Skip to main content

Powered By

Udacity Logo

Security Analyst

Dive deep into the fundamentals of information security. Learn to design security controls for networks, systems, and applications, while acquiring skills in threat mitigation and incident response. 

Delivered to you in partnership with Udacity.

Prerequisites
Basic Python and SQL fundamentals, IT architecture diagramming, database, command line interface basics, computer networking basics and client-server model
Time commitment
16 weeks (5 - 10 hours per week)
Prerequisites
Basic Python and SQL fundamentals, IT architecture diagramming, database, command line interface basics, computer networking basics and client-server model
Time commitment
16 weeks (5 - 10 hours per week)

Level up your skills and qualifications as a digital native

Teaming up with the best in industry, our courses lean into the future of work to deliver the best in structured, mentor-supported, 100% online education.

In an increasingly digital landscape, the demand for skilled cybersecurity professionals is at an all-time high. This comprehensive course equips you with the skills and knowledge to identify and respond to security weaknesses and incidents, positioning you to play a pivotal role in protecting sensitive data and systems.  

This Security Analyst course will be delivered to you in partnership with Udacity, meaning you’ll have access to both Udacity’s learning and career services as well as RMIT Online’s course enablement support through our Learner Success Team. Upon successful completion of the course, you will also receive an RMIT Online credential which can be uploaded to LinkedIn, verifying your skill mastery in the discipline.

Course overview

Learn more about our Security Analyst course in the video below.

Get RMIT credentialed

After completing an RMIT Future Skills course, you will earn an RMIT credential which can be validated, recognised and shared on social media platforms.

Course structure

Lesson 1: Core Frameworks and Principles 

  • Explore the underlying goals of information security 
  • Discover the defence-in-depth approach to security
  • Identify common network attack vectors

Lesson 2: Controls 

  • Examine numerous physical, logical, and administrative controls 
  • Evaluate controls necessary to secure a network, computer system or application 
  • Interpret the security controls from an industry-recognised control framework 

Lesson 3: Defensible Network Architecture 

  • Evaluate methods of deploying security controls using a layered security approach
  • Incorporate security techniques to enhance existing controls 
  • Articulate security concepts to appropriate audiences and stakeholders 

Learn with industry experts

Learner Success team
Learner Success team RMIT Online

Our Learner Success team are here to help you with any course enablement issues such as logging and passwords, withdrawals and deferrals, obtaining your RMIT badge, and more. 

Udacity's subject matter experts
Udacity's subject matter experts Udacity

Get personalised feedback on your projects as well as practical tips and industry best practice from Udacity's mentor team. 

Why choose RMIT Online

Get a world-class education and transform your career.

Real world skills

Develop skills that have been validated by industry, while getting credentialed by a world-leading university.

Industry connected

You'll gain knowledge and practical skills from renowned industry partners who are at the forefront of their field.

Flexible delivery

Advance your career while you study. RMIT Online courses let you balance work, study and life commitments.

Supported community

Be guided by a network of industry experts and peers, and supported by our dedicated success team.

Download a brochure

Register your interest to get a free course guide for Security Analyst.

By clicking Submit, you agree to be contacted via email and SMS about our courses. Local numbers may also be contacted by phone. For information on how RMIT collects, stores and uses your personal information, see our RMIT Privacy Statement.