Welcome to ONLC Training Centers


CompTIA On-Demand: CompTIA Cybersecurity Analyst (CSA+) Training Course Outline

 (5 days)
Version 001

*** Note: This is an On-Demand Self Study Class, 5-days of content, $1,295 ***
You can take this class at any time, there are no set dates. It covers the same content as the 5-day instructor-led class of the same name. The cost for this CompTIA On-Demand class is $1,295. Customers must call us directly to purchase this class at 800-288-8221.

CompTIA On-Demand Learner Profiles
CompTIA On-Demand is a self-study training solution that was designed for two types of learners. First, CompTIA On-Demand is a great fit for individuals with considerable IT experience who don't need a traditional 5-day class to prepare for a CompTIA exam. They can pick and choose topics to make the most effective use of their time. Second, CompTIA On-Demand is perfect for highly-motivated individuals who are new to a technology and need to space their learning over a period of weeks or months. These learners can take their time and repeat sections as needed until they master the new concepts.

About CompTIA On-Demand
Our CompTIA On-Demand classes are self-study courses with 30 to 40 hours of content. They include hours of videos, hands-on labs using the actual software, and knowledge checks that mirror the content found in the traditional live instructor-led version of this course. Those features are all part of the standard CompTIA On-Demand training. But don't settle for any other self-study class! Check out the "ONLC Extras" that you get when purchasing this course from us.

ONLC Extras
ONLC Training Centers bundles in valuable extras with our CompTIA On-Demand Courses. These extras are not available from other training companies.

Certification Exam Vouchers Included (A $320 value!) All of our CompTIA classes include the cost of the CompTIA exam vouchers. With this class, a voucher for exam CS0-001 is included--a $320 value. Students must schedule when and where they will take the exam through Pearson Vue, the CompTIA testing service.

Exam Prep Software. This practice exam software will help you prepare for you actual certification exam. These dynamic practice tests provide links to the training content. If you answer a question wrong, you can go back to that topic for review. (12-Month Access.)

Classroom Live Labs. These labs give you access to real equipment without the need for time-consuming installation and setup. You get easy browser-based access to the equipment you need to work through the labs that go with the course content. Requires only a browser and high-speed internet access. (12-Month Access.)

24/7 Online Support. You will be able to chat online with a content matter expert while you are taking your CompTIA On-Demand class. And, with your permission, the expert can even take over your computer to provide with assistance with your labs. (3-Month Access.)

ILT Participant Option. You've purchased CompTIA On-Demand, have gone through the training and decided that you still want a live class. Just pay difference between CompTIA On-Demand course and and the Instructor-Led Training (ILT) class and you can have a seat in our live class. Get both self-study and live, instructor-led training for the retail price of the instructor-led class alone!

Do You Still Prefer a Live, Instructor-led Class?
Already know CompTIA On-Demand training is not right for you? We also offer this same course content in a live, instructor-led format. For more details, click on the link below:
Instructor-led CompTIA Cybersecurity Analyst (CSA+) Certification Training

COURSE DETAILS

Overview
This self-study CompTIA® Security+® course (equivalent to our 5-day instructor-led course) is intended for those wishing to qualify with CompTIA CSA+ Cybersecurity Analyst Certification. CompTIA's CSA+ Certification is an intermediate-level certificate for IT professionals with previous experience of working in the field of IT security. The CompTIA CSA+ examination is designed for IT security analysts, vulnerability analysts, or threat intelligence analysts. The exam will certify that the successful candidate has the knowledge and skills required to configure and use threat detection tools, perform data analysis, and interpret the results to identify vulnerabilities, threats, and risks to an organization with the end goal of securing and protecting applications and systems within an organization.

Certification track
This courseware bears the seal of CompTIA Approved Quality Content. This seal signifies this content covers 100% of the exam objectives and implements important instructional design principles. CompTIA recommends multiple learning tools to help increase coverage of the learning objectives. The contents of this training material were created for the CompTIA CSA+ Cybersecurity Analyst Certification CS0-001 exam covering the 2017 Edition certification exam objectives.

Target audience and course prerequisites
CompTIA CSA+ certification is aimed at IT professionals with (or seeking) job roles such as IT Security Analyst, Security Operations Center (SOC) Analyst, Vulnerability Analyst, Cybersecurity Specialist, Threat
Intelligence Analyst, and Security Engineer.

Ideally, you should have successfully completed:
CompTIA Network+ Certification AND Security+ Certification courses or have equivalent knowledge before attending this training.

