
Knowledge and prediction of physical principles, laws, their interrelationships, and applications to understanding fluid, material, and atmospheric dynamics, and mechanical, electrical, atomic and sub-atomic structures and processes.
Importance: 9/100 - Building and Construction
Knowledge of materials, methods, and the tools involved in the construction or repair of houses, buildings, or other structures such as highways and roads.
Importance: 9/100 - Foreign Language
Knowledge of the structure and content of a foreign (non-English) language including the meaning and spelling of words, rules of composition and grammar, and pronunciation.
Importance: 8/100 - Chemistry
Knowledge of the chemical composition, structure, and properties of substances and of the chemical processes and transformations that they undergo. This includes uses of chemicals and their interactions, danger signs, production techniques, and disposal methods.
Importance: 6/100 - Philosophy and Theology
Knowledge of different philosophical systems and religions. This includes their basic principles, values, ethics, ways of thinking, customs, practices, and their impact on human culture.
Importance: 5/100 - History and Archeology
Knowledge of historical events and their causes, indicators, and effects on civilizations and cultures.
Importance: 3/100 - Therapy and Counseling
Knowledge of principles, methods, and procedures for diagnosis, treatment, and rehabilitation of physical and mental dysfunctions, and for career counseling and guidance.
Importance: 3/100 - Medicine and Dentistry
Knowledge of the information and techniques needed to diagnose and treat human injuries, diseases, and deformities. This includes symptoms, treatment alternatives, drug properties and interactions, and preventive health-care measures.
Importance: 2/100 - Food Production
Knowledge of techniques and equipment for planting, growing, and harvesting food products (both plant and animal) for consumption, including storage/handling techniques.
Importance: 1/100 - Biology
Knowledge of plant and animal organisms, their tissues, cells, functions, interdependencies, and interactions with each other and the environment.
Importance: 1/100 - Fine Arts
Knowledge of the theory and techniques required to compose, produce, and perform works of music, dance, visual arts, drama, and sculpture.
Importance: 1/100
The O*NET database contains a rich set of variables that describe work and worker characteristics, including skill requirements.
Occupation data (titles, sample titles, descriptions, daily work activities, knowledge, skills, abilities, tasks, related occupations, technologies and tools, and work values) come from the O*NET 29.0 Database (www.onetcenter.org/database.html) by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 (creativecommons.org/licenses/by/4.0/) license. O*NET® is a trademark of USDOL/ETA. Current as of October 2024.
Physical Abilities for Information Security Analysts
In order of importance
- Problem Sensitivity
Noticing when problems happen.
Importance: 75/100 - Inductive Reasoning
Making general rules or coming up with answers from lots of detailed information.
Importance: 75/100 - Oral Comprehension
Listening and understanding what people say.
Importance: 75/100 - Written Comprehension
Reading and understanding what is written.
Importance: 75/100 - Deductive Reasoning
Using rules to solve problems.
Importance: 75/100 - Written Expression
Communicating by writing.
Importance: 72/100 - Information Ordering
Ordering or arranging things.
Importance: 72/100 - Oral Expression
Communicating by speaking.
Importance: 69/100 - Near Vision
Seeing details up close.
Importance: 69/100 - Category Flexibility
Grouping things in different ways.
Importance: 63/100 - Flexibility of Closure
Seeing hidden patterns.
Importance: 60/100 - Speech Clarity
Speaking clearly.
Importance: 60/100 - Speech Recognition
Recognizing spoken words.
Importance: 60/100 - Selective Attention
Paying attention to something without being distracted.
Importance: 53/100 - Originality
Creating new and original ideas.
Importance: 50/100 - Fluency of Ideas
Coming up with lots of ideas.
Importance: 50/100 - Perceptual Speed
Quickly comparing groups of letters, numbers, pictures, or other things.
Importance: 50/100 - Speed of Closure
Quickly knowing what you are looking at.
Importance: 47/100 - Visualization
Imagining how something will look after it is moved around or changed.
Importance: 44/100 - Time Sharing
Doing two or more things at the same time.
Importance: 44/100 - Far Vision
Seeing details that are far away.
Importance: 44/100 - Mathematical Reasoning
Choosing the right type of math to solve a problem.
