Course Description
The CompTIA CySA+ (Cybersecurity Analyst+) (CS0-003) certification is a vendor-neutral certification that validates your knowledge and ability to conduct intermediate-level cybersecurity skills. This certification fills the gap between the entry-level CompTIA Security+ exam (for those with about 1 year in the field) and the advanced-level CompTIA Advanced Security Practitioner (for those with at least 5 years in the field). The CompTIA CySA+ exam is focused on the technical, hands-on details of the cybersecurity field, including not only cyber threats, secure network architecture, and risk management, but also the ability to perform log analysis, configuration assessments, and more.
This CySA+ (CS0-003) course is designed for IT Security analysts, vulnerability analysts, threat intelligence analysts, or anyone who is trying to get a better understanding of the concepts involved in conducting cybersecurity analysis, to include threat management, vulnerability management, cyber incident response, security architecture, and the toolsets associated with these cybersecurity efforts.
Program Objectives
In this course, you will assess and respond to security threats and operate a systems and network security analysis platform you will…
- Assess information security risk in computing and network environments.
- Analyze reconnaissance threats to computing and network environments.
- Analyze attacks on computing and network environments.
- Analyze post-attack techniques on computing and network environments.
- Implement a vulnerability management program.
- Collect cybersecurity intelligence.
- Analyze data collected from security and event logs.
- Perform active analysis on assets and networks.
- Respond to cybersecurity incidents.
- Investigate cybersecurity incidents.
- Address security issues with the organization’s technology architecture.
Prerequisites
Course Features
- Lectures 31
- Quizzes 0
- Duration 12 hours
- Skill level All levels
- Language English
- Students 202
- Certificate Yes
- Assessments Yes
Curriculum
- 6 Sections
- 31 Lessons
- 365 Days
- Introduction To CYSA1
- 1.0 Threat and Vulnerability Management11
- 2.1Explain the importance of threat data and intelligence.33 Minutes
- 2.2Given a scenario, utilize threat intelligence to support organizational security.39 Minutes
- 2.3Given a scenario, perform vulnerability management activities.49 Minutes
- 2.4Given a scenario, analyze the output from common vulnerability assessment tools – Part 156 Minutes
- 2.5Explain the threats and vulnerabilities associated with specialized technology – Part 133 Minutes
- 2.6Explain the threats and vulnerabilities associated with operating in the cloud – Part 112 Minutes
- 2.7Given a scenario, implement controls to mitigate attacks and software vulnerabilities – Part 146 Minutes
- 2.8Given a scenario, Analyze the output from common vulnerability assessment tools – Part 232 Minutes
- 2.9Explain the threats and vulnerabilities associated with operating in the cloud – Part 227 Minutes
- 2.10Given a scenario, Implement controls to mitigate attacks and software vulnerabilities – Part 234 Minutes
- 2.11Explain the threats and vulnerabilities associated with specialized technology – Part 218 Minutes
- 2.0 Software and Systems Security4
- 3.0 Security Operations and Monitoring7
- 4.1Given a scenario, analyze data as part of security monitoring activities – Part 136 Minutes
- 4.2Given a scenario, implement configuration changes to existing controls to improve security.36 Minutes
- 4.3Explain the importance of proactive threat hunting33 Minutes
- 4.4Compare and contrast automation concepts and technologies – Part 132 Minutes
- 4.5Given a scenario, analyze data as part of security monitoring activities – Part 238 Minutes
- 4.6Given a scenario, analyze data as part of security monitoring activities – Part 328 Minutes
- 4.7Compare and contrast automation concepts and technologies – Part 221 Minutes
- 4.0 Incident Response5
- 5.1Explain the importance of the incident response process.26 Minutes
- 5.2Given a scenario, apply the appropriate incident response procedure.29 Minutes
- 5.3Given an incident, analyze potential indicators of compromise – Part 19 Minutes
- 5.4Given a scenario, utilize basic digital forensics techniques.50 Minutes
- 5.5Given an incident, analyze potential indicators of compromise – Part 220 Minutes
- 5.0 Compliance and Assessment3