CompTIA Cybersecurity Analyst (CySA+)
Provided by QA
Overview
CompTIA Cybersecurity Analyst (CySA+) is a certification for cyber professionals tasked with incident detection, prevention, and response through continuous security monitoring. This course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect, and analyse cybersecurity intelligence, and handle incidents as they occur. This course includes the CySA+ (CS0-003) exam voucher, taken post class.
+
Prerequisites
Delegates will learn how to
Outline
Module 1: UNDERSTANDING VULNERABILITY RESPONSE, HANDLING, AND MANAGEMENT
CompTIA Cybersecurity Analyst (CySA+) is a certification for cyber professionals tasked with incident detection, prevention, and response through continuous security monitoring. This course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect, and analyse cybersecurity intelligence, and handle incidents as they occur. This course includes the CySA+ (CS0-003) exam voucher, taken post class.
+
Prerequisites
- Ideally prior to this course, although not essential you will have taken CompTIA Network+ and CompTIA Security+ courses or have the equivalent knowledge.
- This course is suited to Security Analyst Security Operations Center (SOC) Analyst, Incident Response Analyst, Vulnerability Management Analyst, Security Engineer
Delegates will learn how to
- Detect and analyse indicators of malicious activity.
- Understand threat hunting and threat intelligence concepts.
- Use appropriate tools and methods to manage, prioritize and respond to attacks and vulnerabilities.
- Perform incident response processes.
- Understand reporting and communication concepts related to vulnerability management and incident response activities.
Outline
Module 1: UNDERSTANDING VULNERABILITY RESPONSE, HANDLING, AND MANAGEMENT
- Understanding Cybersecurity Leadership Concepts
- Exploring Control Types and Methods
- Explaining Patch Management Concepts
- Exploring Threat Actor Concepts
- Identifying Active Threats
- Exploring Threat-Hunting Concepts
- Reviewing System and Network Architecture Concepts
- Exploring Identity and Access Management (IAM)
- Maintaining Operational Visibility
- Exploring Leadership in Security Operations
- Understanding Technology for Security Operations
- Explaining Compliance Requirements
- Understanding Vulnerability Scanning Methods
- Exploring Special Considerations in Vulnerability Scanning
- Understanding Vulnerability Scoring Concepts
- Exploring Vulnerability Context Considerations
- Explaining Effective Communication Concepts
- Understanding Vulnerability Reporting Outcomes and Action Plans
- Exploring Incident Response Planning
- Performing Incident Response Activities
- Understanding Incident Response Communication
- Analysing Incident Response Activities
- Identifying Malicious Activity
- Explaining Attack Methodology Frameworks
- Explaining Techniques for Identifying Malicious Activity
- Exploring Network Attack Indicators
- Exploring Host Attack Indicators
- Exploring Vulnerability Assessment Tools
- Analysing Web Vulnerabilities
- Analysing Cloud Vulnerabilities
- Understanding Scripting Languages
- Identifying Malicious Activity Through Analysis
- Exploring Secure Software Development Practices
- Recommending Controls to Mitigate Successful Application Attacks
- Implementing Controls to Prevent Attacks
Enquire
Start date | Location / delivery | |
---|---|---|
12 May 2025 | QA On-Line Virtual Centre, Virtual | Book now |
01132207150
01132207150