CompTIA Cybersecurity Analyst (CySA+)

Course Summary

This CompTIA Cybersecurity Analyst (CySA+) course shares preparation hints and test-taking tips, helps you identify areas of weakness and improves both your conceptual knowledge and hands-on skills, including threat and vulnerability management; software and system security; security operations and monitoring; incident response; and compliance and assessment.

The goal of this course is to provide you with all the tools you need to prepare for the COMPTIA: Cybersecurity Analyst (CySA+) exam — including text explanations, key tips, key terms, self-assessment questions, and practice exams— to increase your chances of passing the exam on your first try.

Methodology:

  • Lessons
  • Video learning
  • MeasureUp Practice Test. Practice Mode with remediation and Certification mode to simulate the test day experience.
  • Labs

Duration:

Approximately 4-6 Days / 40 hours of primary course content. Each learner will progress at their own rate.

Audience:

IT security analysts, vulnerability analysts and threat analysts who have the knowledge and skills required to leverage intelligence and threat detection techniques; analyze and interpret data, identify and address vulnerabilities, suggest preventative measures, and effectively respond to and recover from incidents.

Prerequisites:

  • Four years of hands-on information security or related experience
  • If using this course for an additional certification, or to keep skill sharp, it provides a wide review of many non-vendor specific skills.
  • Network+ or Security+ certification.

Course Outcome:

Upon successful completion of this course, students should be able to:

  • Describe vulnerability management activities
  • Implement controls to mitigate attacks and software vulnerabilities
  • Understand security solutions for infrastructure management
  • Explain software and hardware assurance best practices
  • Understand and apply the appropriate incident response
  • Apply security concepts in support of organizational risk mitigation

Course Outline:

Lesson 1: Threat and Vulnerability Management

  • Skill 1: The Importance of Threat Data and Intelligence
  • Skill 2: Utilizing Threat Intelligence to Support Organizational Security
  • Skill 3: Vulnerability Management Activities
  • Skill 4: Analyzing Assessment Output
  • Skill  5: Threats and Vulnerabilities Associated with Specialized Technology
  • Skill 6: Threats and Vulnerabilities Associated with Operating in the Cloud
  • Skill 7: Implementing Controls to Mitigate Attack sand Software Vulnerabilities

Lesson 2: Software and Systems Security

  • Skill 8: Security Solutions for Infrastructure Management
  • Skill 9: Software Assurance Best Practices
  • Skill 10: Hardware Assurance Best Practices

Lesson 3: Security Operation and Monitoring

  • Skill 11: Analyzing Data as Part of Security Monitoring Activities
  • Skill 12: Implementing Configuration Changes to Existing Controls to Improve Security
  • Skill 13: The Importance of Proactive Threat Hunting
  • Skill 14: Automation Concepts and Technologies

Lesson 4: Incident Response

  • Skill 15: The Incident Response Process
  • Skill 16: Applying the Appropriate Incident Response Procedure
  • Skill 17: Analyzing Potential Indicators of Compromise
  • Skill 18: Utilizing Basic Digital Forensics Techniques

Lesson 5: Compliance and Assessment

  • Skill 19: The Importance of Data Privacy and Protection
  • Skill 20: Applying Security Concepts in Support of Organizational Risk Mitigation
  • Skill 21: The Importance of Frameworks, Policies, Procedures, and Controls
  • Skill 22: Final Preparation