Course Overview

The CySA+ certification is a mid-level cybersecurity analyst certification offered by CompTIA. The exam id is CS0-002. Students learn how to prevent, detect, and thwart cybersecurity threats. They do this by means of continuous security monitoring. As a certified cybersecurity analyst, you will be working in a proactive role.

cysa 2020 300x200 1

Course objectives

Per CompTIA, the following exam objectives have been established for the CySA+ certification: The CompTIA Cybersecurity Analyst (CySA+) certification verifies that successful candidates have the knowledge and skills required to leverage intelligence and threat detection techniques, analyze and interpret data, identify and address vulnerabilities, suggest preventative measures, and effectively respond to and recover from incidents.

0
Course Videos
0
Test Questions
0
E-BOOKS
0
Duration

Modules

Module 1: Threat and Vulnerability Management

  • Instructor Intro
  • About the Exam
  • Test Taking Tips and Techniques
  • Explain the importance of threat data and intelligence
  • Given a scenario, utilize threat intelligence to support organizational security
  • Given a scenario, perform vulnerability management activities Pt 1
  • Given a scenario, perform vulnerability management activities Pt 2
  • Given a scenario, analyze the output from common vulnerability assessment tools
  • Explain the threats and vulnerabilities associated with specialized technology
  • Explain the threats and vulnerabilities associated with operating in the Cloud
  • Given a scenario, implement controls to mitigate attacks and software vulnerabilities Pt 1
  • Given a scenario, implement controls to mitigate attacks and software vulnerabilities Pt 2

Module 2: Software and Systems Security

  • Given a scenario, apply security solutions for infrastructure management Pt 1
  • Outline
  • Given a scenario, apply security solutions for infrastructure management Pt 2
  • Given a scenario, apply security solutions for infrastructure management Pt 3
  • Flashcards
  • Explain software assurance best practices
  • Scatter
  • Explain hardware assurance best practices
  • Learn
  • Speller
  • Workbook

Module 3: Security Operations and Monitoring

  • Given a scenario, analyze data as part of security monitoring activities Pt 1
  • Given a scenario, analyze data as part of security monitoring activities Pt 2
  • Given a scenario, analyze data as part of security monitoring activities Pt 3
  • Given a scenario, implement configuration changes to existing controls to improve security Pt 1
  • Given a scenario, implement configuration changes to existing controls to improve security Pt 2
  • Explain the importance of proactive threat hunting
  • Compare and contrast automation concepts and technologies

Module 4: Incident Response

  • Explain the importance of the incident response process
  • Given a scenario, apply the appropriate the incident response procedure
  • Given an incident, analyze potential indicators of compromise
  • Given a scenario, utilize basic digital forensic techniques

Module 5: Compliance and Assessment

  • Understand the importance of data privacy and protection
  • Given a scenario, apply security concepts in support of organizational risk mitigation Pt 1
  • Given a scenario, apply security concepts in support of organizational risk mitigation Pt 2
  • Explain the importance of frameworks, policies, procedures, and controls Pt 1
  • Explain the importance of frameworks, policies, procedures, and controls Pt 2

Module 6: Afterword

  • Recap
  • Review Questions
  • Before the Exam

Modes of Learning