Specifically, it is recommended that you have the following skills and knowledge before starting this course:
◾ Know basic network terminology and functions (such as OSI Model, Topology, Ethernet, Wi-Fi, switches, routers).
◾ Understand TCP/IP addressing, core protocols, and troubleshooting tools.
◾ Identify network attack strategies and defenses.
◾ Know the technologies and uses of cryptographic standards and products.
◾ Identify network- and host-based security technologies and practices.
◾ Describe the standards and products used to enforce security on web and communications technologies.

Course Outline

Module 1 – Threat Management 1
◾Cybersecurity Analysts
• Cybersecurity Roles and Responsibilities
• Frameworks and Security Controls
• Risk Evaluation
• Penetration Testing Processes
◾Reconnaissance Techniques
• The Kill Chain
• Open Source Intelligence
• Social Engineering
• Topology Discovery
• Service Discovery
• OS Fingerprinting

Module 2 – Threat Management 2
◾Security Appliances
• Configuring Firewalls
• Intrusion Detection and Prevention
• Configuring IDS
• Malware Threats
• Configuring Anti-virus Software
• Sysinternals
• Enhanced Mitigation Experience Toolkit
◾Logging and Analysis
• Packet Capture
• Packet Capture Tools
• Monitoring Tools
• Log Review and SIEM
• SIEM Data Outputs
• SIEM Data Analysis
• Point-in-Time Data Analysis

Module 3 – Vulnerability Management
◾Managing Vulnerabilities
• Vulnerability Management Requirements
• Asset Inventory
• Data Classification
• Vulnerability Management Processes
• Vulnerability Scanners
• Microsoft Baseline Security Analyzer
• Vulnerability Feeds and SCAP
• Configuring Vulnerability Scans
• Vulnerability Scanning Criteria
• Exploit Frameworks
◾Remediating Vulnerabilities
• Analyzing Vulnerability Scans
• Remediation and Change Control
• Remediating Host Vulnerabilities
• Remediating Network Vulnerabilities
• Remediating Virtual Infrastructure Vulnerabilities
◾Secure Software Development
• Software Development Lifecycle
• Software Vulnerabilities
• Software Security Testing
• Interception Proxies
• Web Application Firewalls
• Source Authenticity
• Reverse Engineering

Module 4 – Cyber Incident Response
◾Incident Response
• Incident Response Processes
• Threat Classification
• Incident Severity and Prioritization
• Types of Data
◾Forensics Tools
• Digital Forensics Investigations
• Documentation and Forms
• Digital Forensics Crime Scene
• Digital Forensics Kits
• Image Acquisition
• Password Cracking
• Analysis Utilities
◾Incident Analysis and Recovery
• Analysis and Recovery Frameworks
• Analyzing Network Symptoms
• Analyzing Host Symptoms
• Analyzing Data Exfiltration
• Analyzing Application Symptoms
• Using Sysinternals
• Containment Techniques
• Eradication Techniques
• Validation Techniques
• Corrective Actions

Module 5 – Security Architecture
◾Secure Network Design
• Network Segmentation
• Blackholes, Sinkholes, and Honeypots
• System Hardening
• Group Policies and MAC
• Endpoint Security
◾Managing Identities and Access
• Network Access Control
• Identity Management
• Identity Security Issues
• Identity Repositories
• Context-based Authentication
• Single Sign On and Federations
• Exploiting Identities
• Exploiting Web Browsers and Applications
◾Security Frameworks and Policies
• Frameworks and Compliance
• Reviewing Security Architecture
• Procedures and Compensating Controls
• Verifications and Quality Control
• Security Policies and Procedures
• Personnel Policies and Training

View outline in Word

GCSA01

Attend hands-on, instructor-led CompTIA On-Demand: CompTIA Cybersecurity Analyst (CSA+) Training training classes at ONLC's more than 300 locations. Not near one of our locations? Attend these same live classes from your home/office PC via our Remote Classroom Instruction (RCI) technology.

For additional training options, check out our list of Courses and select the one that's right for you.

Microsoft Gold Partner
Need a price quote?

Follow the link to our self-service price quote form to generate an email with a price quote.

Attend computer classes from ONLC Training Centers Request a copy via mail

GENERAL INFO

Class Format
Class Policies
Student Reviews

Bookmark and Share


HAVE QUESTIONS?
First Name

Last Name

Company

Phone

Email

Location

Question/Comment



ONLC TRAINING CENTERS
800-288-8221
www.onlc.com