Importance: 44/100 - Finger Dexterity
Putting together small parts with your fingers.
Importance: 35/100 - Memorization
Remembering words, numbers, pictures, or steps.
Importance: 31/100 - Number Facility
Adding, subtracting, multiplying, or dividing.
Importance: 31/100 - Visual Color Discrimination
Noticing the difference between colors, including shades and brightness.
Importance: 28/100 - Arm-Hand Steadiness
Keeping your arm or hand steady.
Importance: 25/100 - Manual Dexterity
Holding or moving items with your hands.
Importance: 22/100 - Control Precision
Quickly changing the controls of a machine, car, truck or boat.
Importance: 22/100 - Hearing Sensitivity
Telling the difference between sounds.
Importance: 22/100 - Depth Perception
Deciding which thing is closer or farther away from you, or deciding how far away it is from you.
Importance: 19/100 - Auditory Attention
Paying attention to one sound while there are other distracting sounds.
Importance: 19/100 - Extent Flexibility
Bending, stretching, twisting, or reaching with your body, arms, and/or legs.
Importance: 16/100 - Trunk Strength
Using your lower back and stomach.
Importance: 16/100 - Dynamic Strength
Exercising for a long time without your muscles getting tired.
Importance: 10/100 - Wrist-Finger Speed
Making fast, simple, repeated movements of your fingers, hands, and wrists.
Importance: 10/100 - Stamina
Exercising for a long time without getting out of breath.
Importance: 3/100 - Response Orientation
Quickly deciding if you should move your hand, foot, or other body part.
Importance: 3/100
The O*NET database contains a rich set of variables that describe work and worker characteristics, including skill requirements.
Occupation data (titles, sample titles, descriptions, daily work activities, knowledge, skills, abilities, tasks, related occupations, technologies and tools, and work values) come from the O*NET 29.0 Database (www.onetcenter.org/database.html) by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 (creativecommons.org/licenses/by/4.0/) license. O*NET® is a trademark of USDOL/ETA. Current as of October 2024.
Tools and Technology used by Information Security Analysts
- Network analyzers
- Mainframe computers
- Notebook computers
- Desktop computers
- Protocol analyzers
- Web platform development software
- AJAX
- Apache Struts
- Apache Tomcat
- Django
- Drupal
- Enterprise JavaBeans
- Extensible hypertext markup language XHTML
- Google Angular
- Hypertext markup language HTML
- JavaScript
- JavaScript Object Notation JSON
- LAMP Stack
- Microsoft ASP.NET
- Microsoft Active Server Pages ASP
- Node.js
- Oracle JavaServer Pages JSP
- PHP
- Ruby on Rails
- Spring Framework
- Data base user interface and query software
- Amazon Elastic Compute Cloud EC2
- Amazon Redshift
- Amazon Web Services AWS software
- Blackboard software
- Microsoft Access
- Microsoft SQL Server
- Oracle Database
- Oracle JDBC
- Structured query language SQL
- Transaction security and virus protection software
- Anti-Trojan software
- Anti-phishing software
- Anti-spyware software
- Check Point Next Generation Secure Web Gateway
- End-to-end encryption software
- HP WebInspect
- Honeypot
- Link encryption software
- McAfee
- McAfee VirusScan
- Metasploit
- Norton AntiVirus
- NortonLifeLock cybersecurity software
- Password cracker software
- Penetration testing software
- Ping Identity
- Portswigger BurP Suite
- Program checksumming software
- Rapid7 Nexpose
- Root kit detection software
- Secure internet filtering software
- Security risk assessment software
- Stack smashing protection SSP software
- Symantec Endpoint Protection
- Tenable Nessus
- Virus scanning software
- Network monitoring software
- AccessData FTK
- Automated audit trail analysis software
- Automated media tracking software
- Ethereal
- Guidance Software EnCase Forensic
- IBM QRadar SIEM
- Integrity verification software
- Keystroke monitoring software
- Micro Focus OpenView
- Nagios
- Network intrusion prevention systems NIPS
- Network, hardware, and software auditing software
- Oracle Net Manager
- Quest BigBrother
- Sniffer Investigator
- Snort
- Symantec Blue Coat Data Loss Prevention
- Tcpdump
- Wireshark
- Development environment software
- Adobe ActionScript
- Apache Ant
- Apache Kafka
- Apache Maven
- C
- Common business oriented language COBOL
- Eclipse IDE
- Go
- Integrated development environment IDE software
- Microsoft .NET Framework
- Microsoft Azure software
- Microsoft PowerShell
- Microsoft Visual Basic
- Microsoft Visual Basic Scripting Edition VBScript
- Microsoft Visual Basic for Applications VBA
- Microsoft Visual Studio
- National Instruments LabVIEW
- Ruby
- Operating system software
- Apple macOS
- Bash
- Hewlett Packard HP-UX
- Job control language JCL
- KornShell
- Linux
- Microsoft Hyper-V Server
