CompTIA Cybersecurity Analyst (CySA+)

Overview:

CySA+ is aimed at IT professionals with (or seeking) job roles such as IT Security Analyst, Security Operations Center (SOC) Analyst, Vulnerability Analyst, Cybersecurity Specialist, Threat Intelligence Analyst, and Security Engineer.

Duration:  

48 hours

Objectives:

Upon successful completion of this course, students will learn:

  • Manage risks and vulnerabilities
  • Configure and use threat detection tools
  • Understand roles, responsibilities, and the security framework
  • Perform data analysis and interpret the results to identify areas of concern
  • Avoid, prevent, and respond to security incidents
  • Contain and eradicate threats
  • Understand security architecture, policies, and procedures
  • Better secure and protect applications and systems
Course outlines:

1.      Threat Management

    • Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes.
    • Given a scenario, analyze the results of a network reconnaissance
    • Given a network-based threat, implement or recommend the appropriate response and countermeasure
    • Explain the purpose of practices used to secure a corporate environment

    2.      Vulnerability Management

      • Given a scenario, implement an information security vulnerability management process.
      • Given a scenario, analyze the output resulting from a vulnerability scan
      • Compare and contrast common vulnerabilities found in the following targets within an organization

      3.      Cyber Incident Response

        • Given a scenario, distinguish threat data or behavior to determine the impact of an incident
        • Given a scenario, prepare a toolkit and use appropriate forensics tools during an investigation
        • Explain the importance of communication during the incident response process
        • Given a scenario, analyze common symptoms to select the best course of action to support incident response
        • Summarize the incident recovery and post-incident response process.

        4.      Security Architecture and Tool Sets

          • Explain the relationship between frameworks, common policies, controls, and procedures
          • Given a scenario, use data to recommend remediation of security issues related to identity and access management
          • Given a scenario, review security architecture and make recommendations to implement compensating controls
          • Given a scenario, use application security best practices while participating in the Software Development Life Cycle (SDLC)
          • Compare and contrast the general purpose and reasons for using various cybersecurity tools and technologies
          • Online

          • At Ho Chi Minh City

          • At Ha Noi


          Other courses