Cyber Defense
- Certificate
- 30 credits
- 1 Year
- Delivery Method: Hybrid
Why Study Cyber Defense at LSC?
This 30-credit certificate is designed to prepare students for a career in computer and networking security. The program will help prepare students for the following certifications: CompTIA Net+, CompTIA Security+ and EC-Council Certified Ethical Hacker (CEH). This program also transfers into LSC’s Network Administration and Cybersecurity diploma and AAS degrees.
Career Information
Information Security Analysts Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.
This data is delivered by an API from CareerOneStop, sponsored by U.S. Department of Labor, Employment and Training Administration. www.careeronestop.org Find more information including data update schedules at CareerOneStop's Data Sources (https://www.careeronestop.org/Help/data-sources.aspx). Full list of datasources.
Median Annual Salary/Wage Earnings for Information Security Analysts
the United States
$120K
$57/hr
$69K - $182K
$33/hr - $87/hr
Minnesota
$124K
$59/hr
$77K - $168K
$37/hr - $80/hr
Duluth, MN Area
$109K
$52/hr
$75K - $158K
$36/hr - $75/hr
The Occupational Employment and Wage Statistics (OEWS) program produces employment and wage estimates annually for over 800 occupations. These estimates are available for the nation as a whole, for individual states, and for metropolitan and nonmetropolitan areas; national occupational estimates for specific industries are also available.
Salary data are from U.S. Department of Labor, Bureau of Labor Statistics, Occupational Employment and Wage Statistics (OEWS) program (www.bls.gov/oes/). Current as of May 2024.
Projected 10-Year Job Growth for Information Security Analysts
Outlook: Bright
the United States
33%
Projected Annual Job Openings: 17,300
2023 to 2033
Minnesota
28%
Projected Annual Job Openings: 280
2022 to 2032
My Next Move provides career outlook designations that include Bright, Average, or Below Average. Bright Outlook occupations are expected to grow rapidly in the next several years, will have large numbers of job openings, or are new and emerging occupations.
Occupation outlook data come from O*NET Bright Outlook occupations (www.onetonline.org/find/bright) and My Next Move career outlook designations (www.onetcenter.org/bright/current/mnm_outlook.html). Note this information is only available at a national level, so even if you selected a state, you’ll see this information for the whole country. Current as of November 2024.
Employment Numbers for Information Security Analysts
the United States
Estimated Employment:
180,700
Minnesota
Estimated Employment:
2,910
My Next Move provides career outlook designations that include Bright, Average, or Below Average. Bright Outlook occupations are expected to grow rapidly in the next several years, will have large numbers of job openings, or are new and emerging occupations.
Occupation outlook data come from O*NET Bright Outlook occupations (www.onetonline.org/find/bright) and My Next Move career outlook designations (www.onetcenter.org/bright/current/mnm_outlook.html). Note this information is only available at a national level, so even if you selected a state, you’ll see this information for the whole country. Current as of November 2024.
Alternative Job Titles for Information Security Analysts
- Information Security Officer
- Information Security Specialist
- Information Systems Security Analyst
- Information Systems Security Officer (ISSO)
- Information Technology Security Analyst (IT Security Analyst)
- Network Security Analyst
- Security Analyst
- Systems Analyst
The O*NET database contains a rich set of variables that describe work and worker characteristics, including skill requirements.
Occupation data (titles, sample titles, descriptions, daily work activities, knowledge, skills, abilities, tasks, related occupations, technologies and tools, and work values) come from the O*NET 29.0 Database (www.onetcenter.org/database.html) by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 (creativecommons.org/licenses/by/4.0/) license. O*NET® is a trademark of USDOL/ETA. Current as of October 2024.
Job Tasks and Activities for Information Security Analysts
- Collaborate with others to resolve information technology issues.
- Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
- Coordinate implementation of computer system plan with establishment personnel and outside vendors.
- Coordinate project activities with other personnel or departments.
