CompTIA Cybersecurity Analyst (CySA+) Training Course Outline
Overview
This course is intended for those wishing to qualify with CompTIA CySA+ Cybersecurity Analyst Certification. CompTIA's CySA+ Certification is an intermediate-level certificate for IT professionals with previous experience of working in the field of IT security. The CompTIA CySA+ examination is designed for IT security analysts, vulnerability analysts, or threat intelligence analysts. The exam will certify that the successful candidate has the knowledge and skills required to configure and use threat detection tools, perform data analysis, and interpret the results to identify vulnerabilities, threats, and risks to an organization with the end goal of securing and protecting applications and systems within an organization.
Certification track
This courseware bears the seal of CompTIA Approved Quality Content. This seal signifies this content covers 100% of the exam objectives and implements important instructional design principles. CompTIA recommends multiple learning tools to help increase coverage of the learning objectives. The contents of this training material was created for the CompTIA CySA+ Cybersecurity Analyst Certification CS0-002 exam.
Exam Prep Software
All of our CompTIA classes include access to web-based practice exams. CompTIA certification exams are very rigorous and challenging. By studying after the class and using these practice exams, you will greatly improve your chances of passing the actual certification exam the first time. Exam prep software is included with all CompTIA classes delivered by ONLC Training Centers.
ONLCs Exam Pass Guarantee
ONLCs CompTIA certification classes come with an Exam Pass Guarantee. What that essentially means is that we want to make sure that everyone is taking advantage of the Practice Test that we are providing and achieve and 85% or better in Certification Mode prior to us releasing the initial exam voucher. The practice test is typically ordered the first day of class and emailed to each student. Once you email us at
[email protected] with proof of the 85% or better, we will go ahead and release the exam voucher to you within 24 hours. Should you fail on the first attempt, we will then give you a second voucher. However, should you decide to not take the practice exam or to take the exam without first achieving the 85% in certification mode, the Exam Pass is null and void. Please read through our:
Exam Pass Guarantee
Additional Notes Regarding CompTIA Certification Exams
As with most professional IT certifications, many addition hours of study are required before the class (meeting the prerequisites) and after the class (reviewing exam objectives and practice questions). Expect to spend a significant number of hours studying outside of the class before you take a CompTIA or any other IT professional exam.
Target audience and course prerequisites
CompTIA CySA+ certification is aimed at IT professionals with (or seeking) job roles such as IT Security Analyst, Security Operations Center (SOC) Analyst, Vulnerability Analyst, Cybersecurity Specialist, Threat
Intelligence Analyst, and Security Engineer.
Ideally, you should have successfully completed:
CompTIA Network+ Certification AND
Security+ Certification courses or have equivalent knowledge before attending this training.
Specifically, it is recommended that you have the following skills and knowledge before starting this course:
◾ Know basic network terminology and functions (such as OSI Model, Topology, Ethernet, Wi-Fi, switches, routers).
◾ Understand TCP/IP addressing, core protocols, and troubleshooting tools.
◾ Identify network attack strategies and defenses.
◾ Know the technologies and uses of cryptographic standards and products.
◾ Identify network- and host-based security technologies and practices.
◾ Describe the standards and products used to enforce security on web and communications technologies.
Course Outline
Module 1 Threat Management 1
◾Cybersecurity Analysts
Cybersecurity Roles and Responsibilities
Frameworks and Security Controls
Risk Evaluation
Penetration Testing Processes
◾Reconnaissance Techniques
The Kill Chain
Open Source Intelligence
Social Engineering
Topology Discovery
Service Discovery
OS Fingerprinting
Module 2 Threat Management 2
◾Security Appliances
Configuring Firewalls
Intrusion Detection and Prevention
Configuring IDS
Malware Threats
Configuring Anti-virus Software
Sysinternals
Enhanced Mitigation Experience Toolkit
◾Logging and Analysis
Packet Capture
Packet Capture Tools
Monitoring Tools
Log Review and SIEM
SIEM Data Outputs
SIEM Data Analysis
Point-in-Time Data Analysis
Module 3 Vulnerability Management
◾Managing Vulnerabilities
Vulnerability Management Requirements
Asset Inventory
Data Classification
Vulnerability Management Processes
Vulnerability Scanners
Microsoft Baseline Security Analyzer
Vulnerability Feeds and SCAP
Configuring Vulnerability Scans
Vulnerability Scanning Criteria
Exploit Frameworks
◾Remediating Vulnerabilities
Analyzing Vulnerability Scans
Remediation and Change Control
Remediating Host Vulnerabilities
Remediating Network Vulnerabilities
Remediating Virtual Infrastructure Vulnerabilities
◾Secure Software Development
Software Development Lifecycle
Software Vulnerabilities
Software Security Testing
Interception Proxies
Web Application Firewalls
Source Authenticity
Reverse Engineering
Module 4 Cyber Incident Response
◾Incident Response
Incident Response Processes
Threat Classification
Incident Severity and Prioritization
Types of Data
◾Forensics Tools
Digital Forensics Investigations
Documentation and Forms
Digital Forensics Crime Scene
Digital Forensics Kits
Image Acquisition
Password Cracking
Analysis Utilities
◾Incident Analysis and Recovery
Analysis and Recovery Frameworks
Analyzing Network Symptoms
Analyzing Host Symptoms
Analyzing Data Exfiltration
Analyzing Application Symptoms
Using Sysinternals
Containment Techniques
Eradication Techniques
Validation Techniques
Corrective Actions
Module 5 Security Architecture
◾Secure Network Design
Network Segmentation
Blackholes, Sinkholes, and Honeypots
System Hardening
Group Policies and MAC
Endpoint Security
◾Managing Identities and Access
Network Access Control
Identity Management
Identity Security Issues
Identity Repositories
Context-based Authentication
Single Sign On and Federations
Exploiting Identities
Exploiting Web Browsers and Applications
◾Security Frameworks and Policies
Frameworks and Compliance
Reviewing Security Architecture
Procedures and Compensating Controls
Verifications and Quality Control
Security Policies and Procedures
Personnel Policies and Training
View outline in Word
XCSA02