Learn more about this program at the next Business, Technology and Trades Open House Notify me of the next Open House

Cyber Defense

  • Certificate
  • 30 credits
  • 1 Year
  • Delivery Method: Hybrid

Why Study Cyber Defense at LSC?

This 30-credit certificate is designed to prepare students for a career in computer and networking security. The program will help prepare students for the following certifications: CompTIA Net+, CompTIA Security+ and EC-Council Certified Ethical Hacker (CEH). This program also transfers into LSC’s Network Administration and Cybersecurity diploma and AAS degrees.

View Catalog

Career Information

Information Security Analysts Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.

$124K

$59/hr

Median annual salary/wage for
Information Security Analysts
in Minnesota

Details

33%

Projected job growth
in the next decade

Details

181K

Information Security Analysts are currently employed

Details

This data is delivered by an API from CareerOneStop, sponsored by U.S. Department of Labor, Employment and Training Administration. www.careeronestop.org Find more information including data update schedules at CareerOneStop's Data Sources (https://www.careeronestop.org/Help/data-sources.aspx). Full list of datasources.

Close Dialog

Median Annual Salary/Wage Earnings for Information Security Analysts

the United States

$120K
$57/hr

$69K - $182K

$33/hr - $87/hr

Minnesota

$124K
$59/hr

$77K - $168K

$37/hr - $80/hr

Duluth, MN Area

$109K
$52/hr

$75K - $158K

$36/hr - $75/hr

The Occupational Employment and Wage Statistics (OEWS) program produces employment and wage estimates annually for over 800 occupations. These estimates are available for the nation as a whole, for individual states, and for metropolitan and nonmetropolitan areas; national occupational estimates for specific industries are also available.

Salary data are from U.S. Department of Labor, Bureau of Labor Statistics, Occupational Employment and Wage Statistics (OEWS) program (www.bls.gov/oes/). Current as of May 2024.

Close Dialog

Projected 10-Year Job Growth for Information Security Analysts

Rapid Growth
Outlook: Bright

the United States

33%

Projected Annual Job Openings: 17,300

2023 to 2033

Minnesota

28%

Projected Annual Job Openings: 280

2022 to 2032

My Next Move provides career outlook designations that include Bright, Average, or Below Average. Bright Outlook occupations are expected to grow rapidly in the next several years, will have large numbers of job openings, or are new and emerging occupations.

Occupation outlook data come from O*NET Bright Outlook occupations (www.onetonline.org/find/bright) and My Next Move career outlook designations (www.onetcenter.org/bright/current/mnm_outlook.html). Note this information is only available at a national level, so even if you selected a state, you’ll see this information for the whole country. Current as of November 2024.

Close Dialog

Employment Numbers for Information Security Analysts

the United States

Estimated Employment:

180,700

Minnesota

Estimated Employment:

2,910

My Next Move provides career outlook designations that include Bright, Average, or Below Average. Bright Outlook occupations are expected to grow rapidly in the next several years, will have large numbers of job openings, or are new and emerging occupations.

Occupation outlook data come from O*NET Bright Outlook occupations (www.onetonline.org/find/bright) and My Next Move career outlook designations (www.onetcenter.org/bright/current/mnm_outlook.html). Note this information is only available at a national level, so even if you selected a state, you’ll see this information for the whole country. Current as of November 2024.

Close Dialog

Alternative Job Titles for Information Security Analysts

  • Information Security Officer
  • Information Security Specialist
  • Information Systems Security Analyst
  • Information Systems Security Officer (ISSO)
  • Information Technology Security Analyst (IT Security Analyst)
  • Network Security Analyst
  • Security Analyst
  • Systems Analyst

The O*NET database contains a rich set of variables that describe work and worker characteristics, including skill requirements.

Occupation data (titles, sample titles, descriptions, daily work activities, knowledge, skills, abilities, tasks, related occupations, technologies and tools, and work values) come from the O*NET 29.0 Database (www.onetcenter.org/database.html) by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 (creativecommons.org/licenses/by/4.0/) license. O*NET® is a trademark of USDOL/ETA. Current as of October 2024.

