Warning: session_start(): Cannot start session when headers already sent in /home/busin148/public_html/includes/session.php on line 3

Warning: Cannot modify header information - headers already sent by (output started at /home/busin148/public_html/includes/session.php:1) in /home/busin148/public_html/includes/session.php on line 31

Warning: Cannot modify header information - headers already sent by (output started at /home/busin148/public_html/includes/session.php:1) in /home/busin148/public_html/includes/session.php on line 43

Warning: Cannot modify header information - headers already sent by (output started at /home/busin148/public_html/includes/session.php:1) in /home/busin148/public_html/includes/session.php on line 45

Warning: Cannot modify header information - headers already sent by (output started at /home/busin148/public_html/includes/session.php:1) in /home/busin148/public_html/includes/session.php on line 47
CompTIA Cybersecurity Analyst (CySA+) Training Online Classes- Business Computer Skills

CompTIA Cybersecurity Analyst (CySA+) Training - On-Demand Course

Learn CySA+ at your own pace with our On-Demand training.

Course Details

  The CompTIA Cybersecurity Analyst (CySA+) course is designed for students that want to earn their CompTIA CySA+ Cybersecurity Analyst Certification.

CompTIA Cybersecurity Analyst (CySA+) Certification is credential earned to qualify students for intermediate level Cyber-Security positions. Practical skills are emphasized to ensure the students are well prepared to handle a variety of issues. The certification meets the ISO 17024 standard and fulfills the U.S. DOD Directive 8570.01-M requirements.

The CySA+ Certification training course will help students to prepare for the CS0-002 exam.

Topics covered in the course include:

  • Threat Management
  • Vulnerability Management
  • Security Architecture and Tool Sets
  • Cyber-Incident Response
  • Configure and Use Threat Detection Tools
  • Secure and Protect Systems and Applications
  • Perform Data Analysis and Identify Vulnerabilities

Certification Notes: The course materials have the CompTIA Approved Quality Content seal. The seal indicates that the course content covers 100% of the exam objectives and implements important instructional design principles. CompTIA recommends multiple learning tools to help increase coverage of the learning objectives. The contents of this training material were created for the CompTIA CySA+ Cybersecurity Analyst Certification CS0-002 exam covering the 2023 Edition certification exam objectives.

Exam Prep Software: All CompTIA classes offered include access to web-based practice exams. CompTIA certification exams are very rigorous and challenging. By studying after the class and using these practice exams, students will greatly improve Their chances of passing the actual certification exam the first time.

Exam Pass Guarantee: All of the CompTIA certification classes we sell come with an Exam Pass Guarantee from the training provider. To receive the exam voucher students will need to take the Practice Test provided, and achieve and 85% or better in Certification Mode, prior to the release of the exam voucher. The practice test is typically ordered the first day of class and emailed to each student. Once the student emails exam@onlc.com with proof of the 85% or better, the exam voucher will be released to them within 24 hours. Should you fail on the first attempt, you will be provided a second voucher (up to 3 vouchers total per exam). However, should you decide to not take the practice exam or to take the exam without first achieving the 85% in certification mode, the Exam Pass is null and void. Please read through the: Exam Pass Guarantee for all the details.

Target Student: This course is ideal for students looking to earn their CompTIA CySA+ certification. Students are typlically IT professionals that hold, or are seeing jobs such as IT Security Analyst, Security Operations Center (SOC) Analyst, Vulnerability Analyst, Cybersecurity Specialist, Threat Intelligence Analyst, and Security Engineer.

Section 1 – Threat Management 1
◾Cybersecurity Analysts
• Cybersecurity Roles and Responsibilities
• Frameworks and Security Controls
• Risk Evaluation
• Penetration Testing Processes
◾Reconnaissance Techniques
• The Kill Chain
• Open Source Intelligence
• Social Engineering
• Topology Discovery
• Service Discovery
• OS Fingerprinting

Section 2 – Threat Management 2
◾Security Appliances
• Configuring Firewalls
• Intrusion Detection and Prevention
• Configuring IDS
• Malware Threats
• Configuring Anti-virus Software
• Sysinternals
• Enhanced Mitigation Experience Toolkit
◾Logging and Analysis
• Packet Capture
• Packet Capture Tools
• Monitoring Tools
• Log Review and SIEM
• SIEM Data Outputs
• SIEM Data Analysis
• Point-in-Time Data Analysis

Section 3 – Vulnerability Management
◾Managing Vulnerabilities
• Vulnerability Management Requirements
• Asset Inventory
• Data Classification
• Vulnerability Management Processes
• Vulnerability Scanners
• Microsoft Baseline Security Analyzer
• Vulnerability Feeds and SCAP
• Configuring Vulnerability Scans
• Vulnerability Scanning Criteria
• Exploit Frameworks
◾Remediating Vulnerabilities
• Analyzing Vulnerability Scans
• Remediation and Change Control
• Remediating Host Vulnerabilities
• Remediating Network Vulnerabilities
• Remediating Virtual Infrastructure Vulnerabilities
◾Secure Software Development
• Software Development Lifecycle
• Software Vulnerabilities
• Software Security Testing
• Interception Proxies
• Web Application Firewalls
• Source Authenticity
• Reverse Engineering

Section 4 – Cyber Incident Response
◾Incident Response
• Incident Response Processes
• Threat Classification
• Incident Severity and Prioritization
• Types of Data
◾Forensics Tools
• Digital Forensics Investigations
• Documentation and Forms
• Digital Forensics Crime Scene
• Digital Forensics Kits
• Image Acquisition
• Password Cracking
• Analysis Utilities
◾Incident Analysis and Recovery
• Analysis and Recovery Frameworks
• Analyzing Network Symptoms
• Analyzing Host Symptoms
• Analyzing Data Exfiltration
• Analyzing Application Symptoms
• Using Sysinternals
• Containment Techniques
• Eradication Techniques
• Validation Techniques
• Corrective Actions

Section 5 – Security Architecture
◾Secure Network Design
• Network Segmentation
• Blackholes, Sinkholes, and Honeypots
• System Hardening
• Group Policies and MAC
• Endpoint Security
◾Managing Identities and Access
• Network Access Control
• Identity Management
• Identity Security Issues
• Identity Repositories
• Context-based Authentication
• Single Sign On and Federations
• Exploiting Identities
• Exploiting Web Browsers and Applications
◾Security Frameworks and Policies
• Frameworks and Compliance
• Reviewing Security Architecture
• Procedures and Compensating Controls
• Verifications and Quality Control
• Security Policies and Procedures
• Personnel Policies and Training

 

Please check the course description to find prerequisite information.

 

-10%

CompTIA Cybersecurity Analyst (CySA+) Training

On-Demand Training Course

$ 1295
6/month licence
  • 24/7 Access
  • Hands-On Practice Exercises
  • Free Repeats
  • Professional Instruction
Enroll Today