Contact Us

BECOME A RESELLER

SELL YOUR COURSES

You are here

CompTIA CySA+ (CS0-001)

EDUTAINMENT COURSE:

CompTIA CySA+ (CS0-001)

Interactive and entertaining talk-show style format presented by industry leading experts.
Overview

The CompTIA CySA (Cybersecurity Analyst) certification prep course is designed to help prepare candidates to sit for the CySA+ exam,   as well as reinforce concepts for work roles such as Systems Security Analyst,  Threat Analyst,  and Vulnerability Assessment Analysts.

Objectives
  • Apply environmental reconnaissance techniques like OS fingerprinting,  e-mail harvesting,  and social media profiling using tools such as Nmap,  Netstat, and Syslog
  • Analyze the results of network reconnaissance,  and recommend or implement countermeasures
  • Secure a corporate environment by scanning for vulnerabilities
  • Respond to cyber incidents with a forensics toolkit,  maintain the chain of custody,  and analyze incident severity.
Prerequisites
  • Know basic network terminology and functions (such as OSI Model,  Topology,  Ethernet,  Wi-Fi,  switches,  routers).
  • Understand TCP/IP addressing,  core protocols,  and troubleshooting tools
  • Identify network attack strategies and defenses.
  • Know the technologies and uses of cryptographic standards and products
  • Identify network- and host-based security technologies and practices.
  • Describe the standards and products used to enforce security on web and communications technologies.
Target Audience

The CompTIA Cybersecurity Analyst (CySA+) examination is designed for IT security analysts,  vulnerability analysts,  or threat intelligence analysts.  The exam will certify that the successful candidate has the knowledge and skills required to configure and use threat detection tools,  perform data analysis,  and interpret the results to identify vulnerabilities,  threats,   and risks to an organization with the end goal of securing and protecting applications and systems within an organization.

  1. THREAT MANAGEMENT
1
Start
Overview
2
Start
Reconnaissance: Tools
3
Start
Reconnaissance: Tools Part 2
4
Start
Reconnaissance: Tools Part 3
5
Start
Reconnaissance: Tools Part 4
6
Start
Reconnaissance: Techniques
8
Start
Reconnaissance: Techniques Part 2
9
Start
Reconnaissance: Techniques Part 3
10
Start
Reconnaissance: Techniques Part 4
11
Start
Data Correlation and Analytics
12
Start
Reconnaissance: Interpreting Results
13
Start
Countermeasures: Network Segmentation
14
Start
Countermeasures: Honeypots and Sinkholes
15
Start
Countermeasures: System Hardening and NAC
16
Start
Security Practices: Reverse Engineering
17
Start
Security Practices: Penetration Testing
18
Start
Security Practices: Training and Risk Evaluation
  1. VULNERABILITY MANAGEMENT
19
Start
Vulnerability Management Process
20
Start
Vulnerability Management: Scan Configuration
21
Start
Vulnerability Management CVSS
22
Start
Vulnerability Management: CVSS Part 2
23
Start
Vulnerability Management: Remediation
24
Start
Scan Results Verification
25
Start
Common Vulnerabilities
26
Start
Common Vulnerabilities Part 2
27
Start
Common Vulnerabilities Part 3
28
Start
Common Vulnerabilities Part 4
29
Start
Common Vulnerabilities Part 5
  1. CYBER INCIDENT RESPONSE
30
Start
Threat Classification
31
Start
Severity and Prioritization
32
Start
Forensics Toolkit
33
Start
Incident Response Plan
34
Start
Forensic Suites and Utilities
35
Start
Forensic Suites and Utilities Part 2
36
Start
Forensic Suites and Utilities Part 3
37
Start
Forensic Suites and Utilities Part 4
38
Start
CSIRT Roles and Communication
39
Start
Indicator of Compromise: Network Symptoms
40
Start
Indicators of Compromise: Host and App Symptoms
41
Start
Recovery and Post-Incident Response
42
Start
Recovery and Post-Incident Response Part 2
  1. SECURITY ARCHITECTURE AND TOOLSETS
43
Start
Cybersecurity Frameworks
44
Start
Cybersecurity Frameworks Part 2
45
Start
Policies, Controls and Procedures
46
Start
Policies, Controls and Procedures Part 2
47
Start
Identity and Access Managemnt
48
Start
Identity and Access Management Part 2
49
Start
Compensating Controls and Architecture
50
Start
Compensating Controls and Architecture Part 2
51
Start
Compensating Controls and Architecture Part 3
52
Start
Security Tools and Technologies
53
Start
Security Tools and Technologies Part 2
54
Start
Security Tools and Technologies Part 3
55
Start
Software Development Security
56
Start
Software Development Security Part 2
EDUTAINMENT COURSE
?Interactive and entertaining talk-show style format presented by industry leading experts.
  • 25:42:00
    Hours Of learning
  • Receive a Certificate of Excellence on successful completion
  • Presented by highly qualified, industry leading experts
  • 12 Months access
  • 10-Day money-back guarantee