- Microsoft Windows
- Microsoft Windows Server
- Operating system software
- Oracle Solaris
- Red Hat Enterprise Linux
- Shell script
- UNIX
- UNIX Shell
- Ubuntu
- Data base management system software
- Amazon DynamoDB
- Apache Cassandra
- Apache Hadoop
- Apache Hive
- Apache Pig
- Apache Solr
- Elasticsearch
- MongoDB
- MySQL
- NoSQL
- Oracle PL/SQL
- Relational database management software
- Teradata Database
- Object or component oriented development software
- Advanced business application programming ABAP
- Apache Groovy
- C#
- C++
- Objective C
- Oracle Java
- Perl
- Python
- Scala
- Swift
- Network security and virtual private network VPN equipment software
- Cryptographic key management software
- Firewall software
- Imperva SecureSphere
- IpFilter
- IpTables
- Juniper Networks NetScreen-Security Manager
- Palo Alto Networks Next-Generation Security Platform
- Trend Micro TippingPoint
- Virtual private networking VPN software
- Network security or virtual private network VPN management software
- HP Fortify
- ISS RealSecure
- Intrusion detection system IDS
- Intrusion prevention system IPS
- Network and system vulnerability assessment software
- Network security auditing software
- Security incident management software
- Websense Data Loss Prevention
- Business intelligence and data analysis software
- Apache Spark
- IBM Cognos Impromptu
- MicroStrategy
- Oracle Business Intelligence Enterprise Edition
- Qlik Tech QlikView
- Tableau
- Enterprise resource planning ERP software
- Microsoft Dynamics
- Oracle Fusion Applications
- Oracle Hyperion
- Oracle JD Edwards EnterpriseOne
- Oracle PeopleSoft
- Oracle PeopleSoft Financials
- SAP software
- Configuration management software
- Automated installation software
- Chef
- Patch and update management software
- Perforce Helix software
- Puppet
- Internet directory services software
- Active directory software
- Berkeley Internet Domain Name BIND
- Domain name system DNS
- Microsoft Active Directory
- Network directory services software
- Application server software
- Docker
- GitHub
- Oracle WebLogic Server
- Red Hat OpenShift
- Red Hat WildFly
- Authentication server software
- Diameter
- IBM Tivoli Identity Management TIM
- Password management software
- Remote authentication dial-in user service RADIUS software
- Enterprise application integration software
- Atlassian Bamboo
- Extensible markup language XML
- Microsoft SQL Server Integration Services SSIS
- Oracle Fusion Middleware
- Program testing software
- Conformance and validation testing software
- Kali Linux
- Selenium
- System testing software
- Access software
- Access management software
- Citrix cloud computing software
- IBM Tivoli Access Management TAM
- File versioning software
- Apache Subversion SVN
- Git
- WinMerge
- Backup or archival software
- Backup and archival software
- System and data disaster recovery software
- Veritas NetBackup
- Cloud-based management software
- Amazon Web Services AWS CloudFormation
- IBM WebSphere
- Splunk Enterprise
- Project management software
- Atlassian Confluence
- Microsoft Project
- Microsoft Teams
- Geographic information system
- ESRI ArcGIS software
- Geographic information system GIS software
- Electronic mail software
- IBM Notes
- Microsoft Exchange
- Word processing software
- 3M Post-it App
- Microsoft Word
- Financial analysis software
- Delphi Technology
- Oracle E-Business Suite Financials
- Data base reporting software
- Microsoft SQL Server Reporting Services SSRS
- SAP Crystal Reports
- Analytical or scientific software
- SAS
- The MathWorks MATLAB
- Spreadsheet software
- Microsoft Excel
- Medical software
- Epic Systems
- Risk management data and analysis software
- ArcSight Enterprise Threat and Risk Management
- Filesystem software
- Computer forensic software
- Content workflow software
- Atlassian JIRA
- Enterprise system management software
- IBM Power Systems software
- Object oriented data base management software
- PostgreSQL
- Expert system software
- Ansible software
- Point of sale POS software
- Smart card management software
- Document management software
- Microsoft SharePoint
- Clustering software
- VMware
- Desktop communications software
- Secure shell SSH software
- Communications server software
- IBM Domino
- Portal server software
- Apache HTTP Server
- Customer relationship management CRM software
- Salesforce software
- Transaction server software
- Customer information control system CICS
- Office suite software
- Microsoft Office software
- Instant messaging software
- Blink
- Administration software
- Cisco Systems CiscoWorks
- Human resources software
- Human resource management software HRMS
- Internet protocol IP multimedia subsystem software
- Voice over internet protocol VoIP system software
- Presentation software
- Microsoft PowerPoint
