Cyber Threat Analyst I

Raj had been in an IT admin role at his old company for 4 years, growing into a senior admin. He is looking for an opportunity to start a career in cybersecurity.

From Senior IT Admin to Cyber Threat Analyst I

After working in an IT admin role at his old company for 4 years, advancing into a senior admin, Raj decided he wanted to move into the cybersecurity space. He studied on his own time to attain several relevant industry certifications and started looking for open positions. A hiring manager with a knack for spotting cyber talent brought Raj in for an interview. The company was impressed by Raj’s self-starter attitude and pursuit of new knowledge and skills. They hired Raj and have committed to developing him into a Cyber Threat Analyst Level I over a period of 9 months, using the following learning plan.

Suggested Learning Track

The following is sample learning program for professionals looking to transition into a Cyber Threat Analyst role.

Network Forensics and Investigation I

This course focuses on research, filtering, and comparative analysis to identify and attribute the different types of activity on a network.

Learn More
01 5-Day Course
02 20 Lab Exercises
03 College Credit

Behavioral Malware Analysis

Using system monitoring tools and analytic software, students will analyze real-world malware samples in a training environment, building secure labs, classifying malware, analyzing behavior, and documenting findings.

Learn More
01 5-Day Course
02 20 Lab Exercises
03 College Credit

Endpoint Live Forensics

This course teaches students the Windows 10 commands, tools, and techniques to use to identify and investigate significant indicators of compromise.

Learn More
01 5-Day Course
02 20 Lab Exercises
03 CPE/CEU Credit

Different from the Rest

At Focal Point, we are passionate about building stronger cybersecurity teams.

Flexible Delivery

Focal Point offers multiple training delivery methods - classroom, onsite, and online. Based on your needs, you can use one of our training facilities, go online, or we can bring our team to you.

70% Hands-On

We believe in the power of doing. Lectures are limited, and students spend most of their time building and testing real-world skills in our lab environments.

Top Instructors

Leverage the same world-class training used by cyber experts in the military and Fortune 500. Our instructors receive an average 4.9/5 rating for knowledge and delivery year after year.

Featured Learning Tracks

See where cyber workforce development can take your team.
Malware Reverse Engineer
Learning Track

Reverse Engineer

Olivia is a software developer who has been with her company for 6 years and is transitioning to a Reverse Engineering role.
Learn More
Cyber Skills Development 4
Learning Track

Malware Triage Analyst

Alex is an incident responder. After a year in this role, she is looking to further specialize her skillset. Her manager is giving Alex the opportunity to move into a malware triage role.
Learn More
Cyber Threat Hunter
Learning Track

Cyber Threat Hunter

Sam is an incident responder with two years of experience. Sam will be participating in a development program to build threat-hunting capabilities.
Learn More