Close Dialog

Job Tasks and Activities for Information Security Analysts

  • Collaborate with others to resolve information technology issues.
  • Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
  • Coordinate implementation of computer system plan with establishment personnel and outside vendors.
  • Coordinate project activities with other personnel or departments.
  • Develop computer or information security policies or procedures.
  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Document computer security and emergency measures policies, procedures, and tests.
  • Document operational procedures.
  • Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
  • Implement security measures for computer or information systems.
  • Modify computer security files to incorporate new software, correct errors, or change individual access status.
  • Monitor current reports of computer viruses to determine when to update virus protection systems.
  • Monitor the security of digital information.
  • Monitor use of data files and regulate access to safeguard information in computer files.
  • Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
  • Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
  • Test computer system operations to ensure proper functioning.
  • Train others in computer interface or software use.
  • Train users and promote security awareness to ensure system security and to improve server and network efficiency.
  • Troubleshoot issues with computer applications or systems.
  • Update knowledge about emerging industry or technology trends.

The O*NET database contains a rich set of variables that describe work and worker characteristics, including skill requirements.

Occupation data (titles, sample titles, descriptions, daily work activities, knowledge, skills, abilities, tasks, related occupations, technologies and tools, and work values) come from the O*NET 29.0 Database (www.onetcenter.org/database.html) by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 (creativecommons.org/licenses/by/4.0/) license. O*NET® is a trademark of USDOL/ETA. Current as of October 2024.

Close Dialog

Interests for Information Security Analysts

  • Conventional
    Following procedures and regulations to organize information or data, typically in a business setting.
  • Investigative
    Studying and researching scientific subjects and human behavior.

The O*NET database contains a rich set of variables that describe work and worker characteristics, including skill requirements.

Occupation data (titles, sample titles, descriptions, daily work activities, knowledge, skills, abilities, tasks, related occupations, technologies and tools, and work values) come from the O*NET 29.0 Database (www.onetcenter.org/database.html) by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 (creativecommons.org/licenses/by/4.0/) license. O*NET® is a trademark of USDOL/ETA. Current as of October 2024.

Close Dialog

Skills for Information Security Analysts

In order of importance

  • Reading Comprehension
    Reading work-related information.
    Importance: 75/100
  • Critical Thinking
    Thinking about the pros and cons of different ways to solve a problem.
    Importance: 72/100
  • Complex Problem Solving
    Noticing a problem and figuring out the best way to solve it.
    Importance: 69/100
  • Active Listening
    Listening to others, not interrupting, and asking good questions.
    Importance: 69/100
  • Speaking
    Talking to others.
    Importance: 66/100
  • Writing
    Writing things for co-workers or customers.
    Importance: 63/100
  • Systems Analysis
    Figuring out how a system should work and how changes in the future will affect it.
    Importance: 60/100
  • Judgment and Decision Making
    Thinking about the pros and cons of different options and picking the best one.
    Importance: 60/100
  • Monitoring
    Keeping track of how well people and/or groups are doing in order to make improvements.
    Importance: 60/100
  • Active Learning
    Figuring out how to use new ideas or things.
    Importance: 56/100
  • Time Management
    Managing your time and the time of other people.
    Importance: 53/100
  • Operations Monitoring
    Watching gauges, dials, or display screens to make sure a machine is working.
    Importance: 50/100
  • Systems Evaluation
    Measuring how well a system is working and how to improve it.
    Importance: 50/100
  • Coordination
    Changing what is done based on other people's actions.
    Importance: 50/100
  • Quality Control Analysis
    Testing how well a product or service works.
    Importance: 50/100
  • Management of Personnel Resources
    Selecting and managing the best workers for a job.
    Importance: 47/100
  • Learning Strategies
    Using the best training or teaching strategies for learning new things.
    Importance: 47/100
  • Service Orientation
    Looking for ways to help people.
    Importance: 47/100
  • Instructing
    Teaching people how to do something.
    Importance: 47/100
  • Social Perceptiveness
    Understanding people's reactions.
    Importance: 44/100
  • Programming
    Writing computer programs.
    Importance: 41/100
  • Persuasion
    Talking people into changing their minds or their behavior.
    Importance: 41/100
  • Negotiation
    Bringing people together to solve differences.
    Importance: 41/100
  • Operations Analysis
    Figuring out what a product or service needs to be able to do.
    Importance: 38/100
  • Mathematics
    Using math to solve problems.
    Importance: 31/100
  • Troubleshooting
    Figuring out what is causing equipment, machines, wiring, or computer programs to not work.
    Importance: 28/100
  • Technology Design
    Making equipment and technology useful for customers.
    Importance: 28/100
  • Science
    Using scientific rules and strategies to solve problems.
    Importance: 22/100
  • Management of Financial Resources
    Making spending decisions and keeping track of what is spent.
    Importance: 19/100
  • Operation and Control
    Using equipment or systems.
    Importance: 19/100
  • Equipment Selection
    Deciding what kind of tools and equipment are needed to do a job.
    Importance: 19/100
  • Management of Material Resources
    Managing equipment and materials.
    Importance: 19/100
  • Repairing
    Repairing machines or systems using the right tools.
    Importance: 16/100
  • Equipment Maintenance
    Planning and doing the basic maintenance on equipment.
    Importance: 16/100
  • Installation
    Installing equipment, machines, wiring, or computer programs.
    Importance: 13/100