- Cloud-based protection or security software
- Qualys Cloud Platform
- Web page creation and editing software
- Google Sites
- Requirements analysis and system architecture software
- Unified modeling language UML
- Storage networking software
- Amazon Simple Storage Service S3
- Industrial control software
- Supervisory control and data acquisition SCADA software
- Switch or router software
- Border Gateway Protocol BGP
- Process mapping and design software
- Microsoft Visio
- Information retrieval or search software
- LexisNexis
- License management software
- License management software
The O*NET database contains a rich set of variables that describe work and worker characteristics, including skill requirements.
Occupation data (titles, sample titles, descriptions, daily work activities, knowledge, skills, abilities, tasks, related occupations, technologies and tools, and work values) come from the O*NET 29.0 Database (www.onetcenter.org/database.html) by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 (creativecommons.org/licenses/by/4.0/) license. O*NET® is a trademark of USDOL/ETA. Current as of October 2024.
Employment Industries for Information Security Analysts
- Computer systems design and related services
41,100 employed - Management of companies and enterprises
18,400 employed - Credit intermediation and related activities (5221,3)
13,200 employed - Management, scientific, and technical consulting services
10,400 employed - Research and development in the physical, engineering, and life sciences
7,000 employed - Engineering services
6,700 employed - Accounting, tax preparation, bookkeeping, and payroll services
6,200 employed - Computing infrastructure providers, data processing, web hosting, and related services
6,100 employed - Software publishers
5,000 employed - Temporary help services
3,600 employed
The O*NET database contains a rich set of variables that describe work and worker characteristics, including skill requirements.
Occupation data (titles, sample titles, descriptions, daily work activities, knowledge, skills, abilities, tasks, related occupations, technologies and tools, and work values) come from the O*NET 29.0 Database (www.onetcenter.org/database.html) by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 (creativecommons.org/licenses/by/4.0/) license. O*NET® is a trademark of USDOL/ETA. Current as of October 2024.
Career Information Datasources for Information Security Analysts
- Wages by occupation
U.S. Department of Labor, Bureau of Labor Statistics, Occupational Employment and Wage Statistics program
The Occupational Employment and Wage Statistics (OEWS) program produces employment and wage estimates annually for over 800 occupations. These estimates are available for the nation as a whole, for individual states, and for metropolitan and nonmetropolitan areas; national occupational estimates for specific industries are also available. Current as of May 2024. - Education and training assignments
U.S Department of Labor, Employment Projections, Education and Training Data, Education and training assignments by detailed occupation
BLS provides information about education and training requirements for hundreds of occupations. In the education and training system, each of the occupations for which the office publishes projections data is assigned separate categories for education, work experience, and on-the-job training. Current as of September 2024. - Occupation data
O*NET at the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA)
The O*NET database contains a rich set of variables that describe work and worker characteristics, including skill requirements. Current as of October 2024. - Occupation outlook
O*NET at the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA)
My Next Move provides career outlook designations that include Bright, Average, or Below Average. Bright Outlook occupations are expected to grow rapidly in the next several years, will have large numbers of job openings, or are new and emerging occupations. Current as of November 2024. - Career videos
Career videos were developed by CareerOneStop.org
Explore our collection of videos on hundreds of different careers. Career videos are organized into 16 clusters, or related types of work. Select a category to view a list of videos related to that cluster. Videos include career details such as tasks, work settings, education needed, and more. Current as of rolling. - Educational attainment, typical education of current workers
USDOL’s Bureau of Labor Statistics, Employment Projections program, Education and Training Data,
BLS provides information about education and training requirements for hundreds of occupations. Educational attainment data for each occupation show the level of education achieved by current workers. Current as of September 2024.
