Learn more about this program at the Explore LSC Open House on October 8, 2026 RSVP Today

Cyber Defense

  • Certificate
  • 30 credits
  • 1 Year
  • Delivery Method: Hybrid

Why Study Cyber Defense at LSC?

The Cyber Defense certificate is designed to prepare participants with foundation-level skills for a job in computer networking and security. The curriculum in this program will help prepare students for the following certifications: CompTIA Net+, CompTIA Security+, Cisco RSTECH, and EC-Council Certified Ethical Hacker (CEH).

The 30-credit Cyber Defense Certificate transfers seamlessly into LSC's Network Administration and Security Diploma (58 credits), and AAS degree (72 credits).

View Catalog

Career Information

Below you will find the Career Field and Career Cluster that this program is related to. Learn more about if this career area fits your interests!

Is Computer Science and Information Technology right for you?

Information technology workers are in a growing and always changing field. You might work with computer hardware, software, multimedia, or network systems. You might design new computer equipment or work on a new computer game.

$129K

$61/hr

Median annual salary/wage for
Information Security Analysts
in Minnesota

Details

29%

Projected job growth
in the next decade

Details

183K

Information Security Analysts are currently employed

Details

This data is delivered by an API from CareerOneStop, sponsored by U.S. Department of Labor, Employment and Training Administration. www.careeronestop.org Find more information including data update schedules at CareerOneStop's Data Sources (https://www.careeronestop.org/Help/data-sources.aspx). Full list of datasources.

Close Dialog

Median Annual Salary/Wage Earnings for Information Security Analysts

the United States

$125K
$60/hr

$70K - $186K

$33/hr - $89/hr

Minnesota

$129K
$61/hr

$79K - $169K

$38/hr - $81/hr

Duluth, MN Area

$104K
$50/hr

$63K - $136K

$30/hr - $65/hr

The Occupational Employment and Wage Statistics (OEWS) program produces employment and wage estimates annually for over 800 occupations. These estimates are available for the nation as a whole, for individual states, and for metropolitan and nonmetropolitan areas; national occupational estimates for specific industries are also available.

Salary data are from U.S. Department of Labor, Bureau of Labor Statistics, Occupational Employment and Wage Statistics (OEWS) program (www.bls.gov/oes/). Current as of May 2024.

Close Dialog

Projected 10-Year Job Growth for Information Security Analysts

Rapid Growth
Outlook: Bright

the United States

29%

Projected Annual Job Openings: 16,000

2024 to 2034

Minnesota

28%

Projected Annual Job Openings: 280

2022 to 2032

My Next Move provides career outlook designations that include Bright, Average, or Below Average. Bright Outlook occupations are expected to grow rapidly in the next several years, will have large numbers of job openings, or are new and emerging occupations.

Occupation outlook data come from O*NET Bright Outlook occupations (www.onetonline.org/find/bright) and My Next Move career outlook designations (www.onetcenter.org/bright/current/mnm_outlook.html). Note this information is only available at a national level, so even if you selected a state, you’ll see this information for the whole country. Current as of November 2024.

Close Dialog

Employment Numbers for Information Security Analysts

the United States

Estimated Employment:

182,800

Minnesota

Estimated Employment:

2,910

My Next Move provides career outlook designations that include Bright, Average, or Below Average. Bright Outlook occupations are expected to grow rapidly in the next several years, will have large numbers of job openings, or are new and emerging occupations.

Occupation outlook data come from O*NET Bright Outlook occupations (www.onetonline.org/find/bright) and My Next Move career outlook designations (www.onetcenter.org/bright/current/mnm_outlook.html). Note this information is only available at a national level, so even if you selected a state, you’ll see this information for the whole country. Current as of November 2024.

Close Dialog

Alternative Job Titles for Information Security Analysts

  • Information Security Officer
  • Information Security Specialist
  • Information Systems Security Analyst
  • Information Systems Security Officer (ISSO)
  • Information Technology Security Analyst (IT Security Analyst)
  • Network Security Analyst
  • Security Analyst
  • Systems Analyst

The O*NET database contains a rich set of variables that describe work and worker characteristics, including skill requirements.

Occupation data (titles, sample titles, descriptions, daily work activities, knowledge, skills, abilities, tasks, related occupations, technologies and tools, and work values) come from the O*NET 29.0 Database (www.onetcenter.org/database.html) by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 (creativecommons.org/licenses/by/4.0/) license. O*NET® is a trademark of USDOL/ETA. Current as of October 2024.