- Develop computer or information security policies or procedures.
- Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
- Document computer security and emergency measures policies, procedures, and tests.
- Document operational procedures.
- Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
- Implement security measures for computer or information systems.
- Modify computer security files to incorporate new software, correct errors, or change individual access status.
- Monitor current reports of computer viruses to determine when to update virus protection systems.
- Monitor the security of digital information.
- Monitor use of data files and regulate access to safeguard information in computer files.
- Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
- Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
- Test computer system operations to ensure proper functioning.
- Train others in computer interface or software use.
- Train users and promote security awareness to ensure system security and to improve server and network efficiency.
- Troubleshoot issues with computer applications or systems.
- Update knowledge about emerging industry or technology trends.
The O*NET database contains a rich set of variables that describe work and worker characteristics, including skill requirements.
Occupation data (titles, sample titles, descriptions, daily work activities, knowledge, skills, abilities, tasks, related occupations, technologies and tools, and work values) come from the O*NET 29.0 Database (www.onetcenter.org/database.html) by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 (creativecommons.org/licenses/by/4.0/) license. O*NET® is a trademark of USDOL/ETA. Current as of October 2024.
Interests for Information Security Analysts
- Conventional
Following procedures and regulations to organize information or data, typically in a business setting. - Investigative
Studying and researching scientific subjects and human behavior.
The O*NET database contains a rich set of variables that describe work and worker characteristics, including skill requirements.
Occupation data (titles, sample titles, descriptions, daily work activities, knowledge, skills, abilities, tasks, related occupations, technologies and tools, and work values) come from the O*NET 29.0 Database (www.onetcenter.org/database.html) by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 (creativecommons.org/licenses/by/4.0/) license. O*NET® is a trademark of USDOL/ETA. Current as of October 2024.
Skills for Information Security Analysts
In order of importance
- Reading Comprehension
Reading work-related information.
Importance: 75/100 - Critical Thinking
Thinking about the pros and cons of different ways to solve a problem.
Importance: 72/100 - Complex Problem Solving
Noticing a problem and figuring out the best way to solve it.
Importance: 69/100 - Active Listening
Listening to others, not interrupting, and asking good questions.
Importance: 69/100 - Speaking
Talking to others.
Importance: 66/100 - Writing
Writing things for co-workers or customers.
Importance: 63/100 - Systems Analysis
Figuring out how a system should work and how changes in the future will affect it.
Importance: 60/100 - Judgment and Decision Making
Thinking about the pros and cons of different options and picking the best one.
Importance: 60/100 - Monitoring
Keeping track of how well people and/or groups are doing in order to make improvements.
Importance: 60/100 - Active Learning
Figuring out how to use new ideas or things.
Importance: 56/100 - Time Management
Managing your time and the time of other people.
Importance: 53/100 - Operations Monitoring
Watching gauges, dials, or display screens to make sure a machine is working.
Importance: 50/100 - Systems Evaluation
Measuring how well a system is working and how to improve it.
Importance: 50/100 - Coordination
Changing what is done based on other people's actions.
Importance: 50/100 - Quality Control Analysis
Testing how well a product or service works.
Importance: 50/100 - Management of Personnel Resources
Selecting and managing the best workers for a job.
Importance: 47/100 - Learning Strategies
Using the best training or teaching strategies for learning new things.
Importance: 47/100 - Service Orientation
Looking for ways to help people.
Importance: 47/100 - Instructing
Teaching people how to do something.
Importance: 47/100 - Social Perceptiveness
Understanding people's reactions.
Importance: 44/100 - Programming
Writing computer programs.
Importance: 41/100 - Persuasion
Talking people into changing their minds or their behavior.
Importance: 41/100 - Negotiation
Bringing people together to solve differences.
Importance: 41/100 - Operations Analysis
Figuring out what a product or service needs to be able to do.
Importance: 38/100 - Mathematics
Using math to solve problems.
