Skip to main content
< All Topics

Advanced Diploma – Cybersecurity Analyst

This subject guide provides authoritative open access (OA) and open educational resources (OER) supporting cybersecurity education, research, and applied practice at Vector Technology Institute. Resources span governance, risk, technical controls, threat intelligence, and secure systems design.

Programmes supported:
Advanced Diploma – Cyber Security Analyst · BSc Information & Communication Technology · ASc Computer Systems Technology · Network & Security Certificates · Capstone (BU404)


How to Use This Guide Successfully

  • Use Standards & Frameworks as authoritative references in assignments, audits, and cybersecurity planning exercises.
  • Consult Peer-Reviewed Journals when conducting literature reviews or writing research papers.
  • Apply Threat Intelligence & Tools for labs, simulations, vulnerability analysis, and incident response scenarios.
  • Use OER and Training Resources to reinforce concepts, practice skills, and prepare for professional certifications.
  • Incorporate Jamaica & Caribbean resources to contextualize cybersecurity challenges within regional and national environments.

Start Here: Core Cybersecurity Research

Use these tools to locate scholarly articles, applied security research, and technical publications.

  • Google Scholar – Primary discovery tool for cybersecurity research, threat analysis, cryptography, and secure systems.
  • BASE – Academic search engine indexing global repositories with strong computing and security coverage.
  • CORE – Aggregated open access research papers in cybersecurity, computer science, and engineering.
  • OpenAlex – Open research catalog useful for mapping cybersecurity research trends and citations.

Peer-Reviewed Journals & Scholarly Sources

  • IEEE Access – Peer-reviewed open access journal covering cybersecurity, networking, and applied IT security.
  • Directory of Open Access Journals (DOAJ) – Curated index of peer-reviewed OA journals, including security and computing titles.
  • SpringerOpen – Open access journals across cybersecurity, networks, and information systems.

Standards, Frameworks & Authoritative Guidance

Threat Intelligence, Tools & Applied Learning

Regional Context: Jamaica & Caribbean


Recommended Companion Guides

Use these guides alongside Cybersecurity for broader context, supporting research skills, and interdisciplinary understanding.

  • Information Technology – Systems, networking, infrastructure, and cloud foundations that support cybersecurity practice.
  • Software Engineering – Secure software development, code quality, and application security principles.
  • IT Standards and Frameworks – Centralized access to technical, security, and governance standards used across programmes.
  • Research Skills – Guidance on evaluating sources, conducting literature reviews, and academic writing.
  • Technology Management – Risk management, governance, compliance, and strategic decision-making.

Table of Contents