CompTIA CySA+ - Cybersecurity Analyst
CLASS DATE(s):
8/2/2021 - 8/6/2021
9/13/2021 - 9/17/2021
10/25/2021 - 10/29/2021

COURSE LENGTH: 5 Days

COURSE COST: $2495.00

COURSE TIMES: 9:00am - 4:30pm

Printable version of this course
print
Register for this course
register

COURSE OVERVIEW

CompTIA Cybersecurity Analyst (CySA+) is an IT workforce certification that applies behavioral analytics to networks and devices to prevent, detect and combat cybersecurity threats. CompTIA Cybersecurity Analyst (CySA+) is the only intermediate high-stakes cybersecurity analyst certification with performance-based questions covering security analytics, intrusion detection and response.

CompTIA® Cybersecurity Analyst (CySA+®) (Exam CS0-002) certification examination.

Jobs that use CompTIA CySA+

IT Security Analyst, Vulnerability Analyst, Threat Intelligence Analyst, Cybersecurity Analyst, Security Operations Center (SOC) Analyst, Cybersecurity Specialist, Security Engineer

AUDIENCE AND PREREQUISITES

This course can help students who are looking to fulfill DoD directive 8570.01 for information assurance (IA) training. This program is designed for personnel performing IA functions, establishing IA policies, and implementing security measures and procedures for the Department of Defense and affiliated information systems and networks.

What you’ll learn

The Official CompTIA Cybersecurity Analyst (CySA+) Study Guide (CS0-002) has been developed by CompTIA for the CompTIA certification candidate. Rigorously evaluated by third party subject matter experts to validate adequate coverage of the Cybersecurity Analyst (CySA+) exam objectives, the Official CompTIA Cybersecurity Analyst (CySA+) Study Guide teaches the essential skills and information required for the CompTIA certification exam (CS0-002). At least two years (recommended) of experience in computer network security technology or a related field. The ability to recognize information security vulnerabilities and threats in the context of risk management.
Foundation-level operational skills with some of the common operating systems for computing environments and operational framework of common assurance safeguards in computing environments. Safeguards include, but are not limited to, basic authentication and authorization, resource permissions, and anti-malware mechanisms.
Understanding of some of the common concepts for network environments, such as routing and switching.
Foundational knowledge of major TCP/IP networking protocols, including, but not limited to, TCP, IP, UDP, DNS, HTTP, ARP, ICMP, and DHCP. and of the concepts and operational framework of common assurance safeguards in network environments. Safeguards include, but are not limited to, firewalls, intrusion prevention systems, and VPNs.

PREREQUISITE COURSESFOLLOW UP COURSES  

*Course cost listed does not include the cost of courseware. Please contact us at learn@vtec.org or 207-775-0244 for additional pricing information, or if you have any questions. Course to run is subject to a minimum enrollment. Course may run as a virtual instructor led training if the minimum enrollment is not met.

COURSE TOPICS:


After completion you will be able to:
Explain the Importance of Security Controls and Security Intelligence
Utilize Threat Data and Intelligence
Analyze Security Monitoring Data
Collect and Query Security Monitoring Data
Utilize Digital Forensics and Indicator Analysis Techniques
Apply Incident Response Procedures
Apply Risk Mitigation and Security Frameworks
Perform Vulnerability Management
Apply Security Solutions for Infrastructure Management
Understand Data Privacy and Protection
Apply Security Solutions for Software Assurance
Apply Security Solutions for Cloud and Automation

Chapter 1: Understanding threats
Module A: Threats and vulnerabilities
Module B: Threat intelligence
Module C: Automation technologies

Chapter 2: Policy design
Module A: Security policies
Module B: Controls and procedures

Chapter 3: Vulnerability management
Module A: Risk management programs
Module B: Vulnerability assessment
Module C: Vulnerability management programs

Chapter 4: Recognizing vulnerabilities
Module A: Attack strategies
Module B: System vulnerabilities
Module C: Application exploits

Chapter 5: Network threats
Module A: Network vulnerabilities
Module B: Cloud vulnerabilities

Chapter 6: Reconnaissance
Module A: Reconnaissance techniques
Module B: Active reconnaissance
Module C: Analyzing scan results

Chapter 7: Network security systems
Module A: Network security systems
Module B: Logging and monitoring

Chapter 8: Network defense techniques
Module A: Data analysis
Module B: Threat hunting

Chapter 9: Secure infrastructure management
Module A: Data protection
Module B: Hardening networks
Module C: Cryptographic security
Module D: Identity systems

Chapter 10: Secure system design
Module A: Hardware assurance
Module B: Hardening hosts and devices
Module C: Software assurance

Chapter 11: Incident Response
Module A: Incident response planning
Module B: Incident response procedures
Module C: Forensic toolkits