CompTIA Cybersecurity Analyst (CySA+) Training & Certification Course
Overview
CompTIA Cybersecurity Analyst (CySA+) is an IT workforce certification that applies behavioural analytics to networks and devices to prevent, detect and combat cybersecurity threats.
Why is it different?
CySA+ is the only intermediate high-stakes cybersecurity analyst certification with performance-based questions covering security analytics, intrusion detection and response. High-stakes exams are proctored at a Pearson VUE testing centre in a highly secure environment. CySA+ is the most up-to-date security analyst certification that covers advanced persistent threats in a post-2014 cybersecurity environment.
As attackers have learned to evade traditional signature-based solutions, such as firewalls, an analytics-based approach within the IT security industry is increasingly important for most organizations. The behavioural analytics skills covered by CySA+ identify and combat malware, and advanced persistent threats (APTs), resulting in enhanced threat visibility across a broad attack surface.
CompTIA CySA+ is for IT professionals looking to gain the following security analyst skills:
- Perform data analysis and interpret the results to identify vulnerabilities, threats and risks to an organization.
- Configure and use threat-detection tools.
- Secure and protect applications and systems within an organization.
What Skills Will You Learn?
- THREAT MANAGEMENT
- VULNERABILITY MANAGEMENT
- SECURITY ARCHITECTURE & TOOL SETS
- CYBER-INCIDENT RESPONSE
Prerequisite
Network+, Security+ or equivalent knowledge. Minimum of 3-4 years of hands-on information security or related experience. While there is no required prerequisite, CySA+ is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus.
Recommended Course
Full Description
Module 1. Threat Management
- Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes
- Given a scenario, analyze the results of a network reconnaissance
- Given a network-based threat, implement or recommend the appropriate response and countermeasure
- Explain the purpose of practices used to secure a corporate environment
Module 2. Vulnerability Management .
Given a scenario, implement an information security vulnerability management process
- Given a scenario, analyze the output resulting from a vulnerability scan
- Compare and contrast common vulnerabilities found in the following targets within an organization
Module 3. Cyber Incident Response.
Given a scenario, distinguish threat data or behavior to determine the impact of an incident
- Given a scenario, prepare a toolkit and use appropriate forensics tools during an investigation
- Explain the importance of communication during the incident response process
- Given a scenario, analyze common symptoms to select the best course of action to support incident response
- Summarize the incident recovery and post-incident response process
Module 4. Security Architecture and Tool Sets.
Explain the relationship between frameworks, common policies, controls, and procedures
- Given a scenario, use data to recommend remediation of security issues related to identity and access management
- Given a scenario, review security architecture and make recommendations to implement compensating controls
- Given a scenario, use application security best practices while participating in the Software Development Life Cycle (SDLC)
- Compare and contrast the general purpose and reasons for using various cybersecurity tools and technologies
Fees & Schedule
Delivery Mode | Course Duration | Fees |
---|---|---|
Live Virtual Training | 5 Days | Ask for Quote |
Onsite Classroom Training | 5 Days | Ask for Quote |
Customized Training | 5 Days | Ask for Quote |