This guide supports students enrolled in the Advanced Diploma – Cyber Security Analyst programme at Vector Technology Institute (VTI). It focuses on cyber defence, threat analysis, secure systems, incident response, and applied cybersecurity research.
The programme prepares learners for operational and analytical roles in cybersecurity, emphasizing industry standards, hands-on tools, and real-world security frameworks.
Using This Guide Successfully
- Begin with standards and frameworks to understand cybersecurity best practices.
- Use hands-on labs and documentation to develop technical skills.
- Consult peer-reviewed research for threat analysis and emerging risks.
- Apply ethical and legal principles when conducting security work.
Related guides: Research Skills • Research Paper Guide • APA Style Guide
1. Start Here: Core Cybersecurity Frameworks
These authoritative frameworks provide the foundation for cybersecurity analysis, governance, and risk management.
- NIST Cybersecurity Framework (CSF 2.0) – Industry-standard framework for managing cyber risk.
- MITRE ATT&CK – Knowledge base of adversary tactics and techniques.
- OWASP Top 10 – Most critical web application security risks.
2. Threat Intelligence & Analysis
Use these resources to study attack vectors, vulnerabilities, and threat actors.
- CISA Cybersecurity Resources – Alerts, advisories, and threat intelligence.
- SANS Reading Room – White papers on security operations and incident response.
- HackerOne – Hacker101 – Web security training and vulnerability concepts.
3. Security Tools, Labs & Practical Skills
These platforms support hands-on learning and applied cybersecurity practice.
- Kali Linux Documentation – Penetration testing and ethical hacking tools.
- Cisco Networking Academy (Security Modules) – Network security and cyber defence courses.
- Professor Messer – Security+ – Security fundamentals and certification-aligned content.
4. Standards, Policy & Governance
These resources support cybersecurity governance, compliance, and policy analysis.
- NIST Computer Security Resource Center – Security standards, guidelines, and publications.
- ISO/IEC 27001 Overview – Information security management principles.
- ITU Cybersecurity Standards – Telecommunications and network security standards.
5. Research, Case Studies & Incident Reports
Use these sources for research papers, case analysis, and capstone projects.
- Google Scholar – Peer-reviewed cybersecurity and computer science research.
- BASE – Full-text research discovery.
- Open Access Theses and Dissertations (OATD) – Advanced research and applied cybersecurity studies.
6. Ethics, Law & Professional Practice
Cybersecurity professionals must work within ethical and legal boundaries.
- Electronic Frontier Foundation (EFF) – Security & Privacy – Digital rights and ethical considerations.
- INTERPOL – Cybercrime – Global cybercrime trends and enforcement perspectives.
Recommended Companion Guides
- Research Skills Library Guide
- How to Write the Research Paper
- APA Style & Citation Guide
- Find Research
This guide supports advanced technical, analytical, and ethical competencies required of Cyber Security Analysts and aligns with industry-recognised standards and practices.