Importance: 31/100 - Troubleshooting
Figuring out what is causing equipment, machines, wiring, or computer programs to not work.
Importance: 28/100 - Technology Design
Making equipment and technology useful for customers.
Importance: 28/100 - Science
Using scientific rules and strategies to solve problems.
Importance: 22/100 - Management of Financial Resources
Making spending decisions and keeping track of what is spent.
Importance: 19/100 - Operation and Control
Using equipment or systems.
Importance: 19/100 - Equipment Selection
Deciding what kind of tools and equipment are needed to do a job.
Importance: 19/100 - Management of Material Resources
Managing equipment and materials.
Importance: 19/100 - Repairing
Repairing machines or systems using the right tools.
Importance: 16/100 - Equipment Maintenance
Planning and doing the basic maintenance on equipment.
Importance: 16/100 - Installation
Installing equipment, machines, wiring, or computer programs.
Importance: 13/100
The O*NET database contains a rich set of variables that describe work and worker characteristics, including skill requirements.
Occupation data (titles, sample titles, descriptions, daily work activities, knowledge, skills, abilities, tasks, related occupations, technologies and tools, and work values) come from the O*NET 29.0 Database (www.onetcenter.org/database.html) by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 (creativecommons.org/licenses/by/4.0/) license. O*NET® is a trademark of USDOL/ETA. Current as of October 2024.
Knowledge for Information Security Analysts
In order of importance
- Computers and Electronics
Knowledge of circuit boards, processors, chips, electronic equipment, and computer hardware and software, including applications and programming.
Importance: 84/100 - English Language
Knowledge of the structure and content of the English language including the meaning and spelling of words, rules of composition, and grammar.
Importance: 82/100 - Administration and Management
Knowledge of business and management principles involved in strategic planning, resource allocation, human resources modeling, leadership technique, production methods, and coordination of people and resources.
Importance: 67/100 - Engineering and Technology
Knowledge of the practical application of engineering science and technology. This includes applying principles, techniques, procedures, and equipment to the design and production of various goods and services.
Importance: 66/100 - Telecommunications
Knowledge of transmission, broadcasting, switching, control, and operation of telecommunications systems.
Importance: 66/100 - Customer and Personal Service
Knowledge of principles and processes for providing customer and personal services. This includes customer needs assessment, meeting quality standards for services, and evaluation of customer satisfaction.
Importance: 61/100 - Public Safety and Security
Knowledge of relevant equipment, policies, procedures, and strategies to promote effective local, state, or national security operations for the protection of people, data, property, and institutions.
Importance: 57/100 - Education and Training
Knowledge of principles and methods for curriculum and training design, teaching and instruction for individuals and groups, and the measurement of training effects.
Importance: 55/100 - Mathematics
Knowledge of arithmetic, algebra, geometry, calculus, statistics, and their applications.
Importance: 47/100 - Communications and Media
Knowledge of media production, communication, and dissemination techniques and methods. This includes alternative ways to inform and entertain via written, oral, and visual media.
Importance: 45/100 - Law and Government
Knowledge of laws, legal codes, court procedures, precedents, government regulations, executive orders, agency rules, and the democratic political process.
Importance: 43/100 - Administrative
Knowledge of administrative and office procedures and systems such as word processing, managing files and records, stenography and transcription, designing forms, and workplace terminology.
Importance: 42/100 - Personnel and Human Resources
Knowledge of principles and procedures for personnel recruitment, selection, training, compensation and benefits, labor relations and negotiation, and personnel information systems.
Importance: 36/100 - Production and Processing
Knowledge of raw materials, production processes, quality control, costs, and other techniques for maximizing the effective manufacture and distribution of goods.
Importance: 35/100 - Design
Knowledge of design techniques, tools, and principles involved in production of precision technical plans, blueprints, drawings, and models.
Importance: 35/100 - Economics and Accounting
Knowledge of economic and accounting principles and practices, the financial markets, banking, and the analysis and reporting of financial data.
