Cyber Security Category

Certified Cybersecurity Operations Analyst (CCOA™)

  • Length 5 days
  • Price  NZD 4000 exc GST
Course overview
View dates &
book now
Register interest

Why study this course

As the digital world grows increasingly complex, organisations depend on skilled cybersecurity professionals to safeguard their systems, data and reputations.  

Cybersecurity analysts play a critical role in identifying vulnerabilities, mitigating risks, and responding to threats that could lead to financial loss or operational disruption. However, for early-career professionals, gaining the necessary hands-on expertise to enter this field can be a significant challenge.  

ISACA’s Certified Cybersecurity Operations Analyst™ (CCOA™) certification focuses on the technical skills to evaluate threats, identify vulnerabilities, and recommend countermeasures to prevent cyber incidents. As emerging technologies like automated systems using AI evolve, the role of the cyber analyst will only become more critical in protecting digital ecosystems. Analysts specialise in understanding the what, where and how behind cybersecurity incidents. By identifying patterns, anomalies and indicators of compromise, you become the eyes and ears of your organisation’s defense. 

CCOA offers Performance-Based Labs: Users are provided access to a complete virtual machine loaded with an extensive list of tools/software that cybersecurity analysts use to complete everyday tasks. Each lab has detailed step-by-step instructions to guide users through the learning objectives helping support them as they master new cybersecurity skills. 

This course includes a digital courseware manual and access to the CCOA Questions, Answers and Explanations (QAE) database for 12 months.

Please note: The exam is not included in the course fee but can be purchased separately. Please contact us for a quote.

Aligns to certification

Request Course Information


What you’ll learn

The CCOA equips professionals to identify patterns and indicators of compromise, respond to emerging threats such as AI-driven attacks, and act as the vigilant guardians of their organisation’s digital ecosystem. 


ISACA Accredited Elite Partner Logo

ISACA at Lumify Work

ISACA provides practical guidance, benchmarks and other effective tools for all enterprises that use information systems. Through its comprehensive guidance and services, ISACA defines the roles of information systems governance, security, audit and assurance professionals worldwide.

Lumify Work is an Accredited Elite Partner of ISACA.


Who is the course for?

Targeted for Early-Career Professionals: CCOA specifically addresses the needs of individuals with 2-3 years of experience, filling a gap in the market between entry-level and intermediate certifications, using globally validated domains for roles such as: 

  • Cybersecurity Analyst

  • Information Security Analyst

  • SOC Analyst

  • Vulnerability Analyst

  • Incident Response Analyst

  • Tier 1 and 2 SOC Support


Course subjects

Domain 1: Technology Essentials 
Providing a solid foundation for cybersecurity by mastering essential concepts and tools. Ensures your ability to navigate key components of networking, databases, and programming while understanding modern technologies like cloud systems, DevOps and APIs.  

A. Networking 

  • Cloud Networking 

  • Computer Networking 

  • Devices, Ports, and Protocols 

  • Network Access 

  • Network Tools 

  • Network Topology 

  • Segmentation (Logical, Physical) 

B. Systems/Endpoint 

  • Databases 

  • Command Line 

  • Containerisation/Virtualisation 

  • Middleware 

  • Operating Systems 

C. Applications

  • Application Programming Interface (API) 

  • Automated Deployment 

  • Cloud Applications 

  • Scripting/Coding 

Domain 2: Cybersecurity Principles and Risk 
Understand cybersecurity governance and alignment with business drivers, define cybersecurity strategy based on enterprise objectives, establish effective cross-organisational communication for cybersecurity and more. 

A. Cybersecurity Principles 

  • Compliance 

  • Cybersecurity Objectives 

  • Governance 

  • Risk Management 

  • Roles and Responsibilities 

  • Cybersecurity Models 

B. Cybersecurity Risk

  • Application Risk 

  • Cloud Technology Risk 

  • Data Risk 

  • Network Risk 

  • Supply Chain Risk 

  • System/Endpoint Risk 

  • Web Application Risk 

Domain 3: Adversarial Tactics, Techniques, and Procedures 
Understand common adversarial tactics, techniques, and procedures (TTPs), develop critical and creative thinking skills for threat detection and response, differentiate between dashboard events, attacker mindset insights and more. 

A. Threat Landscape 

  • Attack Vectors 

  • Threat Actors/Agents 

  • Threat Intelligence Sources 

B. Means and Methods 

  • Attack Types 

  • Cyber Attack Stages 

  • Exploit Techniques 

  • Penetration Testing 

Domain 4: Incident Detection and Response
Understand the importance of cybersecurity-incident preparedness, recognise the significance of incident detection and response in mitigating their impact, appreciate the role of proactive planning, practice, process refinement and more. 

A. Incident Detection 

  • Data Analytics 

  • Detection Use Cases 

  • Indicators of Compromise and/or Attack 

  • Logs and Alerts 

  • Monitoring Tools and Technologies 

B. Incident Response 

  • Incident Containment 

  • Incident Handling 

  • Forensic Analysis 

  • Malware Analysis 

  • Network Traffic Analysis 

  • Packet Analysis 

  • Threat Analysis 

Domain 5: Securing Assets 
Understand the importance of designing countermeasures to protect digital assets, recognise the iterative nature of securing systems and their ecosystems, appreciate the holistic approach to securing assets, consider technical aspects and organisational products, services and critical business processes, and more. 

A. Controls 

  • Contingency Planning 

  • Controls and Techniques 

  • Identity and Access Management 

  • Industry Best Practices, Guidance, Frameworks, and Standards 

B. Vulnerability Management 

  • Vulnerability Assessment 

  • Vulnerability Identification 

  • Vulnerability Remediation 

  • Vulnerability Tracking 


Prerequisites

  • It is recommended that you have 2-3 years of experience in IT

  • Hold a CompTIA Security+, CySA+ or equivalent certification is beneficial but not a requirement


Industry Association Recognition

This course is eligible for Continuing Professional Education (CPE) hours/points to assist in maintaining your ISACA certification.

  • Contact hours: 28 hours

  • Continuing Professional Education: 28 CPEs

If you wish to claim CPEs, Lumify Work can verify your attendance. Please complete this ISACA form and email us at nz.training@lumifywork.com.


Terms & Conditions

The supply of this course by Lumify Work is governed by the booking terms and conditions. Please read the terms and conditions carefully before enrolling in this course, as enrolment in the course is conditional on acceptance of these terms and conditions.


Request Course Information

Awaiting course schedule

If you would like to receive a notification when this course becomes available, enter your details below.

Personalise your schedule with Lumify USchedule

Interested in a course that we have not yet scheduled? Get in touch, and ask for your preferred date and time. We can work together to make it happen.