The O*NET database contains a rich set of variables that describe work and worker characteristics, including skill requirements.

Occupation data (titles, sample titles, descriptions, daily work activities, knowledge, skills, abilities, tasks, related occupations, technologies and tools, and work values) come from the O*NET 29.0 Database (www.onetcenter.org/database.html) by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 (creativecommons.org/licenses/by/4.0/) license. O*NET® is a trademark of USDOL/ETA. Current as of October 2024.

Close Dialog

Knowledge for Information Security Analysts

In order of importance

  • Computers and Electronics
    Knowledge of circuit boards, processors, chips, electronic equipment, and computer hardware and software, including applications and programming.
    Importance: 84/100
  • English Language
    Knowledge of the structure and content of the English language including the meaning and spelling of words, rules of composition, and grammar.
    Importance: 82/100
  • Administration and Management
    Knowledge of business and management principles involved in strategic planning, resource allocation, human resources modeling, leadership technique, production methods, and coordination of people and resources.
    Importance: 67/100
  • Engineering and Technology
    Knowledge of the practical application of engineering science and technology. This includes applying principles, techniques, procedures, and equipment to the design and production of various goods and services.
    Importance: 66/100
  • Telecommunications
    Knowledge of transmission, broadcasting, switching, control, and operation of telecommunications systems.
    Importance: 66/100
  • Customer and Personal Service
    Knowledge of principles and processes for providing customer and personal services. This includes customer needs assessment, meeting quality standards for services, and evaluation of customer satisfaction.
    Importance: 61/100
  • Public Safety and Security
    Knowledge of relevant equipment, policies, procedures, and strategies to promote effective local, state, or national security operations for the protection of people, data, property, and institutions.
    Importance: 57/100
  • Education and Training
    Knowledge of principles and methods for curriculum and training design, teaching and instruction for individuals and groups, and the measurement of training effects.
    Importance: 55/100
  • Mathematics
    Knowledge of arithmetic, algebra, geometry, calculus, statistics, and their applications.
    Importance: 47/100
  • Communications and Media
    Knowledge of media production, communication, and dissemination techniques and methods. This includes alternative ways to inform and entertain via written, oral, and visual media.
    Importance: 45/100
  • Law and Government
    Knowledge of laws, legal codes, court procedures, precedents, government regulations, executive orders, agency rules, and the democratic political process.
    Importance: 43/100
  • Administrative
    Knowledge of administrative and office procedures and systems such as word processing, managing files and records, stenography and transcription, designing forms, and workplace terminology.
    Importance: 42/100
  • Personnel and Human Resources
    Knowledge of principles and procedures for personnel recruitment, selection, training, compensation and benefits, labor relations and negotiation, and personnel information systems.
    Importance: 36/100
  • Production and Processing
    Knowledge of raw materials, production processes, quality control, costs, and other techniques for maximizing the effective manufacture and distribution of goods.
    Importance: 35/100
  • Design
    Knowledge of design techniques, tools, and principles involved in production of precision technical plans, blueprints, drawings, and models.
    Importance: 35/100
  • Economics and Accounting
    Knowledge of economic and accounting principles and practices, the financial markets, banking, and the analysis and reporting of financial data.