Importance: 32/100 - Psychology
Knowledge of human behavior and performance; individual differences in ability, personality, and interests; learning and motivation; psychological research methods; and the assessment and treatment of behavioral and affective disorders.
Importance: 27/100 - Sociology and Anthropology
Knowledge of group behavior and dynamics, societal trends and influences, human migrations, ethnicity, cultures, and their history and origins.
Importance: 18/100 - Mechanical
Knowledge of machines and tools, including their designs, uses, repair, and maintenance.
Importance: 17/100 - Geography
Knowledge of principles and methods for describing the features of land, sea, and air masses, including their physical characteristics, locations, interrelationships, and distribution of plant, animal, and human life.
Importance: 15/100 - Transportation
Knowledge of principles and methods for moving people or goods by air, rail, sea, or road, including the relative costs and benefits.
Importance: 15/100 - Sales and Marketing
Knowledge of principles and methods for showing, promoting, and selling products or services. This includes marketing strategy and tactics, product demonstration, sales techniques, and sales control systems.
Importance: 13/100 - Building and Construction
Knowledge of materials, methods, and the tools involved in the construction or repair of houses, buildings, or other structures such as highways and roads.
Importance: 9/100 - Physics
Knowledge and prediction of physical principles, laws, their interrelationships, and applications to understanding fluid, material, and atmospheric dynamics, and mechanical, electrical, atomic and sub-atomic structures and processes.
Importance: 9/100 - Foreign Language
Knowledge of the structure and content of a foreign (non-English) language including the meaning and spelling of words, rules of composition and grammar, and pronunciation.
Importance: 8/100 - Chemistry
Knowledge of the chemical composition, structure, and properties of substances and of the chemical processes and transformations that they undergo. This includes uses of chemicals and their interactions, danger signs, production techniques, and disposal methods.
Importance: 6/100 - Philosophy and Theology
Knowledge of different philosophical systems and religions. This includes their basic principles, values, ethics, ways of thinking, customs, practices, and their impact on human culture.
Importance: 5/100 - Therapy and Counseling
Knowledge of principles, methods, and procedures for diagnosis, treatment, and rehabilitation of physical and mental dysfunctions, and for career counseling and guidance.
Importance: 3/100 - History and Archeology
Knowledge of historical events and their causes, indicators, and effects on civilizations and cultures.
Importance: 3/100 - Medicine and Dentistry
Knowledge of the information and techniques needed to diagnose and treat human injuries, diseases, and deformities. This includes symptoms, treatment alternatives, drug properties and interactions, and preventive health-care measures.
Importance: 2/100 - Fine Arts
Knowledge of the theory and techniques required to compose, produce, and perform works of music, dance, visual arts, drama, and sculpture.
Importance: 1/100 - Food Production
Knowledge of techniques and equipment for planting, growing, and harvesting food products (both plant and animal) for consumption, including storage/handling techniques.
Importance: 1/100 - Biology
Knowledge of plant and animal organisms, their tissues, cells, functions, interdependencies, and interactions with each other and the environment.
Importance: 1/100
The O*NET database contains a rich set of variables that describe work and worker characteristics, including skill requirements.
Occupation data (titles, sample titles, descriptions, daily work activities, knowledge, skills, abilities, tasks, related occupations, technologies and tools, and work values) come from the O*NET 29.0 Database (www.onetcenter.org/database.html) by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 (creativecommons.org/licenses/by/4.0/) license. O*NET® is a trademark of USDOL/ETA. Current as of October 2024.
Physical Abilities for Information Security Analysts
In order of importance
- Inductive Reasoning
Making general rules or coming up with answers from lots of detailed information.
Importance: 75/100 - Written Comprehension
Reading and understanding what is written.
Importance: 75/100 - Oral Comprehension
Listening and understanding what people say.
Importance: 75/100 - Deductive Reasoning
Using rules to solve problems.
Importance: 75/100 - Problem Sensitivity
Noticing when problems happen.