Close Dialog

Job Tasks and Activities for Information Security Analysts

  • Collaborate with others to resolve information technology issues.
  • Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
  • Coordinate implementation of computer system plan with establishment personnel and outside vendors.
  • Coordinate project activities with other personnel or departments.
  • Develop computer or information security policies or procedures.
  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Document computer security and emergency measures policies, procedures, and tests.
  • Document operational procedures.
  • Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
  • Implement security measures for computer or information systems.
  • Modify computer security files to incorporate new software, correct errors, or change individual access status.
  • Monitor current reports of computer viruses to determine when to update virus protection systems.
  • Monitor the security of digital information.
  • Monitor use of data files and regulate access to safeguard information in computer files.
  • Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
  • Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
  • Test computer system operations to ensure proper functioning.
  • Train others in computer interface or software use.
  • Train users and promote security awareness to ensure system security and to improve server and network efficiency.
  • Troubleshoot issues with computer applications or systems.
  • Update knowledge about emerging industry or technology trends.

The O*NET database contains a rich set of variables that describe work and worker characteristics, including skill requirements.

Occupation data (titles, sample titles, descriptions, daily work activities, knowledge, skills, abilities, tasks, related occupations, technologies and tools, and work values) come from the O*NET 29.0 Database (www.onetcenter.org/database.html) by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 (creativecommons.org/licenses/by/4.0/) license. O*NET® is a trademark of USDOL/ETA. Current as of October 2024.

Close Dialog

Interests for Information Security Analysts

  • Conventional
    Following procedures and regulations to organize information or data, typically in a business setting.
  • Investigative
    Studying and researching scientific subjects and human behavior.

The O*NET database contains a rich set of variables that describe work and worker characteristics, including skill requirements.

Occupation data (titles, sample titles, descriptions, daily work activities, knowledge, skills, abilities, tasks, related occupations, technologies and tools, and work values) come from the O*NET 29.0 Database (www.onetcenter.org/database.html) by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 (creativecommons.org/licenses/by/4.0/) license. O*NET® is a trademark of USDOL/ETA. Current as of October 2024.

Close Dialog

Skills for Information Security Analysts

In order of importance

  • Reading Comprehension
    Reading work-related information.
    Importance: 75/100
  • Critical Thinking
    Thinking about the pros and cons of different ways to solve a problem.
    Importance: 72/100
  • Active Listening
    Listening to others, not interrupting, and asking good questions.
    Importance: 69/100
  • Complex Problem Solving
    Noticing a problem and figuring out the best way to solve it.
    Importance: 69/100
  • Speaking
    Talking to others.
    Importance: 66/100
  • Writing
    Writing things for co-workers or customers.
    Importance: 63/100
  • Systems Analysis
    Figuring out how a system should work and how changes in the future will affect it.
    Importance: 60/100
  • Monitoring
    Keeping track of how well people and/or groups are doing in order to make improvements.
    Importance: 60/100
  • Judgment and Decision Making
    Thinking about the pros and cons of different options and picking the best one.
    Importance: 60/100
  • Active Learning
    Figuring out how to use new ideas or things.
    Importance: 56/100
  • Time Management
    Managing your time and the time of other people.
    Importance: 53/100
  • Quality Control Analysis
    Testing how well a product or service works.
    Importance: 50/100
  • Systems Evaluation
    Measuring how well a system is working and how to improve it.
    Importance: 50/100
  • Coordination
    Changing what is done based on other people's actions.
    Importance: 50/100
  • Operations Monitoring
    Watching gauges, dials, or display screens to make sure a machine is working.
    Importance: 50/100
  • Learning Strategies
    Using the best training or teaching strategies for learning new things.
    Importance: 47/100
  • Service Orientation
    Looking for ways to help people.
    Importance: 47/100
  • Instructing
    Teaching people how to do something.
    Importance: 47/100
  • Management of Personnel Resources
    Selecting and managing the best workers for a job.
    Importance: 47/100
  • Social Perceptiveness
    Understanding people's reactions.
    Importance: 44/100
  • Negotiation
    Bringing people together to solve differences.
    Importance: 41/100
  • Programming
    Writing computer programs.
    Importance: 41/100
  • Persuasion
    Talking people into changing their minds or their behavior.
    Importance: 41/100
  • Operations Analysis
    Figuring out what a product or service needs to be able to do.
    Importance: 38/100
  • Mathematics
    Using math to solve problems.
    Importance: 31/100
  • Troubleshooting
    Figuring out what is causing equipment, machines, wiring, or computer programs to not work.
    Importance: 28/100
  • Technology Design
    Making equipment and technology useful for customers.
    Importance: 28/100
  • Science
    Using scientific rules and strategies to solve problems.
    Importance: 22/100
  • Management of Material Resources
    Managing equipment and materials.
    Importance: 19/100
  • Equipment Selection
    Deciding what kind of tools and equipment are needed to do a job.
    Importance: 19/100
  • Management of Financial Resources
    Making spending decisions and keeping track of what is spent.
    Importance: 19/100
  • Operation and Control
    Using equipment or systems.
    Importance: 19/100
  • Equipment Maintenance
    Planning and doing the basic maintenance on equipment.
    Importance: 16/100
  • Repairing
    Repairing machines or systems using the right tools.
    Importance: 16/100
  • Installation
    Installing equipment, machines, wiring, or computer programs.
    Importance: 13/100

The O*NET database contains a rich set of variables that describe work and worker characteristics, including skill requirements.

