Length: 2 Days

Certified Information Security Analyst II (CISA-II) Certification Program by Tonex

Certified Defensive Cybersecurity Specialist (CDCS)

Designed for mid-career analysts, CISA-II deepens practical expertise across monitoring, SIEM engineering, alert triage, and SOC workflows. Participants learn to refine detection content, operationalize threat intelligence, and standardize incident response with metrics that matter to leadership.

You will structure playbooks, automate routine investigations, and tune pipelines to reduce noise while preserving signal fidelity. This program emphasizes measurable outcomes—lower MTTD/MTTR, higher detection coverage, and consistent post-incident learning.

Stronger cybersecurity posture is a direct result: resilient monitoring architectures, validated controls, and streamlined escalation paths that withstand evolving threats. Your teams gain confidence in response readiness and auditability. Organizations benefit from durable risk reduction and clearer alignment between security operations and business goals.

Learning Objectives:

  • Engineer SIEM use cases and correlation rules.
  • Build reliable alert pipelines and enrichment.
  • Apply threat intel to detections and hunts.
  • Standardize incident response with KPIs.
  • Communicate findings to technical and executive audiences.
  • Elevate organizational cybersecurity by improving detection coverage, response speed, and risk visibility.

Audience:

  • Cybersecurity Professionals
  • SOC Analysts and Engineers
  • Incident Responders
  • Threat Hunters
  • Security Architects
  • IT/Network Operations Leads

Program Modules:

Module 1: SIEM Foundations

  • Event collection patterns and schemas
  • Normalization and parsing strategies
  • Time, context, and identity handling
  • Correlation logic and rule lifecycles
  • Data quality checks and baselining
  • Health monitoring and capacity

Module 2: Detection Engineering

  • Hypothesis-driven rule design
  • ATT&CK mapping and coverage
  • Thresholds, exceptions, and tuning
  • Stateful vs. stateless detections
  • False positive reduction methods
  • Versioning and peer review

Module 3: Threat Intelligence

  • Intelligence requirements and gaps
  • IOC vs. behavior-based strategies
  • Feeds, scoring, and de-duplication
  • Context enrichment workflows
  • PIRs to detection backlogs
  • Feedback and sunset criteria

Module 4: Incident Response

  • Triage decision trees and queues
  • Playbook structure and ownership
  • Containment and eradication steps
  • Evidence handling and timelines
  • Communication and stakeholder sync
  • Metrics: MTTD, MTTR, precision

Module 5: Automation & SOAR

  • Trigger design and guardrails
  • Enrichment and containment actions
  • Human-in-the-loop approvals
  • Error handling and rollbacks
  • Reusable action libraries
  • Measuring automation ROI

Module 6: Assurance & Reporting

  • Control validation and attestations
  • Continuous monitoring checks
  • Purple-team feedback loops
  • Post-incident reviews and actions
  • Executive and audit reporting
  • Risk alignment and roadmaps

Exam Domains:

  1. Operational Monitoring Strategy
  2. Detection Content Lifecycle Management
  3. Threat Intelligence Integration
  4. Incident Response Orchestration
  5. Security Automation Governance
  6. Assurance, Metrics, and Reporting

Course Delivery:

The course is delivered through a combination of lectures, interactive discussions, and project-based learning, facilitated by experts in the field of Certified Information Security Analyst II (CISA-II). Participants will have access to online resources, including readings, case studies, and tools for practical exercises.

Assessment and Certification:

Participants will be assessed through quizzes, assignments, and a capstone project. Upon successful completion of the course, participants will receive a certificate in Certified Information Security Analyst II (CISA-II).

Question Types:

  • Multiple Choice Questions (MCQs)
  • Scenario-based Questions

Passing Criteria:

To pass the Certified Information Security Analyst II (CISA-II) Certification Training exam, candidates must achieve a score of 70% or higher.

Ready to advance your SOC impact? Enroll in CISA-II by Tonex and level up your detection, response, and assurance capabilities today.

Request More Information