CompTIA Cybersecurity Analyst - CySA+

4.5/5

The CompTIA CySA+ certification is an international validation of intermediate-level security skills and knowledge. While there is no required prerequisite, the CompTIA CySA+ certification is intended to follow CompTIA Security+ or equivalent experience and has a technical, “hands-on” focus on IT security analytics. The CompTIA CySA+ examination has been designed for IT security analysts, vulnerability analysts, or threat intelligence analysts. The exam will certify that successful candidates will have the knowledge and skills to configure and use threat detection tools, analyze data in order to identify vulnerabilities and risks, and ultimately safeguard applications and systems within an organization.

Training Options

Classroom Training

Online Instructor Led

Onsite Training

Course Information

Module 1: Threat Management 1

  • Cybersecurity Analysts
  • Cybersecurity Roles and Responsibilities
  • Frameworks and Security Controls
  • Risk Evaluation
  • Penetration Testing Processes
  • Reconnaissance Techniques
  • The Kill Chain
  • Open Source Intelligence
  • Social Engineering
  • Topology Discovery
  • Service Discovery
  • OS Fingerprinting

Module 2: Threat Management 2

  • Security Appliances
  • Configuring Firewalls
  • Intrusion Detection and Prevention
  • Configuring IDS
  • Malware Threats
  • Configuring Anti-virus Software
  • Sysinternals
  • Enhanced Mitigation Experience Toolkit
  • Logging and Analysis
  • Packet Capture
  • Packet Capture Tools
  • Monitoring Tools
  • Log Review and SIEM
  • SIEM Data Outputs
  • SIEM Data Analysis
  • Point-in-Time Data Analysis

» Show More 👇

Module 3: Vulnerability Management 

  • Managing Vulnerabilities
  • Vulnerability Management Requirements
  • Asset Inventory
  • Data Classification
  • Vulnerability Management Processes
  • Vulnerability Scanners
  • Microsoft Baseline Security Analyzer
  • Vulnerability Feeds and SCAP
  • Configuring Vulnerability Scans
  • Vulnerability Scanning Criteria
  • Exploit Frameworks
  • Remediating Vulnerabilities
  • Remediation and Change Control
  • Remediating Host Vulnerabilities
  • Remediating Network Vulnerabilities
  • Remediating Virtual Infrastructure Vulnerabilities
  • Secure Software Development
  • Software Development Lifecycle
  • Software Vulnerabilities
  • Software Security Testing
  • Interception Proxies
  • Web Application Firewalls
  • Source Authenticity
  • Reverse Engineering

Module 4: Cyber Incident Response 

  • Incident Response
  • Incident Response Processes
  • Threat Classification
  • Incident Severity and Prioritization
  • Types of Data
  • Forensics Tools
  • Digital Forensics Investigations
  • Documentation and Forms
  • Digital Forensics Crime Scene
  • Digital Forensics Kits
  • Image Acquisition
  • Password Cracking
  • Analysis Utilities
  • Incident Analysis and Recovery
  • Analysis and Recovery Frameworks
  • Analyzing Network Symptoms
  • Analyzing Host Symptoms
  • Analyzing Data Exfiltration
  • Analyzing Application Symptoms
  • Using Sysinternals
  • Containment Techniques
  • Eradication Techniques
  • Validation Techniques
  • Corrective Actions

Module 5: Security Architecture 

  • Secure Network Design
  • Network Segmentation
  • Blackholes, Sinkholes, and Honeypots
  • System Hardening
  • Group Policies and MAC
  • Endpoint Security
  • Managing Identities and Access
  • Network Access Control
  • Identity Management
  • Identity Security Issues
  • Identity Repositories
  • Context-based Authentication
  • Single Sign On and Federations
  • Exploiting Identities
  • Exploiting Web Browsers and Applications
  • Security Frameworks and Policies
  • Frameworks and Compliance
  • Reviewing Security Architecture
  • Procedures and Compensating Controls
  • Verifications and Quality Control
  • Security Policies and Procedures
  • Personnel Policies and Training

» Show Less 👆

Audience Profile

  • Network and security professionals
  • Cybersecurity engineers
  • Network Architect
  • Information Security Engineers

100% Business Fulfilment

Request more Information

    Corporate Training Options

    Online Instructor Led

    Live, Online Training by top Instructors and practitioners across the globe.

    Onsite
    Training

    Conduct training at the work location you desired.

    Classroom Training

    The Venue will be ideally located and easy to access with covid-19 SOP's.

    Overseas Training

    Travel to any desired location for your training.

    What People say?

    Mohammed Aljbreen Operation Specialist, SAMA

    The Clarity of the Content was very good. The explanation of the trainer with in-depth knowledge in a proper flow really impressed me to give 5 star rating.

    Arindam Chakraborty Systems Specialist, King Abdullah University of Sciences & Technology

    The Instructor was really impressive. Clear cut explanation of every topic he covered with real time scenarios.

    Sher Afzal Khan Cloud Engineer, Cloud 9 Networks

    The Trainer and the Course Material, both are good. Good flow of explanation with simple examples. The complete training was focused on current industry challenges.

    Jawed Ahmad Siddiqui Sr. System Administrator, Saudi Ceramics

    The Trainer’s presentation was impressed me to continue the course till end. Never feel bore till the entire sessions. She studied our mindset and follows.

      Not sure,
      which course to choose?

      Our Clients across the Globe!

      Our Corporate Clients