Importance: 75/100 - Information Ordering
Ordering or arranging things.
Importance: 72/100 - Written Expression
Communicating by writing.
Importance: 72/100 - Near Vision
Seeing details up close.
Importance: 69/100 - Oral Expression
Communicating by speaking.
Importance: 69/100 - Category Flexibility
Grouping things in different ways.
Importance: 63/100 - Speech Clarity
Speaking clearly.
Importance: 60/100 - Flexibility of Closure
Seeing hidden patterns.
Importance: 60/100 - Speech Recognition
Recognizing spoken words.
Importance: 60/100 - Selective Attention
Paying attention to something without being distracted.
Importance: 53/100 - Fluency of Ideas
Coming up with lots of ideas.
Importance: 50/100 - Originality
Creating new and original ideas.
Importance: 50/100 - Perceptual Speed
Quickly comparing groups of letters, numbers, pictures, or other things.
Importance: 50/100 - Speed of Closure
Quickly knowing what you are looking at.
Importance: 47/100 - Time Sharing
Doing two or more things at the same time.
Importance: 44/100 - Far Vision
Seeing details that are far away.
Importance: 44/100 - Mathematical Reasoning
Choosing the right type of math to solve a problem.
Importance: 44/100 - Visualization
Imagining how something will look after it is moved around or changed.
Importance: 44/100 - Finger Dexterity
Putting together small parts with your fingers.
Importance: 35/100 - Number Facility
Adding, subtracting, multiplying, or dividing.
Importance: 31/100 - Memorization
Remembering words, numbers, pictures, or steps.
Importance: 31/100 - Visual Color Discrimination
Noticing the difference between colors, including shades and brightness.
Importance: 28/100 - Arm-Hand Steadiness
Keeping your arm or hand steady.
Importance: 25/100 - Hearing Sensitivity
Telling the difference between sounds.
Importance: 22/100 - Control Precision
Quickly changing the controls of a machine, car, truck or boat.
Importance: 22/100 - Manual Dexterity
Holding or moving items with your hands.
Importance: 22/100 - Auditory Attention
Paying attention to one sound while there are other distracting sounds.
Importance: 19/100 - Depth Perception
Deciding which thing is closer or farther away from you, or deciding how far away it is from you.
Importance: 19/100 - Trunk Strength
Using your lower back and stomach.
Importance: 16/100 - Extent Flexibility
Bending, stretching, twisting, or reaching with your body, arms, and/or legs.
Importance: 16/100 - Dynamic Strength
Exercising for a long time without your muscles getting tired.
Importance: 10/100 - Wrist-Finger Speed
Making fast, simple, repeated movements of your fingers, hands, and wrists.
Importance: 10/100 - Response Orientation
Quickly deciding if you should move your hand, foot, or other body part.
Importance: 3/100 - Stamina
Exercising for a long time without getting out of breath.
Importance: 3/100
The O*NET database contains a rich set of variables that describe work and worker characteristics, including skill requirements.
Occupation data (titles, sample titles, descriptions, daily work activities, knowledge, skills, abilities, tasks, related occupations, technologies and tools, and work values) come from the O*NET 29.0 Database (www.onetcenter.org/database.html) by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 (creativecommons.org/licenses/by/4.0/) license. O*NET® is a trademark of USDOL/ETA. Current as of October 2024.