    Importance: 32/100
  • Psychology
    Knowledge of human behavior and performance; individual differences in ability, personality, and interests; learning and motivation; psychological research methods; and the assessment and treatment of behavioral and affective disorders.
    Importance: 27/100
  • Sociology and Anthropology
    Knowledge of group behavior and dynamics, societal trends and influences, human migrations, ethnicity, cultures, and their history and origins.
    Importance: 18/100
  • Mechanical
    Knowledge of machines and tools, including their designs, uses, repair, and maintenance.
    Importance: 17/100
  • Geography
    Knowledge of principles and methods for describing the features of land, sea, and air masses, including their physical characteristics, locations, interrelationships, and distribution of plant, animal, and human life.
    Importance: 15/100
  • Transportation
    Knowledge of principles and methods for moving people or goods by air, rail, sea, or road, including the relative costs and benefits.
    Importance: 15/100
  • Sales and Marketing
    Knowledge of principles and methods for showing, promoting, and selling products or services. This includes marketing strategy and tactics, product demonstration, sales techniques, and sales control systems.
    Importance: 13/100
  • Building and Construction
    Knowledge of materials, methods, and the tools involved in the construction or repair of houses, buildings, or other structures such as highways and roads.
    Importance: 9/100
  • Physics
    Knowledge and prediction of physical principles, laws, their interrelationships, and applications to understanding fluid, material, and atmospheric dynamics, and mechanical, electrical, atomic and sub-atomic structures and processes.
    Importance: 9/100
  • Foreign Language
    Knowledge of the structure and content of a foreign (non-English) language including the meaning and spelling of words, rules of composition and grammar, and pronunciation.
    Importance: 8/100
  • Chemistry
    Knowledge of the chemical composition, structure, and properties of substances and of the chemical processes and transformations that they undergo. This includes uses of chemicals and their interactions, danger signs, production techniques, and disposal methods.
    Importance: 6/100
  • Philosophy and Theology
    Knowledge of different philosophical systems and religions. This includes their basic principles, values, ethics, ways of thinking, customs, practices, and their impact on human culture.
    Importance: 5/100
  • Therapy and Counseling
    Knowledge of principles, methods, and procedures for diagnosis, treatment, and rehabilitation of physical and mental dysfunctions, and for career counseling and guidance.
    Importance: 3/100
  • History and Archeology
    Knowledge of historical events and their causes, indicators, and effects on civilizations and cultures.
    Importance: 3/100
  • Medicine and Dentistry
    Knowledge of the information and techniques needed to diagnose and treat human injuries, diseases, and deformities. This includes symptoms, treatment alternatives, drug properties and interactions, and preventive health-care measures.
    Importance: 2/100
  • Fine Arts
    Knowledge of the theory and techniques required to compose, produce, and perform works of music, dance, visual arts, drama, and sculpture.
    Importance: 1/100
  • Food Production
    Knowledge of techniques and equipment for planting, growing, and harvesting food products (both plant and animal) for consumption, including storage/handling techniques.
    Importance: 1/100
  • Biology
    Knowledge of plant and animal organisms, their tissues, cells, functions, interdependencies, and interactions with each other and the environment.
    Importance: 1/100

The O*NET database contains a rich set of variables that describe work and worker characteristics, including skill requirements.

