CompTIA CYSA+
On Demand $995.00
Virtual Class $1,895.00
Class Room $2,495.00

Course Description
CompTIA Cybersecurity Analyst (CySA+) is an IT workforce credential that uses behavioral analytics to avoid, identify, and battle cybersecurity threats through continuous security monitoring on networks and devices.
The CompTIA Cybersecurity Analyst (CySA+).
CompTIA Cybersecurity Analyst (CySA+) is an IT workforce credential that uses behavioral analytics to avoid, identify, and battle cybersecurity threats through continuous security monitoring on networks and devices.
CySA+ will confirm that the successful candidate possesses the knowledge and abilities needed to:
- Use intelligence and threat detection tools to your advantage.
- Data analysis and interpretation
- Recognize and address vulnerabilities
- Suggestions for preventative measures
- Respond to and recover from incidents in a timely and effective manner.
Program Objectives
- Threat and Vulnerability Management
- Explain the importance of threat data and intelligence.
- Given a scenario, utilize threat intelligence to support organizational security.
- Given a scenario, perform vulnerability management activities.
- Given a scenario, analyze the output from common vulnerability assessment tools.
- Explain the threats and vulnerabilities associated with specialized technology.
- Explain the threats and vulnerabilities associated with operating in the cloud.
- Given a scenario, implement controls to mitigate attacks and software vulnerabilities.
- Software and Systems Security
- Given a scenario, apply security solutions for infrastructure management.
- Explain software assurance best practices
- Explain hardware assurance best practices
- Security Operations and Monitoring
- Given a scenario, analyze data as part of security monitoring activities.
- Given a scenario, implement configuration changes to existing controls to improve security.
- Explain the importance of proactive threat hunting.
- Compare and contrast automation concepts and technologies
- Incident Response
- Explain the importance of the incident response process.
- Given a scenario, apply the appropriate incident response procedure.
- Given an incident, analyze potential indicators of compromise.
- Given a scenario, utilize basic digital forensics techniques.
- Compliance and Assessment
- Understand the importance of data privacy and protection.
- Given a scenario, apply security concepts in support of organizational risk mitigation.
- Explain the importance of frameworks, policies, procedures, and controls.
Prerequisites
Course Features
- Lectures 32
- Domains 5
- Quizzes 0
- Duration 40 hours
- Skill level Entry Level
- Language English
- Brochure Download
- Students 493
- Certificate No
- Assessments Yes
-
Introduction To CYSA
-
1.0 Threat and Vulnerability Management
- Explain the importance of threat data and intelligence.
- Given a scenario, utilize threat intelligence to support organizational security.
- Given a scenario, perform vulnerability management activities.
- Given a scenario, analyze the output from common vulnerability assessment tools – Part 1
- Given a scenario, Analyze the output from common vulnerability assessment tools – Part 2
- Explain the threats and vulnerabilities associated with specialized technology – Part1
- Explain the threats and vulnerabilities associated with specialized technology – Part2
- Explain the threats and vulnerabilities associated with operating in the cloud – Part 1
- Explain the threats and vulnerabilities associated with operating in the cloud – Part2
- Given a scenario, implement controls to mitigate attacks and software vulnerabilities – Part1
- Given a scenario, Implement controls to mitigate attacks and software vulnerabilities – part2
-
2.0 Software and Systems Security
-
3.0 Security Operations and Monitoring
- Given a scenario, analyze data as part of security monitoring activities – Part1
- Given a scenario, analyze data as part of security monitoring activities – Part2
- Given a scenario, analyze data as part of security monitoring activities – Part3
- Given a scenario, implement configuration changes to existing controls to improve security.
- Explain the importance of proactive threat hunting
- Compare and contrast automation concepts and technologies – Part1
- Compare and contrast automation concepts and technologies – Part2
-
4.0 Incident Response
- Explain the importance of the incident response process.
- Given a scenario, apply the appropriate incident response procedure.
- Given an incident, analyze potential indicators of compromise – Part1
- Given a scenario, analyze potential indicators of compromise – Part 2
- Given a scenario, utilize basic digital forensics techniques.
-
5.0 Compliance and Assessment
- Understand the importance of data privacy and protection.
- Given a scenario, apply security concepts in support of organizational risk mitigation – Part1
- Given a scenario, apply security concepts in support of organizational risk mitigation – Part2
- Explain the importance of frameworks, policies, procedures, and controls.