Tools and Technology used by Information Security Analysts
- Network analyzers
- Mainframe computers
- Notebook computers
- Desktop computers
- Protocol analyzers
- Web platform development software
- AJAX
- Apache Struts
- Apache Tomcat
- Django
- Drupal
- Enterprise JavaBeans
- Extensible hypertext markup language XHTML
- Google Angular
- Hypertext markup language HTML
- JavaScript
- JavaScript Object Notation JSON
- LAMP Stack
- Microsoft ASP.NET
- Microsoft Active Server Pages ASP
- Node.js
- Oracle JavaServer Pages JSP
- PHP
- Ruby on Rails
- Spring Framework
- Data base user interface and query software
- Amazon Elastic Compute Cloud EC2
- Amazon Redshift
- Amazon Web Services AWS software
- Blackboard software
- Microsoft Access
- Microsoft SQL Server
- Oracle Database
- Oracle JDBC
- Structured query language SQL
- Transaction security and virus protection software
- Anti-Trojan software
- Anti-phishing software
- Anti-spyware software
- Check Point Next Generation Secure Web Gateway
- End-to-end encryption software
- HP WebInspect
- Honeypot
- Link encryption software
- McAfee
- McAfee VirusScan
- Metasploit
- Norton AntiVirus
- NortonLifeLock cybersecurity software
- Password cracker software
- Penetration testing software
- Ping Identity
- Portswigger BurP Suite
- Program checksumming software
- Rapid7 Nexpose
- Root kit detection software
- Secure internet filtering software
- Security risk assessment software
- Stack smashing protection SSP software
- Symantec Endpoint Protection
- Tenable Nessus
- Virus scanning software
- Network monitoring software
- AccessData FTK
- Automated audit trail analysis software
- Automated media tracking software
- Ethereal
- Guidance Software EnCase Forensic
- IBM QRadar SIEM
- Integrity verification software
- Keystroke monitoring software
- Micro Focus OpenView
- Nagios
- Network intrusion prevention systems NIPS
- Network, hardware, and software auditing software
- Oracle Net Manager
- Quest BigBrother
- Sniffer Investigator
- Snort
- Symantec Blue Coat Data Loss Prevention
- Tcpdump
- Wireshark
- Development environment software
- Adobe ActionScript
- Apache Ant
- Apache Kafka
- Apache Maven
- C
- Common business oriented language COBOL
- Eclipse IDE
- Go
- Integrated development environment IDE software
- Microsoft .NET Framework
- Microsoft Azure software
- Microsoft PowerShell
- Microsoft Visual Basic
- Microsoft Visual Basic Scripting Edition VBScript
- Microsoft Visual Basic for Applications VBA
- Microsoft Visual Studio
- National Instruments LabVIEW
- Ruby
- Operating system software
- Apple macOS
- Bash
- Hewlett Packard HP-UX
- Job control language JCL
- KornShell
- Linux
- Microsoft Hyper-V Server
- Microsoft Windows
- Microsoft Windows Server
- Operating system software
- Oracle Solaris
- Red Hat Enterprise Linux
- Shell script
- UNIX
- UNIX Shell
- Ubuntu
- Data base management system software
- Amazon DynamoDB
- Apache Cassandra
- Apache Hadoop
- Apache Hive
- Apache Pig
- Apache Solr
- Elasticsearch
- MongoDB
- MySQL
- NoSQL
- Oracle PL/SQL
- Relational database management software
- Teradata Database
- Object or component oriented development software
- Advanced business application programming ABAP
- Apache Groovy
- C#
- C++
- Objective C
- Oracle Java
- Perl
- Python
- Scala
- Swift
- Network security and virtual private network VPN equipment software
- Cryptographic key management software
- Firewall software
- Imperva SecureSphere
- IpFilter
- IpTables
- Juniper Networks NetScreen-Security Manager
- Palo Alto Networks Next-Generation Security Platform
- Trend Micro TippingPoint
- Virtual private networking VPN software
- Network security or virtual private network VPN management software
- HP Fortify
- ISS RealSecure
- Intrusion detection system IDS
- Intrusion prevention system IPS
- Network and system vulnerability assessment software
- Network security auditing software
- Security incident management software
- Websense Data Loss Prevention
- Business intelligence and data analysis software
- Apache Spark
- IBM Cognos Impromptu
- MicroStrategy
- Oracle Business Intelligence Enterprise Edition
- Qlik Tech QlikView
- Tableau
- Enterprise resource planning ERP software
- Microsoft Dynamics
- Oracle Fusion Applications
- Oracle Hyperion
- Oracle JD Edwards EnterpriseOne
- Oracle PeopleSoft
