Course Overview
Target audiences
- IT Professionals
- IT Administrators
- Network Administrators
- Network Analysts
- IT Security Specialists
- Network Architects
- Aspiring Cybersecurity Professionals
- System Administrators
Schedule Dates
Curriculum
-
Module 1 – Threat Management 1
-
Module 2 – Threat Management 2
- Security Appliances
- Configuring Firewalls
- Intrusion Detection and Prevention
- Configuring IDS
- Malware Threats
- Configuring Anti-virus Software
- Sysinternals
- Enhanced Mitigation Experience Toolkit
- Logging and Analysis
- Packet Capture
- Packet Capture Tools
- Monitoring Tools
- Log Review and SIEM
- SIEM Data Outputs
- SIEM Data Analysis
- Point-in-Time Data Analysis
-
Module 3 – Vulnerability Management
- Managing Vulnerabilities
- Vulnerability Management Requirements
- Asset Inventory
- Data Classification
- Vulnerability Management Processes
- Vulnerability Scanners
- Microsoft Baseline Security Analyzer
- Vulnerability Feeds and SCAP
- Configuring Vulnerability Scans
- Vulnerability Scanning Criteria
- Exploit Frameworks
- Remediating Vulnerabilities
- Remediation and Change Control
- Remediating Host Vulnerabilities
- Remediating Network Vulnerabilities
- Remediating Virtual Infrastructure Vulnerabilities
- Secure Software Development
- Software Development Lifecycle
- Software Vulnerabilities
- Software Security Testing
- Interception Proxies
- Web Application Firewalls
- Source Authenticity
- Reverse Engineering
-
Module 4 – Cyber Incident Response
- Incident Response
- Incident Response Processes
- Threat Classification
- Incident Severity and Prioritization
- Types of Data
- Forensics Tools
- Digital Forensics Investigations
- Documentation and Forms
- Digital Forensics Crime Scene
- Digital Forensics Kits
- Image Acquisition
- Password Cracking
- Analysis Utilities
- Incident Analysis and Recovery
- Using Sysinternals
- Containment Techniques
- Eradication Techniques
- Validation Techniques
- Corrective Actions
-
Module 5 – Security Architecture
- Secure Network Design
- Network Segmentation
- Blackholes, Sinkholes, and Honeypots
- System Hardening
- Group Policies and MAC
- Endpoint Security
- Managing Identities and Access
- Network Access Control
- Identity Management
- Identity Security Issues
- Identity Repositories
- Context-based Authentication
- Single Sign On and Federations
- Exploiting Identities
- Exploiting Web Browsers and Applications
- Security Frameworks and Policies
- Frameworks and Compliance
- Reviewing Security Architecture
- Procedures and Compensating Controls
- Verifications and Quality Control
- Security Policies and Procedures
- Personnel Policies and Training
The CompTIA Cybersecurity Analyst (CySA+) course is designed for individuals who have some experience in the field of cybersecurity, as well as a basic understanding of network security concepts and technologies. There are no formal prerequisites for enrollment in the course, but CompTIA recommends that learners have the following:
- A CompTIA Security+ certification or equivalent knowledge and skills.
- At least 3-4 years of hands-on information security or related experience.
Learners should have a basic understanding of computer hardware and software, as well as networking fundamentals. Familiarity with common operating systems such as Windows and Linux is also helpful.
- A CompTIA Security+ certification or equivalent knowledge and skills.
- At least 3-4 years of hands-on information security or related experience.
Learners should have a basic understanding of computer hardware and software, as well as networking fundamentals. Familiarity with common operating systems such as Windows and Linux is also helpful.
While there are no mandatory prerequisites for the CySA+ certification, CompTIA recommends that candidates have a minimum of 3-4 years of hands-on experience in the field of cybersecurity or a related field before attempting the CySA+ exam. This certification is designed for mid-level to advanced professionals with practical experience in cybersecurity.
CySA+ teaches basic cyber security analyst skills, intrusion detection and incident response practices. These skills are not taught in the Sec+, so if you are looking to actually pursue a role that requires hands-on skills and knowledge then the CySA+ will be for you.
Can I Go Straight to CompTIA CySA+ Instead of Getting CompTIA Security+? You can, but it's not recommended because you need to know how a network works (CompTIA Network+) and how to secure it (CompTIA Security+) before you can analyze it (CompTIA CySA+).
The best way for beginners to learn the CompTIA Cybersecurity Analyst (CySA+) course is to start with the basics and work their way up gradually. Before diving into the CySA+ course material, it's important to have a good understanding of basic cybersecurity concepts and technologies. This can be achieved through online courses, books, or tutorials that cover topics such as network security, threat detection, and incident response. Once you have a solid understanding of the basics, enroll in a CySA+ course that covers the exam objectives at Counseltrain Technologies.