Partner
Exam Preparation

CCOA
Certified Cybersecurity Operations Analyst

Rating:
4.8
English
Advanced
Video preview
FACE 2 FACE
ON SITE TRAINING
LIVE VIRTUAL
TRAINING
COACHING
& MENTORING
SELF-PACED
TRAINING
Select Date
Download Brochure

Course Overview

The Certified Cybersecurity Operations Analyst™ (CCOA™) by ISACA is an advanced certification program tailored for professionals aiming to build operational expertise in cybersecurity analysis, incident detection, and response.

This intensive five-day course equips participants with foundational knowledge and practical skills across five core domains—ranging from technology essentials to adversarial tactics and asset protection. Through hands-on labs and instructor-led sessions, learners will engage in realistic security operations center (SOC) scenarios, threat intelligence analysis, log review, and vulnerability management.

Participants will gain a comprehensive understanding of how to proactively detect threats, respond to incidents, and protect digital assets, aligning with real-world operational standards and global cybersecurity frameworks.

Hetaf A.
Coordinator - Program Enrollment

Key Takeaways

1
Comprehend networking, endpoint, and application essentials that underpin modern cybersecurity environments.
2
Apply governance, risk management, and compliance principles to develop security programs aligned with business goals.
3
Analyze threat actors, attack vectors, and threat intelligence to detect and respond to adversarial behavior.
4
Execute incident detection and response techniques, including advanced log analysis, forensics, and containment strategies.
5
Design and implement security controls, identity access systems, and vulnerability management processes to secure organizational assets.

Information Systems Audit and Control Association
Brand Logo
ISACA was incorporated in 1969 by a small group of individuals who recognized a need for a centralized source of information and guidance in the growing field of auditing controls for computer systems. Today, ISACA serves 140,000 professionals in 180 countries. As an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves.

Course Outline

Domain 1: Technology Essentials (25%)
Part A: Networking
◦ Computer Networking Models ◦ Devices Ports Protocols ◦ Network Access Controls ◦ Network Tools ◦ Network Topology ◦ Segmentation
Part B: System & Endpoint
◦ Databases ◦ Command Line ◦ Containers and Virtualization ◦ Middleware ◦ Operating Systems
Part C: Applications
◦ Application Programming Interface ◦ Automated Deployment ◦ Programming and Scripting
Domain 2: Cybersecurity Principles and Risk (20%)
Part A: Cybersecurity Principles
◦ Compliance ◦ Governance ◦ Risk Management ◦ Roles and Responsibility ◦ Security Models
Part B: Cybersecurity Risk
◦ Application Security Risk ◦ Cloud Technology Risk ◦ Data Risk ◦ Network Security Risk ◦ Supply Chain Risk ◦ System Endpoint Risk ◦ Web Application Risk ◦ User Risk
Domain 3: Adversarial Tactics, Techniques, and Procedures (10%)
Part A: Treat Landscape
◦ Attack Vectors ◦ Threat Actors and Agents ◦ Threat Intelligence Sources
Part B: Means and Methods
◦ Attack Types ◦ Cyber Attack Stages ◦ Exploit Techniques ◦ Security Testing
Domain 4: Incident Detection and Response (34%)
Part A: Incident Detection
◦ Data Analysis ◦ Detection Analysis ◦ Indicators of Attack & Compromise ◦ Indicators of Attack Indicators of Compromise ◦ Logs and Alerts ◦ Advanced Log Analysis
Part B: Incident Response
◦ Incident Containment ◦ Incident Handling ◦ Forensic Analysis ◦ Network Traffic Analysis ◦ Packet Analysis Threat Analysis
Domain 5: Securing Assets (11%)
Part A: Controls

◦ Contingency Planning ◦ Controls and Techniques ◦ Identity and Access Management ◦ Industry Best ◦ Collecting and Verifying Integrity of Data ◦ Collecting and Documenting Incidents

Part B: Vulnerability Management

◦ Vulnerability Assessment ◦ Vulnerability Identification ◦ Vulnerability Remediation ◦ Vulnerability Tracking

Who Should Attend?