Plan Your Education
The Cyber Defense Program Guide is a tool to help you map out how to successfully get your degree at Lake Superior College.
View approximate total tuition and fees for MN residents to complete this degree.
This program may be completed in 1 year if prerequisites are complete.
Program Participation Requirements
Pre-Program Requirements
Successful entry into this program requires a specific level of skill in the areas of English/reading and mathematics.
English/Reading:
- Eligible for ENGL 1106 - College Composition I, or
- Completion of ENGL/READ 0950/0955 (or equivalent or higher). ENGL/READ 0950/0955 may be taken concurrently with Semester I coursework.
Mathematics:
- Eligible for MATH 0970 - Intermediate Algebra, or
- Completion of MATH 0950/0955 (or equivalent or higher). MATH 0950/0955 may be taken concurrently with Semester I coursework.
There are other ways to qualify. Visit Course Placement to find out more.
| Course | Title | Credits |
|---|---|---|
| Semester 1 | ||
Close Dialog
CIS 1402*CIS 1402 Foundations of CIS An introduction to foundational concepts in Computer Information Systems (CIS), such as virtual computing, number systems, intermediate office productivity software, computer networking, elementary programming, and cybersecurity. Students will be expected |
Close Dialog
Foundations of CISCIS 1402 Foundations of CIS An introduction to foundational concepts in Computer Information Systems (CIS), such as virtual computing, number systems, intermediate office productivity software, computer networking, elementary programming, and cybersecurity. Students will be expected |
3 |
Close Dialog
CIS 1946*CIS 1946 CISCO Networking I This course is the first in a series of four courses that deal with the CISCO core content. This course prepares the student to take the CCNA (CISCO Certified Networking Associate) exam. (Prerequisites: ENGL0950 or ENGL0955 or READ0950 or READ0955, or e |
Close Dialog
CISCO Networking ICIS 1946 CISCO Networking I This course is the first in a series of four courses that deal with the CISCO core content. This course prepares the student to take the CCNA (CISCO Certified Networking Associate) exam. (Prerequisites: ENGL0950 or ENGL0955 or READ0950 or READ0955, or e |
3 |
Close Dialog
CIS 2811*CIS 2811 Intrusion Detection and Prevention Systems Fundamentals In this course, students gain a thorough grounding in the design, implementation, and administration of IDSes/IPSes, as well as practical, hands-on experience working with these systems. In addition, students analyze various attack signatures and the netw |
Close Dialog
Intrusion Detection and Prevention Systems FundamentalsCIS 2811 Intrusion Detection and Prevention Systems Fundamentals In this course, students gain a thorough grounding in the design, implementation, and administration of IDSes/IPSes, as well as practical, hands-on experience working with these systems. In addition, students analyze various attack signatures and the netw |
3 |
Close Dialog
CIS 2812*+CIS 2812 Network Security This course prepares students for entry-level security specialist careers by developing an in-depth understanding of network security principles and the tools and configurations needed to secure a network. (Prerequisite: CIS1810 or instructor approval) |
Close Dialog
Network SecurityCIS 2812 Network Security This course prepares students for entry-level security specialist careers by developing an in-depth understanding of network security principles and the tools and configurations needed to secure a network. (Prerequisite: CIS1810 or instructor approval) |
3 |
Close Dialog
CIS 2813*CIS 2813 Forensics and Incident Response This course explores security incidents and intrusions, including identifying and categorizing incidents, responding to incidents, log analysis, network traffic analysis, various tools, and creating an incident response team. (Prerequisite: CIS1810 or i |
Close Dialog
Forensics and Incident ResponseCIS 2813 Forensics and Incident Response This course explores security incidents and intrusions, including identifying and categorizing incidents, responding to incidents, log analysis, network traffic analysis, various tools, and creating an incident response team. (Prerequisite: CIS1810 or i |
3 |
| Semester 2 | ||
Close Dialog