Occupation data (titles, sample titles, descriptions, daily work activities, knowledge, skills, abilities, tasks, related occupations, technologies and tools, and work values) come from the O*NET 29.0 Database (www.onetcenter.org/database.html) by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 (creativecommons.org/licenses/by/4.0/) license. O*NET® is a trademark of USDOL/ETA. Current as of October 2024.

Close Dialog

Physical Abilities for Information Security Analysts

In order of importance

  • Inductive Reasoning
    Making general rules or coming up with answers from lots of detailed information.
    Importance: 75/100
  • Written Comprehension
    Reading and understanding what is written.
    Importance: 75/100
  • Oral Comprehension
    Listening and understanding what people say.
    Importance: 75/100
  • Deductive Reasoning
    Using rules to solve problems.
    Importance: 75/100
  • Problem Sensitivity
    Noticing when problems happen.
    Importance: 75/100
  • Information Ordering
    Ordering or arranging things.
    Importance: 72/100
  • Written Expression
    Communicating by writing.
    Importance: 72/100
  • Near Vision
    Seeing details up close.
    Importance: 69/100
  • Oral Expression
    Communicating by speaking.
    Importance: 69/100
  • Category Flexibility
    Grouping things in different ways.
    Importance: 63/100
  • Speech Clarity
    Speaking clearly.
    Importance: 60/100
  • Flexibility of Closure
    Seeing hidden patterns.
    Importance: 60/100
  • Speech Recognition
    Recognizing spoken words.
    Importance: 60/100
  • Selective Attention
    Paying attention to something without being distracted.
    Importance: 53/100
  • Fluency of Ideas
    Coming up with lots of ideas.
    Importance: 50/100
  • Originality
    Creating new and original ideas.
    Importance: 50/100
  • Perceptual Speed
    Quickly comparing groups of letters, numbers, pictures, or other things.
    Importance: 50/100
  • Speed of Closure
    Quickly knowing what you are looking at.
    Importance: 47/100
  • Time Sharing
    Doing two or more things at the same time.
    Importance: 44/100
  • Far Vision
    Seeing details that are far away.
    Importance: 44/100
  • Mathematical Reasoning
    Choosing the right type of math to solve a problem.
    Importance: 44/100
  • Visualization
    Imagining how something will look after it is moved around or changed.
    Importance: 44/100
  • Finger Dexterity
    Putting together small parts with your fingers.
    Importance: 35/100
  • Number Facility
    Adding, subtracting, multiplying, or dividing.
    Importance: 31/100
  • Memorization
    Remembering words, numbers, pictures, or steps.
    Importance: 31/100
  • Visual Color Discrimination
    Noticing the difference between colors, including shades and brightness.
    Importance: 28/100
  • Arm-Hand Steadiness
    Keeping your arm or hand steady.
    Importance: 25/100
  • Hearing Sensitivity
    Telling the difference between sounds.
    Importance: 22/100
  • Control Precision
    Quickly changing the controls of a machine, car, truck or boat.
    Importance: 22/100
  • Manual Dexterity
    Holding or moving items with your hands.
    Importance: 22/100
  • Auditory Attention
    Paying attention to one sound while there are other distracting sounds.
    Importance: 19/100
  • Depth Perception
    Deciding which thing is closer or farther away from you, or deciding how far away it is from you.
    Importance: 19/100
  • Trunk Strength
    Using your lower back and stomach.
    Importance: 16/100
  • Extent Flexibility
    Bending, stretching, twisting, or reaching with your body, arms, and/or legs.
    Importance: 16/100
  • Dynamic Strength
    Exercising for a long time without your muscles getting tired.
    Importance: 10/100
  • Wrist-Finger Speed
    Making fast, simple, repeated movements of your fingers, hands, and wrists.
    Importance: 10/100
  • Response Orientation
    Quickly deciding if you should move your hand, foot, or other body part.
    Importance: 3/100
  • Stamina
    Exercising for a long time without getting out of breath.
    Importance: 3/100

The O*NET database contains a rich set of variables that describe work and worker characteristics, including skill requirements.