Occupation data (titles, sample titles, descriptions, daily work activities, knowledge, skills, abilities, tasks, related occupations, technologies and tools, and work values) come from the O*NET 29.0 Database (www.onetcenter.org/database.html) by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 (creativecommons.org/licenses/by/4.0/) license. O*NET® is a trademark of USDOL/ETA. Current as of October 2024.

Close Dialog

Knowledge for Information Security Analysts

In order of importance

  • Computers and Electronics
    Knowledge of circuit boards, processors, chips, electronic equipment, and computer hardware and software, including applications and programming.
    Importance: 84/100
  • English Language
    Knowledge of the structure and content of the English language including the meaning and spelling of words, and rules of composition and grammar.
    Importance: 82/100
  • Administration and Management
    Knowledge of business and management principles involved in strategic planning, resource allocation, human resources modeling, leadership technique, production methods, and coordination of people and resources.
    Importance: 67/100
  • Telecommunications
    Knowledge of transmission, broadcasting, switching, control, and operation of telecommunications systems.
    Importance: 66/100
  • Engineering and Technology
    Knowledge of the practical application of engineering science and technology. This includes applying principles, techniques, procedures, and equipment to the design and production of various goods and services.
    Importance: 66/100
  • Customer and Personal Service
    Knowledge of principles and processes for providing customer and personal services. This includes customer needs assessment, meeting quality standards for services, and evaluation of customer satisfaction.
    Importance: 61/100
  • Public Safety and Security
    Knowledge of relevant equipment, policies, procedures, and strategies to promote effective local, state, or national security operations for the protection of people, data, property, and institutions.
    Importance: 57/100
  • Education and Training
    Knowledge of principles and methods for curriculum and training design, teaching and instruction for individuals and groups, and the measurement of training effects.
    Importance: 55/100
  • Mathematics
    Knowledge of arithmetic, algebra, geometry, calculus, statistics, and their applications.
    Importance: 47/100
  • Communications and Media
    Knowledge of media production, communication, and dissemination techniques and methods. This includes alternative ways to inform and entertain via written, oral, and visual media.
    Importance: 45/100
  • Law and Government
    Knowledge of laws, legal codes, court procedures, precedents, government regulations, executive orders, agency rules, and the democratic political process.
    Importance: 43/100
  • Administrative
    Knowledge of administrative and office procedures and systems such as word processing, managing files and records, stenography and transcription, designing forms, and workplace terminology.
    Importance: 42/100
  • Personnel and Human Resources
    Knowledge of principles and procedures for personnel recruitment, selection, training, compensation and benefits, labor relations and negotiation, and personnel information systems.
    Importance: 36/100
  • Design
    Knowledge of design techniques, tools, and principles involved in production of precision technical plans, blueprints, drawings, and models.
    Importance: 35/100
  • Production and Processing
    Knowledge of raw materials, production processes, quality control, costs, and other techniques for maximizing the effective manufacture and distribution of goods.
    Importance: 35/100
  • Economics and Accounting
    Knowledge of economic and accounting principles and practices, the financial markets, banking, and the analysis and reporting of financial data.
    Importance: 32/100
  • Psychology
    Knowledge of human behavior and performance; individual differences in ability, personality, and interests; learning and motivation; psychological research methods; and the assessment and treatment of behavioral and affective disorders.
    Importance: 27/100
  • Sociology and Anthropology
    Knowledge of group behavior and dynamics, societal trends and influences, human migrations, ethnicity, cultures, and their history and origins.
    Importance: 18/100
  • Mechanical
    Knowledge of machines and tools, including their designs, uses, repair, and maintenance.
    Importance: 17/100
  • Geography
    Knowledge of principles and methods for describing the features of land, sea, and air masses, including their physical characteristics, locations, interrelationships, and distribution of plant, animal, and human life.
    Importance: 15/100
  • Transportation
    Knowledge of principles and methods for moving people or goods by air, rail, sea, or road, including the relative costs and benefits.
    Importance: 15/100
  • Sales and Marketing
    Knowledge of principles and methods for showing, promoting, and selling products or services. This includes marketing strategy and tactics, product demonstration, sales techniques, and sales control systems.
    Importance: 13/100
  • Physics
    Knowledge and prediction of physical principles, laws, their interrelationships, and applications to understanding fluid, material, and atmospheric dynamics, and mechanical, electrical, atomic and sub-atomic structures and processes.
    Importance: 9/100
  • Building and Construction
    Knowledge of materials, methods, and the tools involved in the construction or repair of houses, buildings, or other structures such as highways and roads.
    Importance: 9/100
  • Foreign Language
    Knowledge of the structure and content of a foreign (non-English) language including the meaning and spelling of words, rules of composition and grammar, and pronunciation.
    Importance: 8/100
  • Chemistry
    Knowledge of the chemical composition, structure, and properties of substances and of the chemical processes and transformations that they undergo. This includes uses of chemicals and their interactions, danger signs, production techniques, and disposal methods.
    Importance: 6/100
  • Philosophy and Theology
    Knowledge of different philosophical systems and religions. This includes their basic principles, values, ethics, ways of thinking, customs, practices, and their impact on human culture.
    Importance: 5/100
  • History and Archeology
    Knowledge of historical events and their causes, indicators, and effects on civilizations and cultures.
    Importance: 3/100
  • Therapy and Counseling
    Knowledge of principles, methods, and procedures for diagnosis, treatment, and rehabilitation of physical and mental dysfunctions, and for career counseling and guidance.
    Importance: 3/100
  • Medicine and Dentistry
    Knowledge of the information and techniques needed to diagnose and treat human injuries, diseases, and deformities. This includes symptoms, treatment alternatives, drug properties and interactions, and preventive health-care measures.
    Importance: 2/100
  • Food Production
    Knowledge of techniques and equipment for planting, growing, and harvesting food products (both plant and animal) for consumption, including storage/handling techniques.
    Importance: 1/100
  • Biology
    Knowledge of plant and animal organisms, their tissues, cells, functions, interdependencies, and interactions with each other and the environment.
    Importance: 1/100
  • Fine Arts
    Knowledge of the theory and techniques required to compose, produce, and perform works of music, dance, visual arts, drama, and sculpture.
    Importance: 1/100

