Skip to content Skip to main nav
  • Log in
  • Sign up
  • Guests
Excelsior University
Communities Hub
Connections, Opportunities, Resources, and Experiences
About Rope Teams
Customize Your Content
Get Involved
  • Find Your Identity & Allyship Rope Teams
    • Age & Generational Diversity
    • Civic Engagement
    • Different Abilities
    • First Generation
    • LGBTQIA+
    • Men
    • Military & Veterans
    • Parenting & Family
    • Race & Ethnicity
    • Religion & Spirituality
    • Women
    • Criminal Justice
    • Social Determinants of Health
  • Build Your Network
  • Engage in Community & Find Opportunities
    • Community Engagement at Excelsior
    • Explore Community Engagement and Volunteer Opportunities
    • Search for Experiential Learning Opportunities
    • Explore the Current Landscape
  • About
    • About the Center for Social Justice
    • About Rope Teams
    • For Faculty: Faculty Champions Program
  • About Rope Teams
  • Customize Your Content
  • Get Involved

Cyber Security Operations

Location: United States
Experience Type: Job Simulations
  • Share This: Share Cyber Security Operations on FacebookShare Cyber Security Operations on LinkedInShare Cyber Security Operations on X

Investigate a cyberattack and conduct a comprehensive risk assessment with Datacom

Focus Designed for beginners; this immersive program simulates the fast-paced world of cybersecurity operations. It offers hands-on experience with real-world tasks that cybersecurity professionals handle daily, providing a solid foundation for those with little or no prior knowledge.

 

Step into the shoes of a cybersecurity team member with the Datacom Cybersecurity Simulation; an interactive journey that brings the challenges and responsibilities of the cybersecurity frontline to life. Through scenario-based exercises, you will build essential skills including risk assessment, threat research, data analysis, and crafting actionable recommendations. These core competencies form the backbone of effective cybersecurity teams and will boost your confidence while deepening your understanding of security best practices.

What Does It Mean to Be in Cyber?

 

When we talk about ‘Cyber’ or ‘Cybersecurity’, we’re referring to the practice of protecting computers, networks, programs, and data from unauthorized access, damage or theft. Every day, millions of people use technology – such as computers, smartphones, and the internet – and cyber threats can come from hackers, malware (harmful software), and even accidents or mistakes. Cybersecurity is all about keeping information safe and ensuring digital systems operate smoothly and securely.

 

What is Cybersecurity? The Big Picture

 

Cybersecurity involves many different “streams” or areas of focus. These streams each contribute toward protecting information and technology in unique ways, and together, they form the comprehensive cybersecurity landscape:

 

1. Governance, Risk and Compliance (GRC): This area focuses on how organizations create policies and measures to reduce their cybersecurity risks. It involves understanding which risks are most threatening, how to manage them, and making sure the company follows laws and rules about security. Think of it as the planning, rules, and oversight side of cybersecurity.

2. Threat Intelligence and Analysis: In this stream, cybersecurity teams study the behaviour of hackers and malicious software. They research new threats, analyse attacks, and try to predict what might happen next. This helps organizations prepare and defend themselves effectively.

3. Security Operations:

This is the “hands-on” part where teams monitor systems for attacks, respond to security incidents, and fix problems as they occur. It’s about keeping an eye on the network 24/7 to spot trouble early.

4. Technical Security Controls:

These include firewalls, antivirus software, encryption, and tools that actually stop or slow attacks.

 

How Do These Streams Relate to Your Tasks?

 

In this program, your assigned tasks focus mainly on Risk and Compliance and Threat Analysis – important areas for understanding how companies protect themselves from cyber-attacks at a strategic and operational level.
 

· In Task One: Security Breach Impact Analysis, you will act like a cybersecurity consultant investigating what went wrong after a cyber attack. You’ll analyze the damage, identify weaknesses that were exploited, and assess how the attack affects the organization’s business, legal standing, and reputation. This task builds your skills in responding to threats and making clear business-focused recommendations – key in threat analysis and incident management.

 

· In Task Two: Cybersecurity Risk Assessment, you will practice identifying what parts of a company’s technology and data are most valuable (the assets), what threats put those assets at risk, and how likely those risks are to happen. You will then prioritize these risks and compile a report of your findings.  This approach helps organizations manage risks before they turn into real problems.

 

By working through these tasks, you’ll learn how cybersecurity professionals assess threats, measure risks, and propose actionable steps to strengthen security policies and controls – all essential skills for a successful career in cybersecurity operations.

This program is self-paced. It takes approximately 3-4 hours to complete.

Skills Learned:

  • Introduction to Cyber Security

    • Information Security
    • Research
    • Analytical Skills
    • Open Source Intelligence
    • Communication
  • Cybersecurity risk assessment
    Conduct a comprehensive risk assessment

    • Risk Assessment
    • Risk Management
    • Security Analysis
  • Finish Line

Experience Information

Sponsor
Datacom
Learn More
Mary [uConnect]Forage logo
Forage Showcase your skills. Find your career fit.
facebookinstagramlinkedintiktoktwitter

Meet the Community Team

Daniel Pascoe Aguilar
Fndg. Director of Ctr. for Social Justice & CDO
Meet DANIEL
Email
community@excelsior.edu
Address

7 Columbia Circle
Albany, NY 12203

Facebook Instagram LinkedIn X (formerly Twitter)
  • Alumni Connections
  • Blog
  • Events
  • Experiences
  • Job Search Database
  • Job Trend Data
  • Resources
  • Meet the Team
Privacy Policy | Terms of Service
Copyright © 2025 Excelsior University
Powered by uConnect