Occupation data (titles, sample titles, descriptions, daily work activities, knowledge, skills, abilities, tasks, related occupations, technologies and tools, and work values) come from the O*NET 29.0 Database (www.onetcenter.org/database.html) by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 (creativecommons.org/licenses/by/4.0/) license. O*NET® is a trademark of USDOL/ETA. Current as of October 2024.

Close Dialog

Tools and Technology used by Information Security Analysts

  • Network analyzers
  • Mainframe computers
  • Notebook computers
  • Desktop computers
  • Protocol analyzers
  • Web platform development software
    • AJAX
    • Apache Struts
    • Apache Tomcat
    • Django
    • Drupal
    • Enterprise JavaBeans
    • Extensible hypertext markup language XHTML
    • Google Angular
    • Hypertext markup language HTML
    • JavaScript
    • JavaScript Object Notation JSON
    • LAMP Stack
    • Microsoft ASP.NET
    • Microsoft Active Server Pages ASP
    • Node.js
    • Oracle JavaServer Pages JSP
    • PHP
    • Ruby on Rails
    • Spring Framework
  • Data base user interface and query software
    • Amazon Elastic Compute Cloud EC2
    • Amazon Redshift
    • Amazon Web Services AWS software
    • Blackboard software
    • Microsoft Access
    • Microsoft SQL Server
    • Oracle Database
    • Oracle JDBC
    • Structured query language SQL
  • Transaction security and virus protection software
    • Anti-Trojan software
    • Anti-phishing software
    • Anti-spyware software
    • Check Point Next Generation Secure Web Gateway
    • End-to-end encryption software
    • HP WebInspect
    • Honeypot
    • Link encryption software
    • McAfee
    • McAfee VirusScan
    • Metasploit
    • Norton AntiVirus
    • NortonLifeLock cybersecurity software
    • Password cracker software
    • Penetration testing software
    • Ping Identity
    • Portswigger BurP Suite
    • Program checksumming software
    • Rapid7 Nexpose
    • Root kit detection software
    • Secure internet filtering software
    • Security risk assessment software
    • Stack smashing protection SSP software
    • Symantec Endpoint Protection
    • Tenable Nessus
    • Virus scanning software
  • Network monitoring software
    • AccessData FTK
    • Automated audit trail analysis software
    • Automated media tracking software
    • Ethereal
    • Guidance Software EnCase Forensic
    • IBM QRadar SIEM
    • Integrity verification software
    • Keystroke monitoring software
    • Micro Focus OpenView
    • Nagios
    • Network intrusion prevention systems NIPS
    • Network, hardware, and software auditing software
    • Oracle Net Manager
    • Quest BigBrother
    • Sniffer Investigator
    • Snort
    • Symantec Blue Coat Data Loss Prevention
    • Tcpdump
    • Wireshark
  • Development environment software
    • Adobe ActionScript
    • Apache Ant
    • Apache Kafka
    • Apache Maven
    • C
    • Common business oriented language COBOL
    • Eclipse IDE
    • Go
    • Integrated development environment IDE software
    • Microsoft .NET Framework
    • Microsoft Azure software
    • Microsoft PowerShell
    • Microsoft Visual Basic
    • Microsoft Visual Basic Scripting Edition VBScript
    • Microsoft Visual Basic for Applications VBA
    • Microsoft Visual Studio
    • National Instruments LabVIEW
    • Ruby
  • Operating system software
    • Apple macOS
    • Bash
    • Hewlett Packard HP-UX
    • Job control language JCL
    • KornShell
    • Linux
    • Microsoft Hyper-V Server
    • Microsoft Windows
    • Microsoft Windows Server
    • Operating system software
    • Oracle Solaris
    • Red Hat Enterprise Linux
    • Shell script
    • UNIX
    • UNIX Shell
    • Ubuntu
  • Data base management system software
    • Amazon DynamoDB
    • Apache Cassandra
    • Apache Hadoop
    • Apache Hive
    • Apache Pig
    • Apache Solr
    • Elasticsearch
    • MongoDB
    • MySQL
    • NoSQL
    • Oracle PL/SQL
    • Relational database management software
    • Teradata Database
  • Object or component oriented development software
    • Advanced business application programming ABAP
    • Apache Groovy
    • C#
    • C++
    • Objective C
    • Oracle Java
    • Perl
    • Python
    • Scala
    • Swift
  • Network security and virtual private network VPN equipment software
    • Cryptographic key management software
    • Firewall software
    • Imperva SecureSphere
    • IpFilter
    • IpTables
    • Juniper Networks NetScreen-Security Manager
    • Palo Alto Networks Next-Generation Security Platform
    • Trend Micro TippingPoint
    • Virtual private networking VPN software
  • Network security or virtual private network VPN management software
    • HP Fortify
    • ISS RealSecure
    • Intrusion detection system IDS
    • Intrusion prevention system IPS
