CompTIA Cybersecurity Analyst (CySA+) is a certification for cyber professionals tasked with incident detection, prevention and response through continuous security monitoring. This course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur.

starstarstarstarstar

* Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Learning Objectives

With completion of this course you will be prepared to:
Detect and analyze indicators of malicious activity
Understand threat hunting and threat intelligence concepts
Use appropriate tools and methods to manage, prioritize and respond to attacks and vulnerabilities
Perform incident response processes
Understand reporting and communication concepts related to vulnerability management and incident response activities

1
  • LESSON 1: UNDERSTANDING VULNERABILITY RESPONSE, HANDLING, AND MANAGEMENT

  • Topic 1A: Understanding Cybersecurity Leadership Concepts

    Topic 1B: Exploring Control Types and Methods

    Topic 1C: Explaining Patch Management Concepts


2
  • LESSON 2: EXPLORING THREAT INTELLIGENCE AND THREAT HUNTING CONCEPTS

  • Topic 2A: Exploring Threat Actor Concepts

    Topic 2B: Identifying Active Threats

    Topic 2C: Exploring Threat-Hunting Concepts


3
  • LESSON 3: EXPLAINING IMPORTANT SYSTEM AND NETWORK ARCHITECTURE CONCEPTS

  • Topic 3A: Reviewing System and Network Architecture Concepts

    Topic 3B: Exploring Identity and Access Management (IAM)

    Topic 3C: Maintaining Operational Visibility


4
  • LESSON 4: UNDERSTANDING PROCESS IMPROVEMENT IN SECURITY OPERATIONS

  • Topic 4A: Exploring Leadership in Security Operations

    Topic 4B: Understanding Technology for Security Operations


5
  • LESSON 5: IMPLEMENTING VULNERABILITY SCANNING METHODS

  • Topic 5A: Explaining Compliance Requirements

    Topic 5B: Understanding Vulnerability Scanning Methods

    Topic 5C: Exploring Special Considerations in Vulnerability Scanning


6
  • LESSON 6: PERFORMING VULNERABILITY ANALYSIS

  • Topic 6A: Understanding Vulnerability Scoring Concepts

    Topic 6B: Exploring Vulnerability Context Considerations


7
  • LESSON 7: COMMUNICATING VULNERABILITY INFORMATION

  • Topic 7A: Explaining Effective Communication Concepts

    Topic 7B: Understanding Vulnerability Reporting Outcomes and Action Plans


8
  • LESSON 8: EXPLAINING INCIDENT RESPONSE ACTIVITIES

  • Topic 8A: Exploring Incident Response Planning

    Topic 8B: Performing Incident Response Activities


9
  • LESSON 9: DEMONSTRATING INCIDENT RESPONSE COMMUNICATION

  • Topic 9A: Understanding Incident Response Communication

    Topic 9B: Analyzing Incident Response Activities


10
  • LESSON 10: APPLYING TOOLS TO IDENTIFY MALICIOUS ACTIVITY

  • Topic 10A: Identifying Malicious Activity

    Topic 10B: Explaining Attack Methodology Frameworks

    Topic 10C: Explaining Techniques for Identifying Malicious Activity


11
  • LESSON 11: ANALYZING POTENTIALLY MALICIOUS ACTIVITY

  • Topic 11A: Exploring Network Attack Indicators

    Topic 11B: Exploring Host Attack Indicators

    Topic 11C: Exploring Vulnerability Assessment Tools


12
  • LESSON 12: UNDERSTANDING APPLICATION VULNERABILITY ASSESSMENT

  • Topic 12A: Analyzing Web Vulnerabilities

    Topic 12B: Analyzing Cloud Vulnerabilities


13
  • LESSON 13: EXPLORING SCRIPTING TOOLS AND ANALYSIS CONCEPTS

  • Topic 13A: Understanding Scripting Languages

    Topic 13B: Identifying Malicious Activity Through Analysis


14
  • LESSON 14: UNDERSTANDING APPLICATION SECURITY AND ATTACK MITIGATION BEST PRACTICES

  • Topic 14A: Exploring Secure Software Development Practices

    Topic 14B: Recommending Controls to Mitigate Successful Application Attacks

    Topic 14C: Implementing Controls to Prevent Attacks


Audience

This course is suited to Security Analyst Security Operations Center (SOC) Analyst Incident Response Analyst Vulnerability Management Analyst Security Engineer

Language

English

Prerequisites

Prior to this course you should have taken CompTIA Network+ and CompTIA Security+ courses or have the equivalent knowledge. A minimum of 4 years of hands-on information security or related experience is recommended.

$2,475

Length: 5.0 days (40 hours)

Level:

Not Your Location? Change

Course Schedule:

Schedule select
22
Jan
Monday
9:00 AM ET -
5:00 PM ET
Available
Schedule select
11
Mar
Monday
8:00 AM PT -
4:00 PM PT
Available
Schedule select
06
May
Monday
9:00 AM ET -
5:00 PM ET
Available
Schedule select
17
Jun
Monday
9:00 AM ET -
5:00 PM ET
Available
Loading...