1. Certifications (preferred but not required):
    1. Industry-recognized certifications such as CISSP , CompTIA Security+ , Certified Ethical Hacker (CEH) , or GIAC Certifications (e.g., GSEC, GCIH).
    By starting with the end results in mind, CyberVigilant and EduTech use an evidence-based practice for adult learners known as backward design: reviewing the job description for the mid-level security analyst role, included relevant competencies listed on Credential Engine’s Credential Finder, and built the cybersecurity job role matrix to describe the ideal competencies for cybersecurity analysts at CyberVigilant by employment level. Now, EduTech can design the digital credential curriculum that fills learning outcome gaps that are missing by most applicants for CyberVigilant’s mid-level cybersecurity analyst role.

    EduTech crosswalks existing curricula outcomes to CyberVigilant’s mid-level cybersecurity analyst requirements. For example, throughout the year, CyberVigilant offers professional development opportunities to its entry-level cybersecurity analysts. EduTech notices that one of the professional development opportunities that CyberVigilant regularly offers might prepare existing analysts to meet some requirements for the mid-level cybersecurity analyst role. The table below is a crosswalk showing how learners who successfully complete the CyberVigilant ID10T-101 training meet some specific requirements listed in the detailed job description.