    • Network and system vulnerability assessment software
    • Network security auditing software
    • Security incident management software
    • Websense Data Loss Prevention
  • Business intelligence and data analysis software
    • Apache Spark
    • IBM Cognos Impromptu
    • MicroStrategy
    • Oracle Business Intelligence Enterprise Edition
    • Qlik Tech QlikView
    • Tableau
  • Enterprise resource planning ERP software
    • Microsoft Dynamics
    • Oracle Fusion Applications
    • Oracle Hyperion
    • Oracle JD Edwards EnterpriseOne
    • Oracle PeopleSoft
    • Oracle PeopleSoft Financials
    • SAP software
  • Configuration management software
    • Automated installation software
    • Chef
    • Patch and update management software
    • Perforce Helix software
    • Puppet
  • Internet directory services software
    • Active directory software
    • Berkeley Internet Domain Name BIND
    • Domain name system DNS
    • Microsoft Active Directory
    • Network directory services software
  • Application server software
    • Docker
    • GitHub
    • Oracle WebLogic Server
    • Red Hat OpenShift
    • Red Hat WildFly
  • Authentication server software
    • Diameter
    • IBM Tivoli Identity Management TIM
    • Password management software
    • Remote authentication dial-in user service RADIUS software
  • Enterprise application integration software
    • Atlassian Bamboo
    • Extensible markup language XML
    • Microsoft SQL Server Integration Services SSIS
    • Oracle Fusion Middleware
  • Program testing software
    • Conformance and validation testing software
    • Kali Linux
    • Selenium
    • System testing software
  • Access software
    • Access management software
    • Citrix cloud computing software
    • IBM Tivoli Access Management TAM
  • File versioning software
    • Apache Subversion SVN
    • Git
    • WinMerge
  • Backup or archival software
    • Backup and archival software
    • System and data disaster recovery software
    • Veritas NetBackup
  • Cloud-based management software
    • Amazon Web Services AWS CloudFormation
    • IBM WebSphere
    • Splunk Enterprise
  • Project management software
    • Atlassian Confluence
    • Microsoft Project
    • Microsoft Teams
  • Geographic information system
    • ESRI ArcGIS software
    • Geographic information system GIS software
  • Electronic mail software
    • IBM Notes
    • Microsoft Exchange
  • Word processing software
    • 3M Post-it App
    • Microsoft Word
  • Financial analysis software
    • Delphi Technology
    • Oracle E-Business Suite Financials
  • Data base reporting software
    • Microsoft SQL Server Reporting Services SSRS
    • SAP Crystal Reports
  • Analytical or scientific software
    • SAS
    • The MathWorks MATLAB
  • Spreadsheet software
    • Microsoft Excel
  • Medical software
    • Epic Systems
  • Risk management data and analysis software
    • ArcSight Enterprise Threat and Risk Management
  • Filesystem software
    • Computer forensic software
  • Content workflow software
    • Atlassian JIRA
  • Enterprise system management software
    • IBM Power Systems software
  • Object oriented data base management software
    • PostgreSQL
  • Expert system software
    • Ansible software
  • Point of sale POS software
    • Smart card management software
  • Clustering software
    • VMware
  • Desktop communications software
    • Secure shell SSH software
  • Communications server software
    • IBM Domino
  • Portal server software
    • Apache HTTP Server
  • Customer relationship management CRM software
    • Salesforce software
  • Transaction server software
    • Customer information control system CICS
  • Office suite software
    • Microsoft Office software
  • Cloud-based data access and sharing software
    • Microsoft SharePoint
  • Instant messaging software
    • Blink
  • Administration software
    • Cisco Systems CiscoWorks
  • Human resources software
    • Human resource management software HRMS
  • Internet protocol IP multimedia subsystem software
    • Voice over internet protocol VoIP system software
  • Presentation software
    • Microsoft PowerPoint
  • Cloud-based protection or security software
    • Qualys Cloud Platform
  • Web page creation and editing software
    • Google Sites
  • Requirements analysis and system architecture software
    • Unified modeling language UML
  • Storage networking software
    • Amazon Simple Storage Service S3
  • Industrial control software
    • Supervisory control and data acquisition SCADA software
  • Switch or router software
    • Border Gateway Protocol BGP
  • Process mapping and design software
    • Microsoft Visio
  • Information retrieval or search software
    • LexisNexis
  • License management software
    • License management software