The O*NET database contains a rich set of variables that describe work and worker characteristics, including skill requirements.

Occupation data (titles, sample titles, descriptions, daily work activities, knowledge, skills, abilities, tasks, related occupations, technologies and tools, and work values) come from the O*NET 29.0 Database (www.onetcenter.org/database.html) by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 (creativecommons.org/licenses/by/4.0/) license. O*NET® is a trademark of USDOL/ETA. Current as of October 2024.

Close Dialog

Physical Abilities for Information Security Analysts

In order of importance

  • Problem Sensitivity
    Noticing when problems happen.
    Importance: 75/100
  • Inductive Reasoning
    Making general rules or coming up with answers from lots of detailed information.
    Importance: 75/100
  • Oral Comprehension
    Listening and understanding what people say.
    Importance: 75/100
  • Written Comprehension
    Reading and understanding what is written.
    Importance: 75/100
  • Deductive Reasoning
    Using rules to solve problems.
    Importance: 75/100
  • Written Expression
    Communicating by writing.
    Importance: 72/100
  • Information Ordering
    Ordering or arranging things.
    Importance: 72/100
  • Oral Expression
    Communicating by speaking.
    Importance: 69/100
  • Near Vision
    Seeing details up close.
    Importance: 69/100
  • Category Flexibility
    Grouping things in different ways.
    Importance: 63/100
  • Flexibility of Closure
    Seeing hidden patterns.
    Importance: 60/100
  • Speech Clarity
    Speaking clearly.
    Importance: 60/100
  • Speech Recognition
    Recognizing spoken words.
    Importance: 60/100
  • Selective Attention
    Paying attention to something without being distracted.
    Importance: 53/100
  • Originality
    Creating new and original ideas.
    Importance: 50/100
  • Fluency of Ideas
    Coming up with lots of ideas.
    Importance: 50/100
  • Perceptual Speed
    Quickly comparing groups of letters, numbers, pictures, or other things.
    Importance: 50/100
  • Speed of Closure
    Quickly knowing what you are looking at.
    Importance: 47/100
  • Visualization
    Imagining how something will look after it is moved around or changed.
    Importance: 44/100
  • Time Sharing
    Doing two or more things at the same time.
    Importance: 44/100
  • Far Vision
    Seeing details that are far away.
    Importance: 44/100
  • Mathematical Reasoning
    Choosing the right type of math to solve a problem.
    Importance: 44/100
  • Finger Dexterity
    Putting together small parts with your fingers.
    Importance: 35/100
  • Memorization
    Remembering words, numbers, pictures, or steps.
    Importance: 31/100
  • Number Facility
    Adding, subtracting, multiplying, or dividing.
    Importance: 31/100
  • Visual Color Discrimination
    Noticing the difference between colors, including shades and brightness.
    Importance: 28/100
  • Arm-Hand Steadiness
    Keeping your arm or hand steady.
    Importance: 25/100
  • Manual Dexterity
    Holding or moving items with your hands.
    Importance: 22/100
  • Control Precision
    Quickly changing the controls of a machine, car, truck or boat.
    Importance: 22/100
  • Hearing Sensitivity
    Telling the difference between sounds.
    Importance: 22/100
  • Depth Perception
    Deciding which thing is closer or farther away from you, or deciding how far away it is from you.
    Importance: 19/100
  • Auditory Attention
    Paying attention to one sound while there are other distracting sounds.
    Importance: 19/100
  • Extent Flexibility
    Bending, stretching, twisting, or reaching with your body, arms, and/or legs.
    Importance: 16/100
  • Trunk Strength
    Using your lower back and stomach.
    Importance: 16/100
  • Dynamic Strength
    Exercising for a long time without your muscles getting tired.
    Importance: 10/100
  • Wrist-Finger Speed
    Making fast, simple, repeated movements of your fingers, hands, and wrists.
    Importance: 10/100
  • Stamina
    Exercising for a long time without getting out of breath.
    Importance: 3/100
  • Response Orientation
    Quickly deciding if you should move your hand, foot, or other body part.
    Importance: 3/100

The O*NET database contains a rich set of variables that describe work and worker characteristics, including skill requirements.

