CompTIA Cybersecurity Analyst+ Training (CySA+)
|Commitment||5 days, 7-8 hours a day.|
|How To Pass||Pass all graded assignments to complete the course.|
|User Ratings||Average User Rating 4.8 See what learners said|
|Delivery Options||Instructor-Led Onsite, Online, and Classroom Live|
CompTIA Cybersecurity Analyst+ Certification Training (CySA+) Course – Hands-on
CompTIA Cybersecurity Analyst (CSA+) is a vendor-neutral cyber security program that applies behavioral analytics to improve the overall state of an organizations IT security. Intrinsec’s CompTIA CSA+ training will develop the critical knowledge and skills that are required to prevent, detect and combat cybersecurity threats.
Led by an authorized CompTIA instructor, ENO’s Institute CompTIA CySA+ training program will cover the expected skills and knowledge of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. The course will introduce tools and tactics you can use to manage cybersecurity risks, identify various types of common threats, evaluate the organization’s security, collect and analyze cybersecurity intelligence, and handle incidents as they occur. Additionally, this course will also help students successfully prepare for the CompTIA CSA+ exam.
Aside from a reserved seat in one of ENO’s Institute upcoming CompTIA CySA+ training seminars, the resources you receive include up-to-date courseware, a student study guide, practice exams and labs, plus a certification exam voucher. All provided resources are identified as CompTIA Approved Quality Content (CAQC). When you combine our instructor-led training with your course material, ENO’s Institute CompTIA CySA+ training seminar is a great resource for those interested in passing the exam or refreshing their practical IT security knowledge and skills.
CompTIA Cybersecurity Analyst+ Training (CySA+) Course – Customize it
- We can adapt this CompTIA Cybersecurity Analyst+ Training (CySA+) course to your group’s background and work requirements at little to no added cost.
- If you are familiar with some aspects of this CompTIA Cybersecurity Analyst+ Training (CySA+) course, we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the CompTIA Cybersecurity Analyst+ Training (CySA+) around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the CompTIA Cybersecurity Analyst+ Training (CySA+) course in manner understandable to lay audiences.
CompTIA Cybersecurity Analyst+ Training (CySA+) Course – Audience/Target Group
The CompTIA Cybersecurity Analyst+ Training (CySA+) program, much like the certification itself, is intended for professionals who use threat detection tools, perform data analysis, and interpret the results to identify vulnerabilities, threats, and risks to an organization with the end goal of securing and protecting applications and systems within an organization. Some example job functions may include, but are not limited to:
- IT Security Analyst
- Vulnerability Analyst
- Threat Intelligence Analyst
- SOC Analyst
- Security Engineer
- Cybersecurity Specialist
CompTIA Cybersecurity Analyst+ Training (CySA+) Course – Class Prerequisites
The knowledge and skills that a learner must have before attending this training course are:
- CompTIA Security+ Certification Training DoD Prep Course (SY0-501)
- CompTIA A+ Certification Training Prep Course
- At least two years (recommended) of experience in computer network security technology or a related field.
- The ability to recognize information security vulnerabilities and threats in the context of risk management.
- Foundation-level operational skills with some of the common operating systems for computing environments.
- Foundational knowledge of the concepts and operational framework of common assurance safeguards in computing environments. Safeguards include, but are not limited to, basic authentication and authorization, resource permissions, and anti-malware mechanisms.
- Foundation-level understanding of some of the common concepts for network environments, such as routing and switching.
- Foundational knowledge of major TCP/IP networking protocols including, but not limited to, TCP, IP, UDP, DNS, HTTP, ARP, ICMP, and DHCP.
- Foundational knowledge of the concepts and operational framework of common assurance safeguards in network environments. Safeguards include, but are not limited to, firewalls, intrusion prevention systems, and VPNs.
CompTIA Cybersecurity Analyst+ Training (CySA+) Course – Objectives:
Upon completing this CompTIA Cybersecurity Analyst+ Training (CySA+) course, learners will be able to meet these objectives:
- Assess information security risk in computing and network environments.