The O*NET database contains a rich set of variables that describe work and worker characteristics, including skill requirements.

Occupation data (titles, sample titles, descriptions, daily work activities, knowledge, skills, abilities, tasks, related occupations, technologies and tools, and work values) come from the O*NET 29.0 Database (www.onetcenter.org/database.html) by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 (creativecommons.org/licenses/by/4.0/) license. O*NET® is a trademark of USDOL/ETA. Current as of October 2024.

Close Dialog

Employment Industries for Information Security Analysts

  • Computer systems design and related services
    39,800 employed
  • Management of companies and enterprises
    15,200 employed
  • Credit intermediation and related activities (5221,3)
    12,900 employed
  • Management, scientific, and technical consulting services
    11,100 employed
  • Accounting, tax preparation, bookkeeping, and payroll services
    9,800 employed
  • Research and development in the physical, engineering, and life sciences
    7,600 employed
  • Computing infrastructure providers, data processing, web hosting, and related services
    6,200 employed
  • Engineering services
    5,500 employed
  • Software publishers
    4,500 employed
  • Telecommunications
    3,900 employed

The O*NET database contains a rich set of variables that describe work and worker characteristics, including skill requirements.

Occupation data (titles, sample titles, descriptions, daily work activities, knowledge, skills, abilities, tasks, related occupations, technologies and tools, and work values) come from the O*NET 29.0 Database (www.onetcenter.org/database.html) by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 (creativecommons.org/licenses/by/4.0/) license. O*NET® is a trademark of USDOL/ETA. Current as of October 2024.

Close Dialog

Career Information Datasources for Information Security Analysts

Below you will find the Career Field and Career Cluster that this program is related to. Learn more about if this career area fits your interests!

Is Computer Science and Information Technology right for you?

Information technology workers are in a growing and always changing field. You might work with computer hardware, software, multimedia, or network systems. You might design new computer equipment or work on a new computer game.

Plan Your Education

The Cyber Defense Program Guide is a tool to help you map out how to successfully get your degree at Lake Superior College.

View approximate total tuition and fees for MN residents to complete this degree.

This program may be completed in 1 year if prerequisites are complete.

Skills and Knowledge

  • Learn the OSI Reference Model
  • Manage Cisco router hardware and the Cisco Internet Operating System
  • Analyze organization network needs and implement networks
  • Describe and identify common security threats and attacks
  • Apply a common ethical hacking methodology for penetration tests

Center for Cybersecurity

The LSC Center for Cybersecurity was established to provide a broad range of system security and information assurance services for local businesses and the community at large. The Center will provide students with real-world learning experiences in cybersecurity education through several business and government partnerships.

Ready to get started? Become a Student
Apply Now