This highly practical and interactive course has been specifically designed for

Cybersecurity Analyst

Information Security Analyst

Soc Analyst

Vulnerability Analyst

Incident Response Analyst

FAQ

What language will the course be taught in and what level of English do I need to take part in a LEORON training program?
Most LEORON courses are delivered in English. However, there are some courses offered in Arabic, mainly online. For our in-house courses, sessions can be curated and delivered in any language upon request. In general, the best way to confirm language availability is to check with our Enrollment Managers for the most up-to-date information. Simply click on “Let’s talk on WhatsApp” to chat with us directly.
What formats are the courses offered in?
LEORON delivers training in various formats including face-to-face, live virtual sessions, self-paced learning, in-house delivery as well as online courses.
Are LEORON Public courses certified by an official body/organization?
Yes, most LEORON public courses are accredited by internationally recognized bodies such as CIPD, ATD, PMI, EdEx, and many others—depending on the course.
Who accredits LEORON’s training programs?
LEORON partners with over 20 international bodies such as PMI, CIPD, ATD, EdEx, NASBA, CISI, GARP, HRCI, SHRM, ACCA, ASQ, IIA, ILM, IAC, and others
Are CPD points or PDUs provided?
Yes, learners can earn CPD credits and professional development units (PDUs) including NASBA CPEs, PMI PDUs, CISI, GARP, HRCI, SHRM, and more.
How can I register for a course?
You can register through our website by filling in the inquiry form, or by speaking directly with one of our consultants via WhatsApp or email. Once we confirm your interest, we’ll guide you through the steps.
When is the registration deadline for public courses?
Registration typically closes 14 days before the course start date, with occasional late registrations accepted upon confirmation
What is included in the course fee?
The fee generally covers 5-star venue facilities, training materials, certified instruction, lunches and refreshments, plus certification and membership where applicabl0065
Are there group rates or discounts?
Yes, group bookings and corporate-level discounts are available. Learners are encouraged to reach out to discuss specific arrangements
What support is available with registration?
Enrollment Managers and a Registration Desk assist with the entire process, including deadlines, travel logistics, and course customization. As well as any other special requests you might have. Simply to go your preferred course and click on “Let’s chat on WhatsApp” to do so.
Can I request a bespoke course at my location or within my organization?
Yes, in-house training is fully customizable in terms of curriculum, language, delivery, and timing. You can suggest dates and locations. Simply to go your preferred course and click on “Let’s chat on WhatsApp” in order to address any questions or concerns in this regards.
What is the refund or cancellation policy?
Refund and cancellation policies vary depending on the course type and location. Generally, cancellations made at least 14 days before the course start date may be eligible for a full or partial refund, while cancellations made closer to the course date may incur a fee. For exact terms, please consult your Enrollment Manager or refer to the course confirmation email.
Can I register multiple employees from my company?
Yes. We support group registrations and offer corporate packages for organizations enrolling multiple participants. Our team can help coordinate the logistics for group bookings.
Who should attend these courses?
LEORON caters to a variety of professionals: from those seeking leadership development to project managers, HR specialists, finance professionals, cybersecurity, procurement, Ai enthusiasts and many others.
Do I need prior experience or academic qualifications?
Not always. Many specialized paths, like cybersecurity, accept learners without prior experience. However, some courses (e.g., PMI PDU-based ones) may have recommended prerequisites. Its always better to chat with one of our Enrollment Managers to discuss more. Simply to go your preferred course and click on “Let’s chat on WhatsApp” to do so.
Will I receive a certificate after completing the course?
Yes. Upon full attendance and successful completion, you will receive a certificate of participation or accreditation, depending on the course.
Are meals and refreshments included in face-to-face courses?
Yes. For in-person courses, lunch and coffee breaks are provided daily at the venue.
Can LEORON deliver a course in-house at our organization?
Absolutely. All programs can be delivered privately at your company or virtually for your team, customized to match your internal goals and structure.

Reviews