CIS 1745*CIS 1745 UNIX System Administration An introduction to the increasingly popular UNIX operating system using free Linux. Students will understand the architecture of UNIX (file system, processes, and device management), learn how to use common UNIX application and utility programs, program |
Close Dialog
UNIX System AdministrationCIS 1745 UNIX System Administration An introduction to the increasingly popular UNIX operating system using free Linux. Students will understand the architecture of UNIX (file system, processes, and device management), learn how to use common UNIX application and utility programs, program |
3 |
Close Dialog
CIS 1810*CIS 1810 Security Fundamentals This course introduces students to fundamental concepts and methods in data, firewall, and network security and prepares them to take industry Security+ certification examination. (Prerequisites: CIS1946 or instructor's consent) (2 hrs lab/2 hrs lec/0 h |
Close Dialog
Security FundamentalsCIS 1810 Security Fundamentals This course introduces students to fundamental concepts and methods in data, firewall, and network security and prepares them to take industry Security+ certification examination. (Prerequisites: CIS1946 or instructor's consent) (2 hrs lab/2 hrs lec/0 h |
3 |
Close Dialog
CIS 1947*CIS 1947 CISCO Networking II This course is the second in a series of four courses that deal with the CISCO core content. This course prepares the student to take the CCNA or CISCO Certified Networking Associate exam. (Prerequisites: CIS1946) (2 hrs lec/2 hrs lab/0 hrs OJT) |
Close Dialog
CISCO Networking IICIS 1947 CISCO Networking II This course is the second in a series of four courses that deal with the CISCO core content. This course prepares the student to take the CCNA or CISCO Certified Networking Associate exam. (Prerequisites: CIS1946) (2 hrs lec/2 hrs lab/0 hrs OJT) |
3 |
Close Dialog
CIS 1952*CIS 1952 Windows Server Administration This course is designed to help students learn how to plan, implement, manage, and support the Microsoft Windows Server operating system. (Prerequisites: CIS1950 or instructor consent; ENGL0950 or ENGL0955 or READ0950 or READ0955, or equivalent, or 78 or |
Close Dialog
Windows Server AdministrationCIS 1952 Windows Server Administration This course is designed to help students learn how to plan, implement, manage, and support the Microsoft Windows Server operating system. (Prerequisites: CIS1950 or instructor consent; ENGL0950 or ENGL0955 or READ0950 or READ0955, or equivalent, or 78 or |
3 |
Close Dialog
CIS 2814*CIS 2814 Ethical Hacking and Systems Defense The course combines an ethical hacking methodology with the hands-on application of security tools to better help students secure their systems. Students are introduced to common countermeasures that effectively reduce and/or mitigate attacks. (Prerequis |
Close Dialog
Ethical Hacking and Systems DefenseCIS 2814 Ethical Hacking and Systems Defense The course combines an ethical hacking methodology with the hands-on application of security tools to better help students secure their systems. Students are introduced to common countermeasures that effectively reduce and/or mitigate attacks. (Prerequis |
3 |
| Total: | 30 | |
*Requires a prerequisite or a concurrent course
Program Outcomes
- Describe the OSI Reference Model, layered communications principles and routing/switching principles with associated devices, as well as use these concepts effectively in verbal and written communication
- Manage Cisco router hardware and the Cisco Internet Operating System (IOS), including planning, installation, configuration, management, upgrading and troubleshooting of routers and switches
- Analyze organizational network needs, as well as design and implement networks that include hardware/software configuration and management and security (access control)
- Determine the factors involved in developing a secure information security strategy
- Describe and identify common security threats and attacks and describe how to safeguard against them
- Apply a common ethical hacking methodology to carry out
Center for Cybersecurity
The LSC Center for Cybersecurity was established to provide a broad range of system security and information assurance services for local businesses and the community at large. The Center will provide students with real-world learning experiences in cybersecurity education through several business and government partnerships.