Occupation data (titles, sample titles, descriptions, daily work activities, knowledge, skills, abilities, tasks, related occupations, technologies and tools, and work values) come from the O*NET 29.0 Database (www.onetcenter.org/database.html) by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 (creativecommons.org/licenses/by/4.0/) license. O*NET® is a trademark of USDOL/ETA. Current as of October 2024.

Close Dialog

Tools and Technology used by Information Security Analysts

  • Network analyzers
  • Mainframe computers
  • Notebook computers
  • Desktop computers
  • Protocol analyzers
  • Web platform development software
    • AJAX
    • Apache Struts
    • Apache Tomcat
    • Django
    • Drupal
    • Enterprise JavaBeans
    • Extensible hypertext markup language XHTML
    • Google Angular
    • Hypertext markup language HTML
    • JavaScript
    • JavaScript Object Notation JSON
    • LAMP Stack
    • Microsoft ASP.NET
    • Microsoft Active Server Pages ASP
    • Node.js
    • Oracle JavaServer Pages JSP
    • PHP
    • Ruby on Rails
    • Spring Framework
  • Data base user interface and query software
    • Amazon Elastic Compute Cloud EC2
    • Amazon Redshift
    • Amazon Web Services AWS software
    • Blackboard software
    • Microsoft Access
    • Microsoft SQL Server
    • Oracle Database
    • Oracle JDBC
    • Structured query language SQL
  • Transaction security and virus protection software
    • Anti-Trojan software
    • Anti-phishing software
    • Anti-spyware software
    • Check Point Next Generation Secure Web Gateway
    • End-to-end encryption software
    • HP WebInspect
    • Honeypot
    • Link encryption software
    • McAfee
    • McAfee VirusScan
    • Metasploit
    • Norton AntiVirus
    • NortonLifeLock cybersecurity software
    • Password cracker software
    • Penetration testing software
    • Ping Identity
    • Portswigger BurP Suite
    • Program checksumming software
    • Rapid7 Nexpose
    • Root kit detection software
    • Secure internet filtering software
    • Security risk assessment software
    • Stack smashing protection SSP software
    • Symantec Endpoint Protection
    • Tenable Nessus
    • Virus scanning software
  • Network monitoring software
    • AccessData FTK
    • Automated audit trail analysis software
    • Automated media tracking software
    • Ethereal
    • Guidance Software EnCase Forensic
    • IBM QRadar SIEM
    • Integrity verification software
    • Keystroke monitoring software
    • Micro Focus OpenView
    • Nagios
    • Network intrusion prevention systems NIPS
    • Network, hardware, and software auditing software
    • Oracle Net Manager
    • Quest BigBrother
    • Sniffer Investigator
    • Snort
    • Symantec Blue Coat Data Loss Prevention
    • Tcpdump
    • Wireshark
  • Development environment software
    • Adobe ActionScript
    • Apache Ant
    • Apache Kafka
    • Apache Maven
    • C
    • Common business oriented language COBOL
    • Eclipse IDE
    • Go
    • Integrated development environment IDE software
    • Microsoft .NET Framework
    • Microsoft Azure software
    • Microsoft PowerShell
    • Microsoft Visual Basic
    • Microsoft Visual Basic Scripting Edition VBScript
    • Microsoft Visual Basic for Applications VBA
    • Microsoft Visual Studio
    • National Instruments LabVIEW
    • Ruby
  • Operating system software
    • Apple macOS
    • Bash
    • Hewlett Packard HP-UX
    • Job control language JCL
    • KornShell
    • Linux
    • Microsoft Hyper-V Server
    • Microsoft Windows
    • Microsoft Windows Server
    • Operating system software
    • Oracle Solaris
    • Red Hat Enterprise Linux
    • Shell script
    • UNIX
    • UNIX Shell
    • Ubuntu
  • Data base management system software
    • Amazon DynamoDB
    • Apache Cassandra
    • Apache Hadoop
    • Apache Hive
    • Apache Pig
    • Apache Solr
    • Elasticsearch
    • MongoDB
    • MySQL
    • NoSQL
    • Oracle PL/SQL
    • Relational database management software
    • Teradata Database
  • Object or component oriented development software
    • Advanced business application programming ABAP
    • Apache Groovy
    • C#
    • C++
    • Objective C
    • Oracle Java
    • Perl
    • Python
    • Scala
    • Swift
  • Network security and virtual private network VPN equipment software
    • Cryptographic key management software
    • Firewall software
    • Imperva SecureSphere
    • IpFilter
    • IpTables
    • Juniper Networks NetScreen-Security Manager
    • Palo Alto Networks Next-Generation Security Platform
    • Trend Micro TippingPoint
    • Virtual private networking VPN software
  • Network security or virtual private network VPN management software
    • HP Fortify
    • ISS RealSecure
    • Intrusion detection system IDS
    • Intrusion prevention system IPS
    • Network and system vulnerability assessment software
