CompTIA On-Demand: CompTIA Cybersecurity Analyst (CySA+) Training Course Outline
***This is an On-Demand (self-study) course, 180-day, 24/7 access via the internet***
(Applicable State and Local taxes may be added for On-Demand purchases, depending on your location.)
You may take this course at any time; there are no set dates. The course includes hours of videos, demonstrations, lab exercises and printed courseware. Note: The 180-day course access period begins at time of purchase.
The Cybersecurity Analyst (Exam CSO-002) course will teach students about IT security and security analysis. Topics covered include threats and vulnerabilities, infrastructure management,monitoring security options, incident response, compliance and assessment, and more.
CompTIA CySA+ certification is aimed at IT professionals with (or seeking) job roles such as IT Security Analyst, Security Operations Center (SOC) Analyst, Vulnerability Analyst, Cybersecurity Specialist, Threat Intelligence Analyst, and Security Engineer.
Ideally, you should have successfully completed:
CompTIA Network+ Certification AND Security+ Certification courses or have equivalent knowledge before attending this training.
Specifically, it is recommended that you have the following skills and knowledge before starting this course:
◾ Know basic network terminology and functions (such as OSI Model, Topology, Ethernet, Wi-Fi, switches, routers).
◾ Understand TCP/IP addressing, core protocols, and troubleshooting tools.
◾ Identify network attack strategies and defenses.
◾ Know the technologies and uses of cryptographic standards and products.
◾ Identify network- and host-based security technologies and practices.
◾ Describe the standards and products used to enforce security on web and communications technologies.
ONLC Training Centers bundles in valuable extras with our CompTIA On-Demand Courses. These extras are not available from other training companies.
Certification Exam Vouchers Included (A $381 value!)
All of our CompTIA classes include the cost of the CompTIA exam vouchers. Students must schedule when and where they will take the exam through Pearson Vue, the CompTIA testing service.
Exam Prep Software (A $89 value!
This practice exam software will help you prepare for you actual certification exam. These dynamic practice tests provide links to the training content. If you answer a question wrong, you can go back to that topic for review. (12-Month Access.)
Classroom Live Labs.
These labs give you access to real equipment without the need for time-consuming installation and setup. You get easy browser-based access to the equipment you need to work through the labs that align with the course content.Requires only a browser and high-speed internet access.
24/7 Online Support.
You will be able to chat online with a content matter expert while you are taking your CompTIA On-Demand class. And, with your permission, the expert can even take over your computer to provide with assistance with your labs. (3-Month Access.)
ONLC’s Exam Pass Guarantee
ONLC’s CompTIA certification classes come with an Exam Pass Guarantee. What that essentially means is that we want to make sure that everyone is taking advantage of the Practice Test that we are providing and achieve a score of 85% or better in Certification Mode prior to us releasing the initial exam voucher.
The practice test is ordered upon request. Once you provide a copy of the course Certificate of Completion along with lab completion documentation we will email the web-based practice test. After achieving a score of 85% or better, email proof to [email protected]
and we will go ahead and release the exam voucher to you within 24 business hours. Should you fail the exam on the first attempt, after submitting your authorized exam score and additional study, we will then provide a second voucher. However, should you decide not to take the practice exam or to take the exam without first achieving the 85% in certification mode, the Exam Pass is null and void. Please read through our:
Exam Pass Guarantee
Additional Notes Regarding CompTIA Certification Exams
As with most professional IT certifications, many additional hours of study are required before the class (meeting the prerequisites) and after the class (reviewing exam objectives and practice questions). Expect to spend a significant number of hours studying before you take a CompTIA or any other IT professional exam.
CompTIA certification exams are very rigorous and challenging. By studying using the practice exams, you will greatly improve your chances of passing the actual certification exam the first time.
Note: For the most up-to-date exam and exam prerequisite information, please visit: https://certification.comptia.org/training/exam-objectives
Do You Still Prefer a Live, Instructor-led Class?
