Welcome to ONLC Training Centers

CompTIA On-Demand: CompTIA Cybersecurity Analyst (CySA+) Training

Price:$1295

Need a price quote?

Follow the link to our self-service price quote form to generate an email with a price quote.


CompTIA On-Demand: CompTIA Cybersecurity Analyst (CySA+) Training Course Outline

Please note: The CSO-002 exam is scheduled to retire December 05, 2023

***This is an On-Demand (self-study) course, 180-day, 24/7 access via the internet***
(Applicable State and Local taxes may be added for On-Demand purchases, depending on your location.)
You may take this course at any time; there are no set dates. The course includes hours of videos, demonstrations, lab exercises and printed courseware. Note: The 180-day course access period begins at time of purchase.

Overview
The Cybersecurity Analyst (Exam CSO-002) course will teach students about IT security and security analysis. Topics covered include threats and vulnerabilities, infrastructure management, monitoring security options, incident response, compliance and assessment, and more.

Target Student
CompTIA CySA+ certification is aimed at IT professionals with (or seeking) job roles such as IT Security Analyst, Security Operations Center (SOC) Analyst, Vulnerability Analyst, Cybersecurity Specialist, Threat Intelligence Analyst, and Security Engineer.

Course Prerequisites
Ideally, you should have successfully completed:
CompTIA Network+ Certification AND Security+ Certification courses or have equivalent knowledge before attending this training.

Specifically, it is recommended that you have the following skills and knowledge before starting this course:
◾ Know basic network terminology and functions (such as OSI Model, Topology, Ethernet, Wi-Fi, switches, routers).
◾ Understand TCP/IP addressing, core protocols, and troubleshooting tools.
◾ Identify network attack strategies and defenses.
◾ Know the technologies and uses of cryptographic standards and products.
◾ Identify network- and host-based security technologies and practices.
◾ Describe the standards and products used to enforce security on web and communications technologies.

ONLC Extras
ONLC Training Centers bundles in valuable extras with our CompTIA On-Demand Courses. These extras are not available from other training companies.

Certification Exam Vouchers Included (A $381 value!) All of our CompTIA classes include the cost of the CompTIA exam vouchers. Students must schedule when and where they will take the exam through Pearson Vue, the CompTIA testing service.

Exam Prep Software (A $89 value! This practice exam software will help you prepare for you actual certification exam. These dynamic practice tests provide links to the training content. If you answer a question wrong, you can go back to that topic for review. (12-Month Access.)

Classroom Live Labs. These labs give you access to real equipment without the need for time-consuming installation and setup. You get easy browser-based access to the equipment you need to work through the labs that align with the course content.Requires only a browser and high-speed internet access.

24/7 Online Support. You will be able to chat online with a content matter expert while you are taking your CompTIA On-Demand class. And, with your permission, the expert can even take over your computer to provide with assistance with your labs. (3-Month Access.)


ONLC’s Exam Pass Guarantee
ONLC’s CompTIA certification classes come with an Exam Pass Guarantee. What that essentially means is that we want to make sure that everyone is taking advantage of the Practice Test that we are providing and achieve a score of 85% or better in Certification Mode prior to us releasing the initial exam voucher.
The practice test is ordered upon request. Once you provide a copy of the course Certificate of Completion along with lab completion documentation we will email the web-based practice test. After achieving a score of 85% or better, email proof to [email protected] and we will go ahead and release the exam voucher to you within 24 business hours. Should you fail the exam on the first attempt, after submitting your authorized exam score and additional study, we will then provide a second voucher. However, should you decide not to take the practice exam or to take the exam without first achieving the 85% in certification mode, the Exam Pass is null and void. Please read through our:
Exam Pass Guarantee

Additional Notes Regarding CompTIA Certification Exams
As with most professional IT certifications, many additional hours of study are required before the class (meeting the prerequisites) and after the class (reviewing exam objectives and practice questions). Expect to spend a significant number of hours studying before you take a CompTIA or any other IT professional exam.
CompTIA certification exams are very rigorous and challenging. By studying using the practice exams, you will greatly improve your chances of passing the actual certification exam the first time.
Note: For the most up-to-date exam and exam prerequisite information, please visit: https://certification.comptia.org/training/exam-objectives

Do You Still Prefer a Live, Instructor-led Class?
Already know CompTIA On-Demand training is not right for you? We also offer this same course content in a live, instructor-led format. For more details, click on the link below:
Instructor-led CompTIA Cybersecurity Analyst (CySA+) Certification Training

Duration
This course takes 5 days to complete and includes 11h 29m of video presentation plus hours of practice labs.

