top of page
top

CompTIA CySA+

CompTIA CySA+

CompTIA CySA+ (Exam CS0-002)

CompTIA Authorized Partner Logo-.png

Price
Duration

USD 1,550 excl. VAT

5 Days

CCNA copy.jpg

Prerequisites

Prerequisits

To ensure your success in this course, you should meet the following requirements:
• At least two years‘ experience in computer network security technology or a related field
• The ability to recognize information security vulnerabilities and threats in the context of risk management
• Foundation-level operational skills with the common operating systems for PCs, mobile devices, and servers
• Foundation-level understanding of some of the common concepts for network environments, such as routing and switching
• Foundational knowledge of TCP/IP networking protocols, including IP, ARP, ICMP, TCP, UDP, DNS, DHCP, HTTP/HTTPS, SMTP, and POP3/IMAP

• Foundational knowledge of the concepts and operational framework of common assurance safeguards in computing environments. Safeguards include authentication and authorization, resource permissions, and antimalware mechanisms.
• Foundational knowledge of the concepts and operational framework of common assurance safeguards in network environments, such as firewalls, IPS, NAC, and VPNs
You can obtain this level of skill and knowledge by taking the following Official CompTIA courses:
• The Official CompTIA Network+ (Exam N10-007) Guide
• The Official CompTIA Security+ (Exam SY0-501) Guide

What you'll will learn

What you’ll learn in this course

CompTIA is a not-for-profit trade association with the purpose of advancing the interests of IT professionals and IT channel organizations, and its industry-leading IT certifications are an important part of that mission. CompTIA CyberSecurity Analyst (CySA+) certification is an intermediate-level certification designed to demonstrate the knowledge and competencies of a security analyst or specialist with four years' experience in the field.
With the end goal of proactively defending and continuously improving the security of an organization, CySA+ will verify the successful candidate has the knowledge and skills required to: Leverage intelligence and threat detection techniques;

Analyze and interpret data; Identify and address vulnerabilities; Suggest preventative measures; and Effectively respond to and recover from incidents.
This course covers the duties of cybersecurity analysts who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur. The course will also prepare you for the CompTIA CySA+ (Exam CS0-002) certification examination.

Objectives

Course Objectives

In this course, you will assess and respond to security threats and operate a systems and network security analysis platform. You will:
• Collect and use cybersecurity intelligence and threat data.
• Identify modern cybersecurity threat actors types and tactics, techniques, and procedures.
• Analyze data collected from security and event logs and network packet captures.
• Respond to and investigate cybersecurity incidents using forensic analysis techniques.

• Assess information security risk in computing and network environments.
• Implement a vulnerability management program.
• Address security issues with an organization‘s network architecture.
• Understand the importance of data governance controls.
• Address security issues with an organization‘s software development life cycle.
• Address security issues with an organization‘s use of cloud and service-oriented architecture.

Course Outline

Outlines

• Understanding Vulnerability Response, Handling, and Management
o Understanding Cybersecurity Leadership Concepts.
o Exploring Control Types and Methods
o Explaining Patch Management Concepts
• Exploring Threat Intelligence and Threat Hunting Concepts
o Exploring Threat Actor Concepts
o Identifying Active Threats
o Exploring Threat-Hunting Concepts
• Explaining Important System and Network Architecture Concepts
o Reviewing System and Network Architecture Concepts
o Exploring Identity and Access Management (IAM)
o Maintaining Operational Visibility
• Understanding Process Improvement in Security Operations
o Exploring Leadership in Security Operations
o Understanding Technology for Security Operations
• Implementing Vulnerability Scanning Methods
o Explaining Compliance Requirements
o Understanding Vulnerability Scanning Methods
o Exploring Special Considerations in Vulnerability Scanning
• Performing Vulnerability Analysis
o Understanding Vulnerability Scoring Concepts
o Exploring Vulnerability Context Considerations
• Communicating Vulnerability Information
o Explaining Effective Communication Concepts
o Understanding Vulnerability Reporting Outcomes and Action Plans

• Explaining Incident Response Activities
o Exploring Incident Response Planning
o Performing Incident Response Activities
• Demonstrating Incident Response Communication
o Understanding Incident Response Communication
o Analyzing Incident Response Activities
• Applying Tools to Identify Malicious Activity
o Identifying Malicious Activity
o Explaining Attack Methodology Frameworks
o Explaining Techniques for Identifying Malicious Activity
• Analyzing Potentially Malicious Activity
o Exploring Network Attack Indicators
o Exploring Host Attack Indicators
o Exploring Vulnerability Assessment Tools
• Understanding Application Vulnerability Assessment
o Analyzing Web Vulnerabilities
o Analyzing Cloud Vulnerabilities
• Exploring Scripting Tools and Analysis Concepts
o Understanding Scripting Languages
o Identifying Malicious Activity Through Analysis
• Understanding Application Security and Attack Mitigation Best Practices
o Exploring Secure Software Development Practices
o Recommending Controls to Mitigate Successful Application Attacks
o Implementing Controls to Prevent Attacks

reg1

Further information

If you would like to know more about this course please contact us

Schedule
CompTIA Authorized Partner Logo-.png
CompTIA Authorized Partner Logo-.png
CompTIA Authorized Partner Logo-.png
reg

Thanks for registering. our team will contact you soon !

Registration

ILT/VILT

Thanks for registering. our team will contact you soon !

Registration

ILT/VILT

Thanks for registering. our team will contact you soon !

Registration

ILT/VILT
bottom of page