Cyber Security Analyst


Enroll for the 19-days Cyber Security Analyst certification training course from Koenig Solutions accredited by EC-Council and get five courses and five certifications!  This course prepare you to hunt for threats, respond to vulnerabilities, handle incidents, and contribute to a security team with outstanding skills.

This course pack incorporates the accompanying courses & certifications:

  1. Certified Network Defender v2 - CND V2
  2. Certified Ethical Hacker V11 -CEH-v11
  3. Certified Threat Intelligence Analyst (CTIA)
  4. EC-Council Certified Incident Handler (ECIH V2)
  5. Certified SOC Analyst-CSA

Target Audience:

  • Anyone who wants to expand their knowledge on information security
  • Those interested in a career as information security analyst
  • Network and Security Administrators
  • Network and Security Engineers
  • Network Defense Analyst
  • Network Defense Technicians
  • Network Security Specialist
  • Network Security Operator
  • Cybersecurity Analyst
  • SOC Analysts (Tier I and Tier II)
  • Entry-level cyber security professionals


Schedule & Prices
Course Details Schedule
Live Virtual Classroom (Instructor-Led)
Duration : 19 Days
Fee : USD 6,700 (Includes Taxes) E  
Classroom Training(Available: London, Dubai, India, Sydney, Vancouver)
Duration : 19 Days
Fee : On Request
On Request

Course Prerequisites
  • Basic Computer Knowledge.

Certified Network Defender (CNDv2) Certification Training 

Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. The program prepares network administrators how to identify what parts of an organization need to be reviewed and tested for security vulnerabilities and how to reduce, prevent, and mitigate risks in the network. CND covers protect, detect, respond and predict approach to network security.

In this course, you will figure out how to...

  • Network security management
  • Network security policies and procedures
  • Windows and Linux security administration
  • Mobile and IoT device security
  • Data security techniques
  • Virtualization technology security
  • Cloud and wireless security
  • Risk assessment tools
  • Basics of first response and forensics
  • Indicators of Compromise, Attack, and Exposures (IoC, IoA, IoE)
  • Threat intelligence capabilities
  • Log management
  • Endpoint security
  • Firewall solutions
  • IDS/IPS technologies
  • Network Authentication, Authorization, Accounting (AAA)

Certified Ethical Hacker (CEH V11) Certification Training

The Certified Ethical Hacker Certification course from EC-Council is one of the most sought-after certification courses in the IT Security/Cybersecurity domain. In its latest version, the CEH V11 will help professionals to learn about the latest hacking tools, techniques, and practices used by hackers and cybersecurity professionals to hack enterprise systems. 

In this course, you will figure out how to...

  • The step-by-step process and tactics utilized by hackers to penetrate systems
  • Trojans, backdoors, and countermeasures to stop attacks
  • IDS, firewalls, wireless hacking, and more
  • Advanced hacking concepts, smartphone hacking, writing virus codes, corporate espionage, and reverse engineering
  • Powershell, Oracle databases, hacking SQL, Apache Web servers, and more
  • Network, mobile application security, and assess threats and vulnerabilities
  • Information assurance and managing information security

Certified Threat Intelligence Analyst (CTIA) Certification Training 

Certified Threat Intelligence Analyst (CTIA) is combination of cybersecurity and threat intelligence to help identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive, specialist-level program that teaches a structured approach for building effective threat intelligence.

In this course, you will figure out how to...

  • Introduction to Threat Intelligence
  • Cyber Threats and Kill Chain Methodology
  • Requirements, Planning, Direction, and Review
  • Data Collection and Processing
  • Data Analysis
  • Intelligence Reporting and Dissemination

EC-Council Certified Incident Handler (ECIH V2) Certification Training

The EC-Council Certified Incident Handler (ECIH V2) Training and certification course will address the needs of the professionals who want to get equipped with the principles and knowledge for detecting and responding to the current security incidents and threats emerging in an information system. The course has been structured to equip professionals in creating incident handling codes, learning about laws and policies for incident handling and differentiating between various types of incidents such as network security incidents, malicious code incidents, and insider attack incidents.

In this course, you will figure out how to...

  • Introduction to Incident Handling and Response
  • Incident Handling and Response Process
  • Forensic Readiness and First Response
  • Handling and Responding to Malware Incidents
  • Handling and Responding to Email Security Incidents
  • Handling and Responding to Network Security Incidents
  • Handling and Responding to   Web Application Security Incidents
  • Handling and Responding to Cloud Security Incidents
  • Handling and Responding to Insider Threats


Certified SOC Analyst (CSA) Certification Training

Certified SOC Analyst course is the initial step to joining a security operations center (SOC). Its enables the candidate to acquire trending and in-demand technical skills through instruction by some of the most experienced instructors in the industry. It completely covers the basics of SOC operations, before relaying the knowledge of log management and correlation, SIEM deployment, advanced incident detection, and incident response. Also, the applicant will figure out how to oversee different SOC processes and collaborate with CSIRT at the time of need.

In this course, you will figure out how to...

  • Acquire Knowledge of SOC processes, procedures, technologies, and workflows
  • Acquire knowledge of Centralized Log Management (CLM) process
  • Ready to perform Security events and log collection, monitoring, and analysis
  • Acquire experience and extensive knowledge of Security Information and Event Management
  • Acquire knowledge on administering SIEM solutions (Splunk/AlienVault/OSSIM/ELK)
  • Acquire hands-on experience on SIEM use case development process
  • Learn use cases that are widely used across the SIEM deployment
  • Acquire understating of SOC and IRT collaboration for better incident response