    • Network security auditing software
    • Security incident management software
    • Websense Data Loss Prevention
  • Business intelligence and data analysis software
    • Apache Spark
    • IBM Cognos Impromptu
    • MicroStrategy
    • Oracle Business Intelligence Enterprise Edition
    • Qlik Tech QlikView
    • Tableau
  • Enterprise resource planning ERP software
    • Microsoft Dynamics
    • Oracle Fusion Applications
    • Oracle Hyperion
    • Oracle JD Edwards EnterpriseOne
    • Oracle PeopleSoft
    • Oracle PeopleSoft Financials
    • SAP software
  • Configuration management software
    • Automated installation software
    • Chef
    • Patch and update management software
    • Perforce Helix software
    • Puppet
  • Internet directory services software
    • Active directory software
    • Berkeley Internet Domain Name BIND
    • Domain name system DNS
    • Microsoft Active Directory
    • Network directory services software
  • Application server software
    • Docker
    • GitHub
    • Oracle WebLogic Server
    • Red Hat OpenShift
    • Red Hat WildFly
  • Authentication server software
    • Diameter
    • IBM Tivoli Identity Management TIM
    • Password management software
    • Remote authentication dial-in user service RADIUS software
  • Enterprise application integration software
    • Atlassian Bamboo
    • Extensible markup language XML
    • Microsoft SQL Server Integration Services SSIS
    • Oracle Fusion Middleware
  • Program testing software
    • Conformance and validation testing software
    • Kali Linux
    • Selenium
    • System testing software
  • Access software
    • Access management software
    • Citrix cloud computing software
    • IBM Tivoli Access Management TAM
  • File versioning software
    • Apache Subversion SVN
    • Git
    • WinMerge
  • Backup or archival software
    • Backup and archival software
    • System and data disaster recovery software
    • Veritas NetBackup
  • Cloud-based management software
    • Amazon Web Services AWS CloudFormation
    • IBM WebSphere
    • Splunk Enterprise
  • Project management software
    • Atlassian Confluence
    • Microsoft Project
    • Microsoft Teams
  • Geographic information system
    • ESRI ArcGIS software
    • Geographic information system GIS software
  • Electronic mail software
    • IBM Notes
    • Microsoft Exchange
  • Word processing software
    • 3M Post-it App
    • Microsoft Word
  • Financial analysis software
    • Delphi Technology
    • Oracle E-Business Suite Financials
  • Data base reporting software
    • Microsoft SQL Server Reporting Services SSRS
    • SAP Crystal Reports
  • Analytical or scientific software
    • SAS
    • The MathWorks MATLAB
  • Spreadsheet software
    • Microsoft Excel
  • Medical software
    • Epic Systems
  • Risk management data and analysis software
    • ArcSight Enterprise Threat and Risk Management
  • Filesystem software
    • Computer forensic software
  • Content workflow software
    • Atlassian JIRA
  • Enterprise system management software
    • IBM Power Systems software
  • Object oriented data base management software
    • PostgreSQL
  • Expert system software
    • Ansible software
  • Point of sale POS software
    • Smart card management software
  • Document management software
    • Microsoft SharePoint
  • Clustering software
    • VMware
  • Desktop communications software
    • Secure shell SSH software
  • Communications server software
    • IBM Domino
  • Portal server software
    • Apache HTTP Server
  • Customer relationship management CRM software
    • Salesforce software
  • Transaction server software
    • Customer information control system CICS
  • Office suite software
    • Microsoft Office software
  • Instant messaging software
    • Blink
  • Administration software
    • Cisco Systems CiscoWorks
  • Human resources software
    • Human resource management software HRMS
  • Internet protocol IP multimedia subsystem software
    • Voice over internet protocol VoIP system software
  • Presentation software
    • Microsoft PowerPoint
  • Cloud-based protection or security software
    • Qualys Cloud Platform
  • Web page creation and editing software
    • Google Sites
  • Requirements analysis and system architecture software
    • Unified modeling language UML
  • Storage networking software
    • Amazon Simple Storage Service S3
  • Industrial control software
    • Supervisory control and data acquisition SCADA software
  • Switch or router software
    • Border Gateway Protocol BGP
  • Process mapping and design software
    • Microsoft Visio
  • Information retrieval or search software
    • LexisNexis
  • License management software
    • License management software

The O*NET database contains a rich set of variables that describe work and worker characteristics, including skill requirements.