Already know CompTIA On-Demand training is not right for you? We also offer this same course content in a live, instructor-led format. For more details, click on the link below:
Instructor-led CompTIA Cybersecurity Analyst (CySA+) Certification Training
This course takes 5 days to complete and includes 11h 29m of video presentation plus hours of practice labs.
Chapter 1 - Managing Threats and Vulnerabilities
Managing Threats and Vulnerabilities
Topic A: Threats Data and Intelligence
Importance of Threat Data
Proprietary / Closed Source Intelligence
STIX Domain Objects
Trusted Automated Exchange of Indicator Information (TAXII)
Topic B: Utilizing Threat Intelligence
Threat Intelligence and Operational Security
MITRE ATT&CK (cont.)
The Diamond Model of Intrusion Analysis
Threat Intelligence Sharing with Supported Functions
Topic C: Vulnerability Management
Introduction to Vulnerability Management
Remediation and Mitigation
Additional Scanning Considerations
Inhibitors to Remediation
Topic D: Using Vulnerability Assessment Tools
Web Application Scanners
Chapter 2 - Specialized Threats and Vulnerabilities
Topic A: Threats and Vulnerabilities with Specialized Technology
Internet of Things (IoT)
Other Specialized Devices
Other Specialized Devices (cont.)
Topic B:Threats and Vulnerabilities for Cloud Environments
Cloud Services Models
Software as a Service (SaaS)
Platform as a Service (PaaS)
Infrastructure as a Service (IaaS)
Cloud Deployment Models
Additional Cloud Concepts
Insecure Application Programming Interface (API)
Additional Cloud Vulnerabilities
Chapter 3 - Attacks and Software Vulnerability Mitigation
Topic A: Understanding Attack Types
Buffer Overflow Attacks
Topic B: Software Vulnerabilities
Improper Error Handling
Insecure Object Reference
Sensitive Data Exposure
Chapter 4 - Infrastructure Management
Topic A: Network Security Solutions
Virtual Private Cloud Network
Virtual Private Network
Topic B: Identity and Access Management
Access Control Types
Cloud Access Security Broker
Topic C: Additional Solutions
Monitoring and Logging
Chapter 5 - Hardware and Software Assurance
Hardware and Software Assurance
Topic A: Hardware Assurance Best Practices
Hardware Root of Trust
Trusted Platform Module
Hardware Security Module
Unified Extensible Firmware Interface (UEFI)
Measured Boot and Attestation
Additional Hardware Options
Topic B: Software Assurance Best Practices
Platforms and Software Architecture
Software Development Lifecycle
Software Assessment Methods
Chapter 6 - Monitoring Security Options
Monitoring Security Options
Topic A: Security Data Analytics
Topic B: Endpoint and Network Analysis
Topic C: Email Analysis--
Chapter 7 - Implementing Security Changes
Topic A: Security Configuration Management
Fundamental Identity Configuration
Intrusion Detection Systems (IDS)
Data Loss Prevention
Endpoint Detection and Response
Network Access Control
Topic B: Threat Hunting
Understanding Threat Hunting
Threat Hunting Process
Profiling Threat Actors
Threat Hunting Tactics
Attack Surface Reduction
Topic C: Automating Security
Security Automation Concepts
Security Content Automation Protocol
Chapter 8 - Incident Response
Topic A: Importance of Incident Response
Incident Response Process
Establishing Communications Processes
Identifying Critical Data
Topic B: Incident Response Procedures
Incident Response Cycle
Detection and Analysis
Eradication and Recovery
Topic C: Analyzing Indicators of Compromise
Topic D: Utilizing Digital Forensics Techniques
Using Network Tools
Capturing Endpoint Systems
Additional Forensics Situations
Building a Forensics Kit
Chapter 9 - Compliance and Assessment
Topic A: Data Privacy and Protection
Security vs. Privacy
Data Retention Standards
Data Loss Prevention
Topic B: Risk Mitigation
Business Impact Analysis
Risk Identification Process
Training and Exercises
Topic C: Policies and Procedures
Code of Conduct
Audits and Assessment
View outline in Word