Course Overview
When attacks slip through unnoticed, the results are costly: data breaches, regulatory fines, downtime, and lost customer trust. And the demand for skilled defenders has never been higher, with the U.S. Bureau of Labor Statistics projecting a 33% growth in Information Security Analyst jobs from 2023 to 2033, far outpacing most careers. Without trained analysts, organizations are left vulnerable.
CompTIA Cybersecurity Analyst (CySA+) training equips you with the skills employers demand, including threat detection, log analysis, and incident response. This hands-on certification course prepares you to identify vulnerabilities, stop attacks before they spread, and keep critical systems secure.
This instructor-led course prepares you to proactively defend systems using behavioral analytics, threat intelligence, and hands-on investigation tools. You’ll gain real-world experience managing vulnerabilities, analyzing SIEM output, investigating incidents, and preparing for forensic analysis—all while developing the knowledge needed to pass the CompTIA CySA+ certification exam (CS0-002 or CS0-003).
The CySA+ certification is also DoD 8570/8140 approved, making this course an excellent choice for military, civilian, and contractor personnel who require compliance with Department of Defense cybersecurity workforce standards.
What Is Included
- Expert-led training with real-world threat simulations
- Official CompTIA CySA+ courseware and lab materials
- Hands-on labs and SIEM tools
- Access to class recordings for 90 days
- Guaranteed-to-run dates available
- Free rescheduling and retake options (conditions apply)
Course Objectives
- Assess information security risk in computing and network environments.
- Analyze reconnaissance threats to computing and network environments.
- Analyze attacks on computing and network environments.
- Analyze post-attack techniques on computing and network environments.
- Implement a vulnerability management program.
- Collect cybersecurity intelligence.
- Analyze data collected from security and event logs.
- Perform active analysis on assets and networks.
- Respond to cybersecurity incidents.
- Investigate cybersecurity incidents.
- Address security issues with the organization’s technology architecture.
Who Should Attend?
This course is ideal for cybersecurity analysts, SOC analysts, incident responders, threat hunters, and IT professionals responsible for protecting information systems. It’s also suitable for those seeking to transition into a security operations role and validate skills in threat detection, log analysis, and response.
As a DoD-approved course, it is also valuable for anyone in the Department of Defense (DoD)—military, civilian, or contractor—who needs to develop or validate skills in threat detection, security monitoring, log analysis, and incident response capabilities.
What’s included?
- Authorized Courseware
- Intensive Hands on Skills Development with an Experienced Subject Matter Expert
- Hands-on practice on real Servers and extended lab support 1.800.482.3172
- Examination Vouchers & Onsite Certification Testing- (excluding Adobe and PMP Boot Camps)
- Academy Code of Honor: Test Pass Guarantee
- Optional: Package for Hotel Accommodations, Lunch and Transportation
With several convenient training delivery methods offered, The Academy makes getting the training you need easy. Whether you prefer to learn in a classroom or an online live learning virtual environment, training videos hosted online, and private group classes hosted at your site. We offer expert instruction to individuals, government agencies, non-profits, and corporations. Our live classes, on-sites, and online training videos all feature certified instructors who teach a detailed curriculum and share their expertise and insights with trainees. No matter how you prefer to receive the training, you can count on The Academy for an engaging and effective learning experience.
Methods
- Instructor-Led (the best training format we offer)
- Live Online Classroom – Online Instructor-Led
- Self-Paced Video
Speak to an Admissions Representative for complete details
| Start | Finish | Public Price | Public Enroll | Private Price | Private Enroll |
|---|---|---|---|---|---|
| 12/8/2025 | 12/12/2025 | ||||
| 12/29/2025 | 1/2/2026 | ||||
| 1/19/2026 | 1/23/2026 | ||||
| 2/9/2026 | 2/13/2026 | ||||
| 3/2/2026 | 3/6/2026 | ||||
| 3/23/2026 | 3/27/2026 | ||||
| 4/13/2026 | 4/17/2026 | ||||
| 5/4/2026 | 5/8/2026 | ||||
| 5/25/2026 | 5/29/2026 | ||||
| 6/15/2026 | 6/19/2026 | ||||
| 7/6/2026 | 7/10/2026 | ||||
| 7/27/2026 | 7/31/2026 | ||||
| 8/17/2026 | 8/21/2026 | ||||
| 9/7/2026 | 9/11/2026 | ||||
| 9/28/2026 | 10/2/2026 | ||||
| 10/19/2026 | 10/23/2026 | ||||
| 11/9/2026 | 11/13/2026 | ||||
| 11/30/2026 | 12/4/2026 | ||||
| 12/21/2026 | 12/25/2026 | ||||
| 1/11/2027 | 1/15/2027 |
Agenda
Duration
5 Days
1 – Outline
- Lesson 1: Scoping Organization/Customer Requirements
- Lesson 2: Defining the Rules of Engagement
- Lesson 3: Footprinting and Gathering Intelligence
- Lesson 4: Evaluating Human and Physical Vulnerabilities
- Lesson 5: Preparing the Vulnerability Scan
- Lesson 6: Scanning Logical Vulnerabilities
- Lesson 7: Analyzing Scanning Results
- Lesson 8: Avoiding Detection and Covering Tracks
- Lesson 9: Exploiting the LAN and Cloud
- Lesson 10: Testing Wireless Networks
- Lesson 11: Targeting Mobile Devices
- Lesson 12: Attacking Specialized Systems
- Lesson 13: Web Application-Based Attacks
- Lesson 14: Performing System Hacking
- Lesson 15: Scripting and Software Development
- Lesson 16: Leveraging the Attack: Pivot and Penetrate
- Lesson 17: Communicating During the PenTesting Process
- Lesson 18: Summarizing Report Components
- Lesson 19: Recommending Remediation
- Lesson 20: Performing Post-Report Delivery Activities