Occupation data (titles, sample titles, descriptions, daily work activities, knowledge, skills, abilities, tasks, related occupations, technologies and tools, and work values) come from the O*NET 29.0 Database (www.onetcenter.org/database.html) by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 (creativecommons.org/licenses/by/4.0/) license. O*NET® is a trademark of USDOL/ETA. Current as of October 2024.

Close Dialog

Employment Industries for Information Security Analysts

  • Computer systems design and related services
    41,100 employed
  • Management of companies and enterprises
    18,400 employed
  • Credit intermediation and related activities (5221,3)
    13,200 employed
  • Management, scientific, and technical consulting services
    10,400 employed
  • Research and development in the physical, engineering, and life sciences
    7,000 employed
  • Engineering services
    6,700 employed
  • Accounting, tax preparation, bookkeeping, and payroll services
    6,200 employed
  • Computing infrastructure providers, data processing, web hosting, and related services
    6,100 employed
  • Software publishers
    5,000 employed
  • Temporary help services
    3,600 employed

The O*NET database contains a rich set of variables that describe work and worker characteristics, including skill requirements.

Occupation data (titles, sample titles, descriptions, daily work activities, knowledge, skills, abilities, tasks, related occupations, technologies and tools, and work values) come from the O*NET 29.0 Database (www.onetcenter.org/database.html) by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 (creativecommons.org/licenses/by/4.0/) license. O*NET® is a trademark of USDOL/ETA. Current as of October 2024.

Close Dialog

Career Information Datasources for Information Security Analysts

Plan Your Education

The Cyber Defense Program Guide is a tool to help you map out how to successfully get your degree at Lake Superior College.

View approximate total tuition and fees for MN residents to complete this degree.

This program may be completed in 1 year if prerequisites are complete.

Paying for College

Lake Superior College$5,931LSC IceHawks Logo 
Minnesota State Colleges$6,444 
Minnesota State Universities$10,643 
University of Minnesota$14,928 
Minnesota Private Colleges and Universities$44,928
*Based on average 2025-26 tuition and fees. For the exact costs, contact the institution that interests you. Does not include room and board.

Program Participation Requirements

Pre-Program Requirements

Successful entry into this program requires a specific level of skill in the areas of English/reading and mathematics.

English/Reading:

  • Eligible for ENGL 1106 - College Composition I, or
  • Completion of ENGL/READ 0950/0955 (or equivalent or higher). ENGL/READ 0950/0955 may be taken concurrently with Semester I coursework.

Mathematics:

  • Eligible for MATH 0970 - Intermediate Algebra, or
  • Completion of MATH 0950/0955 (or equivalent or higher). MATH 0950/0955 may be taken concurrently with Semester I coursework.

There are other ways to qualify. Visit Course Placement to find out more.

Course Title Credits
Semester 1
Close Dialog

CIS 1402 Foundations of CIS

An introduction to foundational concepts in Computer Information Systems (CIS), such as virtual computing, number systems, intermediate office productivity software, computer networking, elementary programming, and cybersecurity. Students will be expected

CIS 1402*
Close Dialog

CIS 1402 Foundations of CIS

An introduction to foundational concepts in Computer Information Systems (CIS), such as virtual computing, number systems, intermediate office productivity software, computer networking, elementary programming, and cybersecurity. Students will be expected

Foundations of CIS
3
Close Dialog

CIS 1946 CISCO Networking I

This course is the first in a series of four courses that deal with the CISCO core content. This course prepares the student to take the CCNA (CISCO Certified Networking Associate) exam. (Prerequisites: ENGL0950 or ENGL0955 or READ0950 or READ0955, or e

CIS 1946*
Close Dialog

CIS 1946 CISCO Networking I

This course is the first in a series of four courses that deal with the CISCO core content. This course prepares the student to take the CCNA (CISCO Certified Networking Associate) exam. (Prerequisites: ENGL0950 or ENGL0955 or READ0950 or READ0955, or e

CISCO Networking I
3
Close Dialog

CIS 2811 Intrusion Detection and Prevention Systems Fundamentals

In this course, students gain a thorough grounding in the design, implementation, and administration of IDSes/IPSes, as well as practical, hands-on experience working with these systems. In addition, students analyze various attack signatures and the netw

CIS 2811*
Close Dialog

CIS 2811 Intrusion Detection and Prevention Systems Fundamentals

In this course, students gain a thorough grounding in the design, implementation, and administration of IDSes/IPSes, as well as practical, hands-on experience working with these systems. In addition, students analyze various attack signatures and the netw

Intrusion Detection and Prevention Systems Fundamentals
3
Close Dialog

CIS 2812 Network Security

This course prepares students for entry-level security specialist careers by developing an in-depth understanding of network security principles and the tools and configurations needed to secure a network. (Prerequisite: CIS1810 or instructor approval)