- Oracle PeopleSoft Financials
- SAP software
- Configuration management software
- Automated installation software
- Chef
- Patch and update management software
- Perforce Helix software
- Puppet
- Internet directory services software
- Active directory software
- Berkeley Internet Domain Name BIND
- Domain name system DNS
- Microsoft Active Directory
- Network directory services software
- Application server software
- Docker
- GitHub
- Oracle WebLogic Server
- Red Hat OpenShift
- Red Hat WildFly
- Authentication server software
- Diameter
- IBM Tivoli Identity Management TIM
- Password management software
- Remote authentication dial-in user service RADIUS software
- Enterprise application integration software
- Atlassian Bamboo
- Extensible markup language XML
- Microsoft SQL Server Integration Services SSIS
- Oracle Fusion Middleware
- Program testing software
- Conformance and validation testing software
- Kali Linux
- Selenium
- System testing software
- Access software
- Access management software
- Citrix cloud computing software
- IBM Tivoli Access Management TAM
- File versioning software
- Apache Subversion SVN
- Git
- WinMerge
- Backup or archival software
- Backup and archival software
- System and data disaster recovery software
- Veritas NetBackup
- Cloud-based management software
- Amazon Web Services AWS CloudFormation
- IBM WebSphere
- Splunk Enterprise
- Project management software
- Atlassian Confluence
- Microsoft Project
- Microsoft Teams
- Geographic information system
- ESRI ArcGIS software
- Geographic information system GIS software
- Electronic mail software
- IBM Notes
- Microsoft Exchange
- Word processing software
- 3M Post-it App
- Microsoft Word
- Financial analysis software
- Delphi Technology
- Oracle E-Business Suite Financials
- Data base reporting software
- Microsoft SQL Server Reporting Services SSRS
- SAP Crystal Reports
- Analytical or scientific software
- SAS
- The MathWorks MATLAB
- Spreadsheet software
- Microsoft Excel
- Medical software
- Epic Systems
- Risk management data and analysis software
- ArcSight Enterprise Threat and Risk Management
- Filesystem software
- Computer forensic software
- Content workflow software
- Atlassian JIRA
- Enterprise system management software
- IBM Power Systems software
- Object oriented data base management software
- PostgreSQL
- Expert system software
- Ansible software
- Point of sale POS software
- Smart card management software
- Clustering software
- VMware
- Desktop communications software
- Secure shell SSH software
- Communications server software
- IBM Domino
- Portal server software
- Apache HTTP Server
- Customer relationship management CRM software
- Salesforce software
- Transaction server software
- Customer information control system CICS
- Office suite software
- Microsoft Office software
- Cloud-based data access and sharing software
- Microsoft SharePoint
- Instant messaging software
- Blink
- Administration software
- Cisco Systems CiscoWorks
- Human resources software
- Human resource management software HRMS
- Internet protocol IP multimedia subsystem software
- Voice over internet protocol VoIP system software
- Presentation software
- Microsoft PowerPoint
- Cloud-based protection or security software
- Qualys Cloud Platform
- Web page creation and editing software
- Google Sites
- Requirements analysis and system architecture software
- Unified modeling language UML
- Storage networking software
- Amazon Simple Storage Service S3
- Industrial control software
- Supervisory control and data acquisition SCADA software
- Switch or router software
- Border Gateway Protocol BGP
- Process mapping and design software
- Microsoft Visio
- Information retrieval or search software
- LexisNexis
- License management software
- License management software
The O*NET database contains a rich set of variables that describe work and worker characteristics, including skill requirements.
Occupation data (titles, sample titles, descriptions, daily work activities, knowledge, skills, abilities, tasks, related occupations, technologies and tools, and work values) come from the O*NET 29.0 Database (www.onetcenter.org/database.html) by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 (creativecommons.org/licenses/by/4.0/) license. O*NET® is a trademark of USDOL/ETA. Current as of October 2024.
