CompTIA Cybersecurity Analyst (CySA+) Training Course Outline
Special Note to New Hampshire Residents
This course has not yet been approved by the New Hampshire Department of Education. Please contact us for an update on when the class will be available in New Hampshire.
This training is for CompTIA CySA+ Cybersecurity Analyst Certification exam CS0-003. This course is intended for those wishing to qualify with CompTIA CySA+ Cybersecurity Analyst Certification. CompTIA's CySA+ Certification is an intermediate-level certificate for IT professionals with previous experience of working in the field of IT security. The CompTIA CySA+ examination is designed for IT security analysts, vulnerability analysts, or threat intelligence analysts. The exam will certify that the successful candidate has the knowledge and skills required to configure and use threat detection tools, perform data analysis, and interpret the results to identify vulnerabilities, threats, and risks to an organization with the end goal of securing and protecting applications and systems within an organization.
This courseware bears the seal of CompTIA Approved Quality Content. This seal signifies this content covers 100% of the exam objectives and implements important instructional design principles. CompTIA recommends multiple learning tools to help increase coverage of the learning objectives. The contents of this training material was created for the CompTIA CySA+ Cybersecurity Analyst Certification CS0-003 exam.
Exam Prep Software--INCLUDED!
All of our CompTIA classes include access to web-based practice exams. CompTIA certification exams are very rigorous and challenging. By studying after the class and using these practice exams, you will greatly improve your chances of passing the actual certification exam the first time. Exam prep software is included with all CompTIA classes delivered by ONLC Training Centers.
ONLCs Exam Pass Guarantee--INCLUDED!
ONLCs CompTIA certification classes come with an Exam Pass Guarantee. What that essentially means is that we want to make sure that everyone is taking advantage of the Practice Test that we are providing and achieve and 85% or better in Certification Mode prior to us releasing the initial exam voucher. The practice test is typically ordered the first day of class and emailed to each student. Once you email us at [email protected]
with proof of the 85% or better, we will go ahead and release the exam voucher to you within 24 hours. Should you fail on the first attempt, we will then give you a second voucher. However, should you decide to not take the practice exam or to take the exam without first achieving the 85% in certification mode, the Exam Pass is null and void. Please read through our:
Exam Pass Guarantee
Additional Notes Regarding CompTIA Certification Exams
As with most professional IT certifications, many addition hours of study are required before the class (meeting the prerequisites) and after the class (reviewing exam objectives and practice questions). Expect to spend a significant number of hours studying outside of the class before you take a CompTIA or any other IT professional exam.
Target audience and course prerequisites
CompTIA CySA+ certification is aimed at IT professionals with (or seeking) job roles such as IT Security Analyst, Security Operations Center (SOC) Analyst, Vulnerability Analyst, Cybersecurity Specialist, Threat
Intelligence Analyst, and Security Engineer.
Ideally, you should have successfully completed:
CompTIA Network+ Certification
AND Security+ Certification
courses or have equivalent knowledge before attending this training.
Specifically, it is recommended that you have the following skills and knowledge before starting this course:
◾ Know basic network terminology and functions (such as OSI Model, Topology, Ethernet, Wi-Fi, switches, routers).
◾ Understand TCP/IP addressing, core protocols, and troubleshooting tools.
◾ Identify network attack strategies and defenses.
◾ Know the technologies and uses of cryptographic standards and products.
◾ Identify network- and host-based security technologies and practices.
◾ Describe the standards and products used to enforce security on web and communications technologies.
Lesson 1: Understanding Vulnerability Response, Handling and Management
Topic 1A: Understanding Cybersecurity Leadership Concepts
Topic 1B: Exploring Copntrol Types and Methods
Topic 1C: Explaining Patch Management Concepts
Lesson 2: Exploring Threat Intelligence and Threat Hunting Concepts
Topic 2A: Exploring Threat Actor Concepts
Topic 2B: Identifying Active Threats
Topic 2C: Exploring Threat-Hunting Concepts
Lesson 3: Explaining Important System and Network Architecture Concepts
Topic 3A: Reviewing System and Network Architecture Concepts
Topic 3B: Exploring Identity and Access Managment (IAM)
Topic 3C: Maintaining Operational Visibility
Lesson 4: Understanding Process Improvement in Security Operations
Topic 4A: Exploring Leadership in Security Operations
Topic 4B: Understanding Technology for Security Operations
Lesson 5: Implementing Vulnerability Scanning Methods
Topic 5A: Explaining Compliance Requirements
Topic 5B: Understanding Vulnerability Scanning Methods
Topic 5C: Exploring Special Considerations in Vulnerability Scanning
Lesson 6: Performaning Vulnerability Analysis
Topic 6A: Understanding Vulnerability Scoring Concepts
Topic 6B: Exploring Vulnerability Context Considerations
Lesson 7: Communicating Vulnerability Information
Topic 7A: Explaining Effective Communication Concepts
Topic 7B: Understanding Vulnerability Reporting Outcomes and Action Plans
Lesson 8: Explaining Incident Response Activities
Topic 8A: Exploring Incident Response Planning
Topic 8B: Performing Incident Response Activities
Lesson 9: Demonstrating Incident Response Communication
Topic 9A: Understanding Incident Response Communication
Topic 9B: Analyzing Incident Response Activities
Lesson 10: Applying Tools to Identify Malicious Activity
Topic 10A: Identifying Malicious Activity
Topic 10B: Explaining Attack Methodology Frameworks
Topic 10C: Explaining Techniques for Identifying Malicious Activity
Lesson 11: Analyzing Potentially Malicious Activity
Topic 11A: Exploring Network Attack Indicators
Topic 11B: Exploring Host Attack Indicators
Topic 11C: Exploring Vulnerability Assessment Tools
Lesson 12: Understanding Application Vulnerability Assessment
Topic 12A: Analyzing Web Vulnerabilities
Topic 12B: Analyzing Cloud VulnerabilitiES
Lesson 13: Exploring Scripting Tools and Analysis Concepts
Topic 13A: Understanding Scripting Languages
Topic 13B: Identifying Malicious Activity Through Analysis
Lesson 14: Understanding Application Security and Attack Mitigation
Topic 14A: Exploring Secure Software Development Practices
Topic 14B: Recommending Controls to Mitigate Successful Application Attacks
Topic 14C: Implementing Controls to Prevent Attacks
View outline in Word