CIS 2812*+
Close Dialog

CIS 2812 Network Security

This course prepares students for entry-level security specialist careers by developing an in-depth understanding of network security principles and the tools and configurations needed to secure a network. (Prerequisite: CIS1810 or instructor approval)

Network Security
3
Close Dialog

CIS 2813 Forensics and Incident Response

This course explores security incidents and intrusions, including identifying and categorizing incidents, responding to incidents, log analysis, network traffic analysis, various tools, and creating an incident response team. (Prerequisite: CIS1810 or i

CIS 2813*
Close Dialog

CIS 2813 Forensics and Incident Response

This course explores security incidents and intrusions, including identifying and categorizing incidents, responding to incidents, log analysis, network traffic analysis, various tools, and creating an incident response team. (Prerequisite: CIS1810 or i

Forensics and Incident Response
3
Semester 2
Close Dialog

CIS 1745 UNIX System Administration

An introduction to the increasingly popular UNIX operating system using free Linux. Students will understand the architecture of UNIX (file system, processes, and device management), learn how to use common UNIX application and utility programs, program

CIS 1745*
Close Dialog

CIS 1745 UNIX System Administration

An introduction to the increasingly popular UNIX operating system using free Linux. Students will understand the architecture of UNIX (file system, processes, and device management), learn how to use common UNIX application and utility programs, program

UNIX System Administration
3
Close Dialog

CIS 1810 Security Fundamentals

This course introduces students to fundamental concepts and methods in data, firewall, and network security and prepares them to take industry Security+ certification examination. (Prerequisites: CIS1946 or instructor's consent) (2 hrs lab/2 hrs lec/0 h

CIS 1810*
Close Dialog

CIS 1810 Security Fundamentals

This course introduces students to fundamental concepts and methods in data, firewall, and network security and prepares them to take industry Security+ certification examination. (Prerequisites: CIS1946 or instructor's consent) (2 hrs lab/2 hrs lec/0 h

Security Fundamentals
3
Close Dialog

CIS 1947 CISCO Networking II

This course is the second in a series of four courses that deal with the CISCO core content. This course prepares the student to take the CCNA or CISCO Certified Networking Associate exam. (Prerequisites: CIS1946) (2 hrs lec/2 hrs lab/0 hrs OJT)

CIS 1947*
Close Dialog

CIS 1947 CISCO Networking II

This course is the second in a series of four courses that deal with the CISCO core content. This course prepares the student to take the CCNA or CISCO Certified Networking Associate exam. (Prerequisites: CIS1946) (2 hrs lec/2 hrs lab/0 hrs OJT)

CISCO Networking II
3
Close Dialog

CIS 1952 Windows Server Administration

This course is designed to help students learn how to plan, implement, manage, and support the Microsoft Windows Server operating system. (Prerequisites: CIS1950 or instructor consent; ENGL0950 or ENGL0955 or READ0950 or READ0955, or equivalent, or 78 or

CIS 1952*
Close Dialog

CIS 1952 Windows Server Administration

This course is designed to help students learn how to plan, implement, manage, and support the Microsoft Windows Server operating system. (Prerequisites: CIS1950 or instructor consent; ENGL0950 or ENGL0955 or READ0950 or READ0955, or equivalent, or 78 or

Windows Server Administration
3
Close Dialog

CIS 2814 Ethical Hacking and Systems Defense

The course combines an ethical hacking methodology with the hands-on application of security tools to better help students secure their systems. Students are introduced to common countermeasures that effectively reduce and/or mitigate attacks. (Prerequis

CIS 2814*
Close Dialog

CIS 2814 Ethical Hacking and Systems Defense

The course combines an ethical hacking methodology with the hands-on application of security tools to better help students secure their systems. Students are introduced to common countermeasures that effectively reduce and/or mitigate attacks. (Prerequis

Ethical Hacking and Systems Defense
3
Total: 30

*Requires a prerequisite or a concurrent course

Program Outcomes

  • Describe the OSI Reference Model, layered communications principles and routing/switching principles with associated devices, as well as use these concepts effectively in verbal and written communication
  • Manage Cisco router hardware and the Cisco Internet Operating System (IOS), including planning, installation, configuration, management, upgrading and troubleshooting of routers and switches
  • Analyze organizational network needs, as well as design and implement networks that include hardware/software configuration and management and security (access control)
  • Determine the factors involved in developing a secure information security strategy
  • Describe and identify common security threats and attacks and describe how to safeguard against them
  • Apply a common ethical hacking methodology to carry out

Center for Cybersecurity

The LSC Center for Cybersecurity was established to provide a broad range of system security and information assurance services for local businesses and the community at large. The Center will provide students with real-world learning experiences in cybersecurity education through several business and government partnerships.

Ready to get started? Become a Student
Apply Now