Employment Industries for Information Security Analysts
- Computer systems design and related services
39,800 employed - Management of companies and enterprises
15,200 employed - Credit intermediation and related activities (5221,3)
12,900 employed - Management, scientific, and technical consulting services
11,100 employed - Accounting, tax preparation, bookkeeping, and payroll services
9,800 employed - Research and development in the physical, engineering, and life sciences
7,600 employed - Computing infrastructure providers, data processing, web hosting, and related services
6,200 employed - Engineering services
5,500 employed - Software publishers
4,500 employed - Telecommunications
3,900 employed
The O*NET database contains a rich set of variables that describe work and worker characteristics, including skill requirements.
Occupation data (titles, sample titles, descriptions, daily work activities, knowledge, skills, abilities, tasks, related occupations, technologies and tools, and work values) come from the O*NET 29.0 Database (www.onetcenter.org/database.html) by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 (creativecommons.org/licenses/by/4.0/) license. O*NET® is a trademark of USDOL/ETA. Current as of October 2024.
Career Information Datasources for Information Security Analysts
- Wages by occupation
U.S. Department of Labor, Bureau of Labor Statistics, Occupational Employment and Wage Statistics program
The Occupational Employment and Wage Statistics (OEWS) program produces employment and wage estimates annually for over 800 occupations. These estimates are available for the nation as a whole, for individual states, and for metropolitan and nonmetropolitan areas; national occupational estimates for specific industries are also available. Current as of May 2024. - Education and training assignments
U.S Department of Labor, Employment Projections, Education and Training Data, Education and training assignments by detailed occupation
BLS provides information about education and training requirements for hundreds of occupations. In the education and training system, each of the occupations for which the office publishes projections data is assigned separate categories for education, work experience, and on-the-job training. Current as of September 2024. - Occupation data
O*NET at the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA)
The O*NET database contains a rich set of variables that describe work and worker characteristics, including skill requirements. Current as of October 2024. - Occupation outlook
O*NET at the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA)
My Next Move provides career outlook designations that include Bright, Average, or Below Average. Bright Outlook occupations are expected to grow rapidly in the next several years, will have large numbers of job openings, or are new and emerging occupations. Current as of November 2024. - Career videos
Career videos were developed by CareerOneStop.org
Explore our collection of videos on hundreds of different careers. Career videos are organized into 16 clusters, or related types of work. Select a category to view a list of videos related to that cluster. Videos include career details such as tasks, work settings, education needed, and more. Current as of rolling. - Educational attainment, typical education of current workers
USDOL’s Bureau of Labor Statistics, Employment Projections program, Education and Training Data,
BLS provides information about education and training requirements for hundreds of occupations. Educational attainment data for each occupation show the level of education achieved by current workers. Current as of September 2024.
Below you will find the Career Field and Career Cluster that this program is related to. Learn more about if this career area fits your interests!
Is Computer Science and Information Technology right for you?
Information technology workers are in a growing and always changing field. You might work with computer hardware, software, multimedia, or network systems. You might design new computer equipment or work on a new computer game.
Plan Your Education
The Cyber Defense Program Guide is a tool to help you map out how to successfully get your degree at Lake Superior College.
View approximate total tuition and fees for MN residents to complete this degree.
This program may be completed in 1 year if prerequisites are complete.
Skills and Knowledge
- Learn the OSI Reference Model
- Manage Cisco router hardware and the Cisco Internet Operating System
- Analyze organization network needs and implement networks
- Describe and identify common security threats and attacks
- Apply a common ethical hacking methodology for penetration tests
Center for Cybersecurity
The LSC Center for Cybersecurity was established to provide a broad range of system security and information assurance services for local businesses and the community at large. The Center will provide students with real-world learning experiences in cybersecurity education through several business and government partnerships.