CompTIA Cybersecurity Analyst (CySA+)

This course covers the duties of cybersecurity analysts who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur. The course will also prepare you for the CompTIA CySA+ (Exam CS0-002) certification examination.

Course Objectives

In this course, you will assess and respond to security threats and operate a systems and network security analysis platform. You will:

  • Collect and use cybersecurity intelligence and threat data.

  • Identify modern cybersecurity threat actors types and tactics, techniques, and

    procedures.

  • Analyze data collected from security and event logs and network packet captures.

  • Respond to and investigate cybersecurity incidents using forensic analysis techniques.

  • Assess information security risk in computing and network environments.

  • Implement a vulnerability management program.

  • Address security issues with an organization‘s network architecture.

  • Understand the importance of data governance controls.

  • Address security issues with an organization‘s software development life cycle.

  • Address security issues with an organization‘s use of cloud and service-oriented architecture.

Who Should Attend

CompTIA CySA+ is for IT professionals looking to gain the following security analyst skills:

  • Perform data analysis and interpret the results to identify vulnerabilities, threats and risks to an organization
  • Configure and use threat-detection tools
  • Secure and protect applications and systems within an organization
What You Will Learn:
  • Hardware threat management: Apply environmental reconnaissance techniques for hardware threat managment using appropriate tools, analyzing results, and implementing recommended response
  • Implement vulnerability management process for Windows operating systems and analyze results of the scan
  • Networking security architecture: Use data to recommend remediation of security issues related to identity and access management and recommend implementation strategy while participating in the Software Development Life Cycle (SDLC)
  • Software troubleshooting and cyber-incident response: Distinguish threat data to determine incident impact and prepare a toolkit with appropriate forensics tools, communication strategy, and best practices as a response
What your registration includes:
  • Instructor-led virtual classroom training
  • Course book and study materials
  • Hands-on labs and practice exams
  • Registration for the CompTIA CySA+ examination

Recommended Knowledge

To ensure your success in this course, you should meet the following requirements:

  • At least two years‘ experience in computer network security technology or a related field

  • The ability to recognize information security vulnerabilities and threats in the context of risk management

  • Foundation-level operational skills with the common operating systems for PCs, mobile devices, and servers

  • Foundation-level understanding of some of the common concepts for network environments, such as routing and switching

  • Foundational knowledge of TCP/IP networking protocols, including IP, ARP, ICMP, TCP, UDP, DNS, DHCP, HTTP/HTTPS, SMTP, and POP3/IMAP

  • Foundational knowledge of the concepts and operational framework of common assurance safeguards in computing environments. Safeguards include authentication and authorization, resource permissions, and antimalware mechanisms.

  • Foundational knowledge of the concepts and operational framework of common assurance safeguards in network environments, such as firewalls, IPS, NAC, and VPNs

Course Outline

Explaining the Importance of Security Controls and Security Intelligence 

Utilizing Threat Data and Intelligence 

Analyzing Security Monitoring Data 

Collecting and Querying Security Monitoring Data 

Utilizing Digital Forensics and Indicator Analysis Techniques

Applying Incident Response Procedures 

Applying Risk Mitigation and Security Frameworks 

Performing Vulnerability Management 

Applying Security Solutions for Infrastructure Management 

Understanding Data Privacy and Protection 

Applying Security Solutions for Software Assurance 

Applying Security Solutions for Cloud and Automation 

Schedule and Location
Aimpoint Solutions' Training Center

All of our CompTIA certification classes are now delivered online in a virtual classroom. Classes are delivered Monday - Friday from 8:30 AM to 4:30 PM. All classes marked GTR are Guaranteed To Run.On-site Training

We also offer custom on-site training. Please contact us to discuss our onsite training options.

CompTIA Certification Exams

The examination fee is included in the course price. Get more information on taking the exam at:  https://www.comptia.org/testing 

Military and Group Discounts

We offer a 10% discount for active duty military, US government personnel, and groups of two or more students from the same organization.

Please contact us before you register to receive your discount coupon code.

Aimpoint Solutions, LLC
Your resource for CompTIA certification training and custom Apple training

Proudly Owned and Operated by a Service Disabled Veteran

For the latest news and technical information:
Follow us on LinkedIn

Website Terms and Conditions
Website Privacy Policy
Website Registration Policy
Copyright Aimpoint Solutions, LLC (2019)
Apple Authorized Training Provider
CompTIA Authorized Partner
LearnQuest Education Partner