CompTIA Cybersecurity Analyst (CySA+) Training Course Outline
CompTIA has renamed CSA+ to CySA+.
This course is intended for those wishing to qualify with CompTIA CySA+ Cybersecurity Analyst Certification. CompTIA's CySA+ Certification is an intermediate-level certificate for IT professionals with previous experience of working in the field of IT security. The CompTIA CySA+ examination is designed for IT security analysts, vulnerability analysts, or threat intelligence analysts. The exam will certify that the successful candidate has the knowledge and skills required to configure and use threat detection tools, perform data analysis, and interpret the results to identify vulnerabilities, threats, and risks to an organization with the end goal of securing and protecting applications and systems within an organization.
This courseware bears the seal of CompTIA Approved Quality Content. This seal signifies this content covers 100% of the exam objectives and implements important instructional design principles. CompTIA recommends multiple learning tools to help increase coverage of the learning objectives. The contents of this training material were created for the CompTIA CySA+ Cybersecurity Analyst Certification CS0-001 exam covering the 2017 Edition certification exam objectives.
*** NOTE: This class also available in On-Demand, eLearning Format ***
Too busy at work to miss 5 days out of the office to take this class? Consider the CompTIA On-Demand version of this course. Watch videos, take the same hands-on labs, access an online expert 24/7, and study at on your own time, at your own pace. For details on this alternative format, go to
CompTIA On-Demand Cybersecurity Analyst (CySA+) Certification Training
Exam Prep Software
All of our CompTIA classes include access to web-based practice exams. CompTIA certification exams are very rigorous and challenging. By studying after the class and using these practice exams, you will greatly improve your chances of passing the actual certification exam the first time. Exam prep software is included with all CompTIA classes delivered by ONLC Training Centers.
ONLCs Exam Pass Guarantee
ONLCs CompTIA certification classes come with an Exam Pass Guarantee. What that essentially means is that we want to make sure that everyone is taking advantage of the Practice Test that we are providing and achieve and 85% or better in Certification Mode prior to us releasing the initial exam voucher. The practice test is typically ordered the first day of class and emailed to each student. Once you email us at firstname.lastname@example.org with proof of the 85% or better, we will go ahead and release the exam voucher to you within 24 hours. Should you fail on the first attempt, we will then give you a second voucher. However, should you decide to not take the practice exam or to take the exam without first achieving the 85% in certification mode, the Exam Pass is null and void. Please read through our:
Exam Pass Guarantee
Additional Notes Regarding CompTIA Certification Exams
As with most professional IT certifications, many addition hours of study are required before the class (meeting the prerequisites) and after the class (reviewing exam objectives and practice questions). Expect to spend a significant number of hours studying outside of the class before you take a CompTIA or any other IT professional exam.
Target audience and course prerequisites
CompTIA CySA+ certification is aimed at IT professionals with (or seeking) job roles such as IT Security Analyst, Security Operations Center (SOC) Analyst, Vulnerability Analyst, Cybersecurity Specialist, Threat
Intelligence Analyst, and Security Engineer.
Ideally, you should have successfully completed:
CompTIA Network+ Certification
AND Security+ Certification
courses or have equivalent knowledge before attending this training.
Specifically, it is recommended that you have the following skills and knowledge before starting this course:
◾ Know basic network terminology and functions (such as OSI Model, Topology, Ethernet, Wi-Fi, switches, routers).
◾ Understand TCP/IP addressing, core protocols, and troubleshooting tools.
◾ Identify network attack strategies and defenses.
◾ Know the technologies and uses of cryptographic standards and products.
◾ Identify network- and host-based security technologies and practices.
◾ Describe the standards and products used to enforce security on web and communications technologies.
Module 1 Threat Management 1
Cybersecurity Roles and Responsibilities
Frameworks and Security Controls
Penetration Testing Processes
The Kill Chain
Open Source Intelligence
Module 2 Threat Management 2
Intrusion Detection and Prevention
Configuring Anti-virus Software
Enhanced Mitigation Experience Toolkit
◾Logging and Analysis
Packet Capture Tools
Log Review and SIEM
SIEM Data Outputs
SIEM Data Analysis
Point-in-Time Data Analysis
Module 3 Vulnerability Management
Vulnerability Management Requirements
Vulnerability Management Processes
Microsoft Baseline Security Analyzer
Vulnerability Feeds and SCAP
Configuring Vulnerability Scans
Vulnerability Scanning Criteria
Analyzing Vulnerability Scans
Remediation and Change Control
Remediating Host Vulnerabilities
Remediating Network Vulnerabilities
Remediating Virtual Infrastructure Vulnerabilities
◾Secure Software Development
Software Development Lifecycle
Software Security Testing
Web Application Firewalls
Module 4 Cyber Incident Response
Incident Response Processes
Incident Severity and Prioritization
Types of Data
Digital Forensics Investigations
Documentation and Forms
Digital Forensics Crime Scene
Digital Forensics Kits
◾Incident Analysis and Recovery
Analysis and Recovery Frameworks
Analyzing Network Symptoms
Analyzing Host Symptoms
Analyzing Data Exfiltration
Analyzing Application Symptoms
Module 5 Security Architecture
◾Secure Network Design
Blackholes, Sinkholes, and Honeypots
Group Policies and MAC
◾Managing Identities and Access
Network Access Control
Identity Security Issues
Single Sign On and Federations
Exploiting Web Browsers and Applications
◾Security Frameworks and Policies
Frameworks and Compliance
Reviewing Security Architecture
Procedures and Compensating Controls
Verifications and Quality Control
Security Policies and Procedures
Personnel Policies and Training
View outline in Word