Length
5 days
Version
CS0-001

Overview

CompTIA CySA+ applies behavioral analytics to networks to improve the overall state of security through identifying and combating malware and advanced persistent threats (APTs), resulting in an enhanced threat visibility across a broad attack surface.

CySA+ will validate an IT professional’s ability to proactively defend and continuously improve the security of an organization. In response to a rapidly evolving cybersecurity environment, the updated CompTIA CySA+ (CS0-002) covers the most up-to-date core cybersecurity analyst skills while emphasizing software and application security, automation, threat hunting, and IT regulatory

This five-day instructor-led training course is an Intermediate Level CompTIA security course. Attending this course will prepare you for the CompTIA Cybersecurity Analyst (CySA+) exam (CS0-002).

Key Topics

Detailed Info
  • Threat And Vulnerability Management
  • Security Operations And Monitoring
  • Software And Systems Security
  • Incident Response
  • Compliance And Assessment
Skills Gained
Key Topics
Target Audience
Prerequisites

Skills Gained

On course completion, you will be able to:

  • Identify tools and techniques used to perform an environmental reconnaissance of a target network or security system
  • Collect, analyse and interpret security data from multiple log and monitoring sources
  • Use network host and web application vulnerability assessment tools and interpret the results to provide effective mitigation
  • Understand and remediate identity management, authentication and access control issues
  • Participate in a senior role within an incident response team and use forensic tools to identify the source of an attack
  • Understand the use of frameworks, policies and procedures and report on security architecture with recommendations for effective compensating controls

Key Topics

THREAT AND VULNERABILITY MANAGEMENT
Analyze and apply proactive threat intelligence to support organizational security and perform vulnerability management activities.

  • Explain the importance of threat data and intelligence
  • Given a scenario, utilize threat intelligence to support organizational security
  • Given a scenario, perform vulnerability management activities
  • Given a scenario, analyze the output from common vulnerability assessment tools
  • Explain the threats and vulnerabilities associated with specialized technology
  • Explain the threats and vulnerabilities associated with operating in the cloud
  • Given a scenario, implement controls to mitigate attacks and software vulnerabilities

SOFTWARE AND SYSTEMS SECURITY
Apply security solutions for infrastructure management and explain software & hardware assurance best practices.

  • Given a scenario, apply security solutions for infrastructure management
  • Explain software assurance best practices
  • Explain hardware assurance best practices

SECURITY OPERATIONS AND MONITORING
Analyze data as part of continuous security monitoring activities and implement configuration changes to existing controls to improve security.

  • Given a scenario, analyze data as part of security monitoring activities
  • Given a scenario, implement configuration changes to existing controls to improve security
  • Explain the importance of proactive threat hunting
  • Compare and contrast automation concepts and technologies

INCIDENT RESPONSE
Analyze and apply the appropriate incident response procedure, analyze potential indicators of compromise, and utilize basic digital forensics techniques.

  • Explain the importance of the incident response process
  • Given a scenario, apply the appropriate incident response procedure
  • Given an incident, analyze potential indicators of compromise
  • Given a scenario, utilize basic digital forensics techniques

COMPLIANCE AND ASSESSMENT
Apply security concepts in support of organizational risk mitigation and understand the importance of frameworks, policies, procedures, and controls.

  • Understand the importance of data privacy and protection
  • Given a scenario, apply security concepts in support of organizational risk mitigation
  • Explain the importance of frameworks, policies, procedures, and controls

Target Audience

Security Analysts, Vulnerability Analysts, Security Engineer, Cybersecurity Specialist, Security Operations Centre (SOC) Analysts

We can also deliver and customise this training course for larger groups – saving your organisation time, money and resources. For more information, please call us at +632 8244 2098 or email [email protected].

Prerequisites

A+, Network+, Security+ (or equivalent knowledge/skills) are highly recommended. As a minimum attendees must:

  • Know basic network terminology and functions (such as OSI Model, Topology, Ethernet, Wi-Fi, switches, routers)
  • Understand TCP/IP addressing, core protocols, and troubleshooting tools
  • Be able to identify network attack strategies and defenses
  • Know the technologies and uses of cryptographic standards and products
  • Be able to identify network- and host-based security technologies and practices
  • Be able to describe the standards and products used to enforce security on web and communications technologies
Print course details

The supply of this course by DDLS is governed by the booking terms and conditions. Please read the terms and conditions carefully before enrolling in this course, as enrolment in the course is conditional on acceptance of these terms and conditions.

Book Your Course

Virtual Classroom
March 15 2021 - March 19 2021
July 5 2021 - July 9 2021

Email Course Outline
Request a Callback

Enter your details below and we'll email you a pdf of the course outline.

Enter your details below and one of our team will give you a call to answer any questions you may have.