- Analyze reconnaissance threats to computing and network environments.
- Analyze attacks on computing and network environments.
- Analyze post-attack techniques on computing and network environments.
- Implement a vulnerability management program.
- Collect cybersecurity intelligence.
- Analyze data collected from security and event logs.
- Perform active analysis on assets and networks.
- Respond to cybersecurity incidents.
- Investigate cybersecurity incidents.
- Address security issues with the organization’s technology architecture.
CompTIA Cybersecurity Analyst+ Training (CySA+) – Course Content
Lesson 1: Assessing Information Security Risk
Topic A: Identify the Importance of Risk Management
Topic B: Assess Risk
Topic C: Mitigate Risk
Topic D: Integrate Documentation into Risk Management
Lesson 2: Analyzing Reconnaissance Threats to Computing and Network Environments
Topic A: Assess the Impact of Reconnaissance Incidents
Topic B: Assess the Impact of Social Engineering
Lesson 3: Analyzing Attacks on Computing and Network Environments
Topic A: Assess the Impact of System Hacking Attacks
Topic B: Assess the Impact of Web-Based Attacks
Topic C: Assess the Impact of Malware
Topic D: Assess the Impact of Hijacking and Impersonation Attacks
Topic E: Assess the Impact of DoS Incidents
Topic F: Assess the Impact of Threats to Mobile Security
Topic G: Assess the Impact of Threats to Cloud Security
Lesson 4: Analyzing Post-Attack Techniques
Topic A: Assess Command and Control Techniques
Topic B: Assess Persistence Techniques
Topic C: Assess Lateral Movement and Pivoting Techniques
Topic D: Assess Data Exfiltration Techniques
Topic E: Assess Anti-Forensics Techniques
Lesson 5: Managing Vulnerabilities in the Organization
Topic A: Implement a Vulnerability Management Plan
Topic B: Assess Common Vulnerabilities
Topic C: Conduct Vulnerability Scans
Topic D: Conduct Penetration Tests on Network Assets
Lesson 6: Collecting Cybersecurity Intelligence
Topic A: Deploy a Security Intelligence Collection and Analysis Platform
Topic B: Collect Data from Network-Based Intelligence Sources
Topic C: Collect Data from Host-Based Intelligence Sources
Lesson 7: Analyzing Log Data
Topic A: Use Common Tools to Analyze Logs
Topic B: Use SIEM Tools for Analysis
Lesson 8: Performing Active Asset and Network Analysis
Topic A: Analyze Incidents with Windows-Based Tools
Topic B: Analyze Incidents with Linux-Based Tools
Topic C: Analyze Malware
Topic D: Analyze Indicators of Compromise
Lesson 9: Responding to Cybersecurity Incidents
Topic A: Deploy an Incident Handling and Response Architecture
Topic B: Mitigate Incidents
Topic C: Prepare for Forensic Investigation as a CSIRT
Lesson 10: Investigating Cybersecurity Incidents
Topic A: Apply a Forensic Investigation Plan
Topic B: Securely Collect and Analyze Electronic Evidence
Topic C: Follow Up on the Results of an Investigation
>Lesson 11: Addressing Security Architecture Issues
Topic A: Remediate Identity and Access Management Issues
Topic B: Implement Security During the SDLC
Appendix A: Mapping Course Content to CompTIA® Cybersecurity Analyst+ (Exam CS0-001)
Appendix B: Security Resources
Lab 1: Accessing Information Security Risk
Lab 2: Analyzing Reconnaissance Threats to Computing
Lab 3: Analyzing Attacks on Computing and Network Environments
Lab 4: Analyzing Post Attack Techniques
Lab 5: Managing Vulnerabilities in the Organization
Lab 6: Collecting Cybersecurity Intelligence
Lab 7: Analyzing Log Data
Lab 8: Performing Active Asset and Network Analysis
Lab 9: Responding to Cybersecurity Incidents
Lab 10: Investigating Cybersecurity Incidents
Lab 11: Addressing Security Architecture