Course Outline

Chapter 1 - Managing Threats and Vulnerabilities
Instructor Introduction
Course Introduction
Managing Threats and Vulnerabilities
Topic A: Threats Data and Intelligence
Importance of Threat Data
Open-Source Intelligence
Proprietary / Closed Source Intelligence
Intelligence Characteristics
Indicator Management
STIX Domain Objects
Trusted Automated Exchange of Indicator Information (TAXII)
OpenIoC
Threat Classification
Threat Actors
Intelligence Cycle
Information Sharing
Topic B: Utilizing Threat Intelligence
Threat Intelligence and Operational Security
Attack Frameworks
MITRE ATT&CK
MITRE ATT&CK (cont.)
The Diamond Model of Intrusion Analysis
Kill Chain
Threat Research
Threat Modeling
Threat Intelligence Sharing with Supported Functions
Topic C: Vulnerability Management
Introduction to Vulnerability Management
Vulnerability Identification
Validation Options
Remediation and Mitigation
Understanding Scanning
Additional Scanning Considerations
Inhibitors to Remediation
Topic D: Using Vulnerability Assessment Tools
Web Application Scanners
Infrastructure Scanners
Software Assessments
Enumeration
Wireless Assessments
Cloud Assessment

Chapter 2 - Specialized Threats and Vulnerabilities
Topic A: Threats and Vulnerabilities with Specialized Technology
Common Vulnerabilities
App Vulnerabilities
Internet of Things (IoT)
Other Specialized Devices
Other Specialized Devices (cont.)
Topic B:Threats and Vulnerabilities for Cloud Environments
Cloud Services Models
Software as a Service (SaaS)
Platform as a Service (PaaS)
Infrastructure as a Service (IaaS)
Cloud Deployment Models
Additional Cloud Concepts
Insecure Application Programming Interface (API)
Additional Cloud Vulnerabilities

Chapter 3 - Attacks and Software Vulnerability Mitigation
Topic A: Understanding Attack Types
Injection Attacks
Directory Traversal
Buffer Overflow Attacks
Privilege Escalation
Authentication Attacks
Topic B: Software Vulnerabilities
Improper Error Handling
Dereferencing
Insecure Object Reference
Race Conditions
Sensitive Data Exposure
Additional Vulnerabilities

Chapter 4 - Infrastructure Management
Topic A: Network Security Solutions
Network Architecture
Physical Network
Software-Defined Network
Virtual Private Cloud Network
Virtual Private Network
Virtualization Solutions
Network Segmentation
Topic B: Identity and Access Management
IAM Concepts
Privilege Management
Multifactor Authentication
Identity Federation
Access Control Types
Cloud Access Security Broker
Topic C: Additional Solutions
Monitoring and Logging
Cryptography

Chapter 5 - Hardware and Software Assurance
Hardware and Software Assurance
Topic A: Hardware Assurance Best Practices
Hardware Root of Trust
Trusted Platform Module
Hardware Security Module
eFuse
Unified Extensible Firmware Interface (UEFI)
Measured Boot and Attestation
Additional Hardware Options
Topic B: Software Assurance Best Practices
Platforms and Software Architecture
Service-Oriented Architecture
Software Development Lifecycle
Software Assessment Methods
Secure Coding

Chapter 6 - Monitoring Security Options
Monitoring Security Options
Topic A: Security Data Analytics
Monitoring Fundamentals
Aggregating Data
Data Analysis
Topic B: Endpoint and Network Analysis
Endpoint Security
Network Analysis
Log Review
Impact Analysis
Topic C: Email Analysis--
Social Engineering
Anti-SPAM

Chapter 7 - Implementing Security Changes
Topic A: Security Configuration Management
Fundamental Identity Configuration
Software Controls
Firewalls
Intrusion Detection Systems (IDS)
Data Loss Prevention
Endpoint Detection and Response
Network Access Control
Additional Techniques
Topic B: Threat Hunting
Understanding Threat Hunting
Threat Hunting Process
Establishing Hypothesis
Profiling Threat Actors
Threat Hunting Tactics
Attack Surface Reduction
Topic C: Automating Security
Security Automation Concepts
Workflow Orchestration
Orchestration Playbooks
Scripting
API Integration
REST Principles
Security Content Automation Protocol
Software Engineering

Chapter 8 - Incident Response
Topic A: Importance of Incident Response
Incident Response Process
Establishing Communications Processes
Internal Communications
External Communications
Identifying Critical Data
Topic B: Incident Response Procedures
Incident Response Cycle
Preparation Phase
Detection and Analysis
Containment
Containment Types
Eradication and Recovery
Post-Incident Activities
Topic C: Analyzing Indicators of Compromise
Network-related Indicators
Host-related Indicators
Application-related Indicators
Topic D: Utilizing Digital Forensics Techniques
Digital Forensics
Using Network Tools
Capturing Endpoint Systems
Additional Forensics Situations
Building a Forensics Kit

Chapter 9 - Compliance and Assessment
Topic A: Data Privacy and Protection
Security vs. Privacy
Data Types
Legal Requirements
Nontechnical Controls
Data Retention Standards
Technical Controls
Data Loss Prevention
Topic B: Risk Mitigation
Business Impact Analysis
BIA Steps
Risk Assessment
Risk Identification Process
Risk Calculation
Risk Prioritization
Security Controls
Training and Exercises
Topic C: Policies and Procedures
Code of Conduct
Control Types
Audits and Assessment

View outline in Word

GCSA02

Attend hands-on, instructor-led CompTIA On-Demand: CompTIA Cybersecurity Analyst (CySA+) Training training classes at ONLC's more than 300 locations. Not near one of our locations? Attend these same live classes from your home/office PC via our Remote Classroom Instruction (RCI) technology.

For additional training options, check out our list of Courses and select the one that's right for you.

GENERAL INFO

Class Format
Class Policies
Student Reviews


HAVE QUESTIONS?
First Name

Last Name

Company

Phone

Email

Location

Question/Comment



ONLC TRAINING CENTERS
www.onlc.com