Course Summary

This CompTIA Cybersecurity Analyst (CySA+) course shares preparation hints and test-taking tips, helps you identify areas of weakness and improves both your conceptual knowledge and hands-on skills, including threat and vulnerability management; software and system security; security operations and monitoring; incident response; and compliance and assessment.

The goal of this course is to provide you with all the tools you need to prepare for the COMPTIA: Cybersecurity Analyst (CySA+) exam — including text explanations, key tips, key terms, self-assessment questions, and practice exams— to increase your chances of passing the exam on your first try.

Methodology:
  • Lessons
  • Video learning
  • MeasureUp Practice Test. Practice Mode with remediation and Certification mode to simulate the test day experience.
  • Labs
Duration: 

Approximately 40 hours of primary course content. Each learner will progress at their own rate.

Audience:

IT security analysts, vulnerability analysts and threat analysts who have the knowledge and skills required to leverage intelligence and threat detection techniques; analyze and interpret data, identify and address vulnerabilities, suggest preventative measures, and effectively respond to and recover from incidents.

Prerequisites:
  • Four years of hands-on information security or related experience
  • If using this course for an additional certification, or to keep skill sharp, it provides a wide review of many non-vendor specific skills.
  • Network+ or Security+ certification.
Course Outline:

Upon successful completion of this course, students should be able to:

  • Describe vulnerability management activities
  • Implement controls to mitigate attacks and software vulnerabilities
  • Understand security solutions for infrastructure management
  • Explain software and hardware assurance best practices
  • Understand and apply the appropriate incident response
  • Apply security concepts in support of organizational risk mitigation

Domain 1: Threat and Vulnerability Management

  • Lesson 1: The Importance of Threat Data and Intelligence
  • Lesson 2: Utilizing Threat Intelligence to Support Organizational Security
  • Lesson 3: Vulnerability Management Activities
  • Lesson 4: Analyzing Assessment Output
  • Lesson 5: Threats and Vulnerabilities Associated with Specialized Technology
  • Lesson 6: Threats and Vulnerabilities Associated with Operating in the Cloud
  • Lesson 7: Implementing Controls to Mitigate Attack sand Software Vulnerabilities

Domain 2: Software and Systems Security

  • Lesson 8: Security Solutions for Infrastructure Management
  • Lesson 9: Software Assurance Best Practices
  • Lesson 10: Hardware Assurance Best Practices

Domain 3: Security Operation and Monitoring

  • Lesson 11: Analyzing Data as Part of Security Monitoring Activities
  • Lesson 12: Implementing Configuration Changes to Existing Controls to Improve Security
  • Lesson 13: The Importance of Proactive Threat Hunting
  • Lesson 14: Automation Concepts and Technologies

Domain 4: Incident Response

  • Lesson 15: The Incident Response Process
  • Lesson 16: Applying the Appropriate Incident Response Procedure
  • Lesson 17: Analyzing Potential Indicators of Compromise
  • Lesson 18: Utilizing Basic Digital Forensics Techniques

Domain 5: Compliance and Assessment

  • Lesson 19: The Importance of Data Privacy and Protection
  • Lesson 20: Applying Security Concepts in Support of Organizational Risk Mitigation
  • Lesson 21: The Importance of Frameworks, Policies, Procedures, and Controls
  • Lesson 22: Final Preparation