Course Overview
Course objectives
Per CompTIA, the following exam objectives have been established for the CySA+ certification: The CompTIA Cybersecurity Analyst (CySA+) certification verifies that successful candidates have the knowledge and skills required to leverage intelligence and threat detection techniques, analyze and interpret data, identify and address vulnerabilities, suggest preventative measures, and effectively respond to and recover from incidents.
Modules
Module 1: Threat and Vulnerability Management
- Instructor Intro
- About the Exam
- Test Taking Tips and Techniques
- Explain the importance of threat data and intelligence
- Given a scenario, utilize threat intelligence to support organizational security
- Given a scenario, perform vulnerability management activities Pt 1
- Given a scenario, perform vulnerability management activities Pt 2
- Given a scenario, analyze the output from common vulnerability assessment tools
- Explain the threats and vulnerabilities associated with specialized technology
- Explain the threats and vulnerabilities associated with operating in the Cloud
- Given a scenario, implement controls to mitigate attacks and software vulnerabilities Pt 1
- Given a scenario, implement controls to mitigate attacks and software vulnerabilities Pt 2
Module 2: Software and Systems Security
- Given a scenario, apply security solutions for infrastructure management Pt 1
- Outline
- Given a scenario, apply security solutions for infrastructure management Pt 2
- Given a scenario, apply security solutions for infrastructure management Pt 3
- Flashcards
- Explain software assurance best practices
- Scatter
- Explain hardware assurance best practices
- Learn
- Speller
- Workbook
Module 3: Security Operations and Monitoring
- Given a scenario, analyze data as part of security monitoring activities Pt 1
- Given a scenario, analyze data as part of security monitoring activities Pt 2
- Given a scenario, analyze data as part of security monitoring activities Pt 3
- Given a scenario, implement configuration changes to existing controls to improve security Pt 1
- Given a scenario, implement configuration changes to existing controls to improve security Pt 2
- Explain the importance of proactive threat hunting
- Compare and contrast automation concepts and technologies
Module 4: Incident Response
- Explain the importance of the incident response process
- Given a scenario, apply the appropriate the incident response procedure
- Given an incident, analyze potential indicators of compromise
- Given a scenario, utilize basic digital forensic techniques
Module 5: Compliance and Assessment
- Understand the importance of data privacy and protection
- Given a scenario, apply security concepts in support of organizational risk mitigation Pt 1
- Given a scenario, apply security concepts in support of organizational risk mitigation Pt 2
- Explain the importance of frameworks, policies, procedures, and controls Pt 1
- Explain the importance of frameworks, policies, procedures, and controls Pt 2
Module 6: Afterword
- Recap
- Review Questions
- Before the Exam
Modes of Learning
- Flashcards: Remember the “read and guess” games we used to play back then? Here’s to enhance what you learned. How does it work? A statement will be written on a flashcard, and you’ll need to guess the answer. Then flip it over to see if you answered it correctly. The cards continue, each with a random statement from the course that you took previously.
- Scatter: “Make Everything Disappear.” Turn the screen white and vanish it all but this time testing your knowledge and your time being monitored. Find the best match and click your way toward success. This brain teaser might give you a hard time! But education combined with games adds an element of fun to it.
- Learn: Here’s another. Read and choose the right answer. A game designed on a Multiple-Choice pattern. This kind of exercise boosts your confidence. When one option seems to be correct, you choose the other only for it to be the right option. The right option will welcome another statement, but don’t sweat! You are still learning.
- Speller: This fun-packed game is unique in its own way. Hear the term carefully and type it out on your screen. You think you are a pro at learning spellings of tricky terms. Test yourself out with this game. Could you hear it properly? If you could, were you able to write it?
We have found our students doing absolutely great by showcasing their certificates. Grab that certificate of yours before someone else does and get that recognition you deserve.
You best learn when you see it. Our easy-to-understand video content is in place for you. Watch the studying content and grasp all the concepts easily. With so many lectures and 3000+ hours of video content, find what suits your needs. These educational videos are designed to sharpen your experience with your training content. Our easy-to-understand video content is in place for you. Watch the studying content and grasp all the concepts easily.
In contrast to other e-learning services, our labs will let you exercise what you analyze in a real environment with a lot to choose from. This layout mirrors the traditional study room format which ensures you will recognize exactly the way to set up, manage and troubleshoot any environment.
Being a successful IT professional involves more than knowing key terms and concepts. You need to be able to “apply” your knowledge to real-world situations. At EZDA we quote, “Learn it to pertain to it.” So, why spend money buying the equipment when we got you all covered?