CompTIA Cybersecurity Analyst (CySA+)

Description

Duration: 5 days

About the Course

CompTIA Cybersecurity Analyst (CySA+) is an international, vendor-neutral cybersecurity certification that applies behavioral analytics to improve the overall state of IT security. CySA+ validates critical knowledge and skills that are required to prevent, detect and combat cybersecurity threats. This certification will prepare you for a high demand security role where you can apply your skills to identify vulnerabilities, threats and risks within your organization.

Audience Profile

This course is intended for those who wish to validate their intermediate-level security skills and knowledge by taking on the CompTIA CySa+ certification

Learning Objectives

  • Utilize and apply proactive threat intelligence to support organizational security and perform vulnerability management activities
  • Apply security concepts in support of organizational risk mitigation and understand the importance of frameworks, policies, procedures, and controls
  • Apply security solutions for infrastructure management and explain software & hardware assurance best practices
  • Apply the appropriate incident response procedure
  • Analyze data as part of continuous security monitoring activities

Certification Exam

This training course prepares students for the CompTIA CySA+ (CS0-002) Exam

Prerequisites

While there is no required prerequisite, the CompTIA CySA+ certification is intended to follow CompTIA Security+ or have 3-4 years of hands-on information security experience.

What’s included?

  • Authorized Courseware
  • Intensive Hands on Skills Development with an Experienced Subject Matter Expert
  • Hands-on practice on real Servers and extended lab support 1.800.482.3172
  • Examination Vouchers & Onsite Certification Testing- (excluding Adobe and PMP Boot Camps)
  • Academy Code of Honor: Test Pass Guarantee
  • Optional: Package for Hotel Accommodations, Lunch and Transportation

With several convenient training delivery methods offered, The Academy makes getting the training you need easy. Whether you prefer to learn in a classroom or an online live learning virtual environment, training videos hosted online, and private group classes hosted at your site. We offer expert instruction to individuals, government agencies, non-profits, and corporations. Our live classes, on-sites, and online training videos all feature certified instructors who teach a detailed curriculum and share their expertise and insights with trainees. No matter how you prefer to receive the training, you can count on The Academy for an engaging and effective learning experience.

Methods

  • Instructor Led (the best training format we offer)
  • Live Online Classroom – Online Instructor Led
  • Self-Paced Video

Speak to an Admissions Representative for complete details

StartFinishPublic PricePublic Enroll Private PricePrivate Enroll
01/18/202101/22/2021
02/08/202102/12/2021
03/01/202103/05/2021
03/22/202103/26/2021
04/12/202104/16/2021
05/03/202105/07/2021
05/24/202105/28/2021
06/14/202106/18/2021
07/05/202107/09/2021
07/26/202107/30/2021
08/16/202108/20/2021
09/06/202109/10/2021
09/27/202110/01/2021
10/18/202110/22/2021
11/08/202111/12/2021
11/29/202112/03/2021
12/20/202112/24/2021

Curriculum

Module 1 – Threat Management 1
Cybersecurity Analysts

  • Cybersecurity Roles and Responsibilities
  • Frameworks and Security Controls
  • Risk Evaluation
  • Penetration Testing Processes

Reconnaissance Techniques

  • The Kill Chain
  • Open Source Intelligence
  • Social Engineering
  • Topology Discovery
  • Service Discovery
  • OS Fingerprinting

Module 2 – Threat Management 2
Security Appliances

  • Configuring Firewalls
  • Intrusion Detection and Prevention
  • Configuring IDS
  • Malware Threats
  • Configuring Anti-virus Software
  • Sysinternals
  • Enhanced Mitigation Experience Toolkit

Logging and Analysis

  • Packet Capture
  • Packet Capture Tools
  • Monitoring Tools
  • Log Review and SIEM
  • SIEM Data Outputs
  • SIEM Data Analysis
  • Point-in-Time Data Analysis

Module 3 – Vulnerability Management
Managing Vulnerabilities

  • Vulnerability Management Requirements
  • Asset Inventory
  • Data Classification
  • Vulnerability Management Processes
  • Vulnerability Scanners
  • Microsoft Baseline Security Analyzer
  • Vulnerability Feeds and SCAP
  • Configuring Vulnerability Scans
  • Vulnerability Scanning Criteria
  • Exploit Frameworks

Remediating Vulnerabilities

  • Analyzing Vulnerability Scans
  • Remediation and Change Control
  • Remediating Host Vulnerabilities
  • Remediating Network Vulnerabilities
  • Remediating Virtual Infrastructure Vulnerabilities

Secure Software Development

  • Software Development Lifecycle
  • Software Vulnerabilities
  • Software Security Testing
  • Interception Proxies
  • Web Application Firewalls
  • Source Authenticity
  • Reverse Engineering

Module 4 – Cyber Incident Response
Incident Response

  • Incident Response Processes
  • Threat Classification
  • Incident Severity and Prioritization
  • Types of Data

Forensics Tools

  • Digital Forensics Investigations
  • Documentation and Forms
  • Digital Forensics Crime Scene
  • Digital Forensics Kits
  • Image Acquisition
  • Password Cracking
  • Analysis Utilities

Incident Analysis and Recovery

  • Analysis and Recovery Frameworks
  • Analyzing Network Symptoms
  • Analyzing Host Symptoms
  • Analyzing Data Exfiltration
  • Analyzing Application Symptoms
  • Using Sysinternals
  • Containment Techniques
  • Eradication Techniques
  • Validation Techniques
  • Corrective Actions

Module 5 – Security Architecture
Secure Network Design

  • Network Segmentation
  • Blackholes, Sinkholes, and Honeypots
  • System Hardening
  • Group Policies and MAC
  • Endpoint Security

Managing Identities and Access

  • Network Access Control
  • Identity Management
  • Identity Security Issues
  • Identity Repositories
  • Context-based Authentication
  • Single Sign-On and Federations
  • Exploiting Identities
  • Exploiting Web Browsers and Applications

Security Frameworks and Policies

  • Frameworks and Compliance
  • Reviewing Security Architecture
  • Procedures and Compensating Controls
  • Verifications and Quality Control
  • Security Policies and Procedures
  • Personnel Policies and Training