• 703.368.4911
  • Manassas, VA
  • info@eidos-tek.com

CompTIA Cybersecurity Analyst (CySA+)

$99.00

Cybersecurity certification is one of the hottest IT-related certifications. The CompTIA Cybersecurity Analyst, also known as CompTIA CySA+, is a CompTIA certification. CySA+ is focused on the knowledge and skills required to perform the following:

  • Configure and use threat-detection tools
  • Perform data analysis
  • Iterpreting the results
Save for later
Save for later
Category:

Securing an organization’s applications and systems is the primary goal of a Cybersecurity Analyst.

The CompTIA CySA+ is a vendor-neutral certification. A student normally has three to four years of experience in a related field as well as a Security+ or equivalent knowledge. In this regard, the CompTIA CySA+ lies between the CompTIA Security+ and CompTIA Advanced Security Practitioner (CASP) exams. It is an excellent go-between to tackle before diving into the CASP, but when the CompTIA Security+ isn’t enough.

Cybersecurity certification is an ongoing requirement for government agencies. The CompTIA CySA+ was developed with a focus on meeting government requirements to certify IT, workers or contractors. With a Cybersecurity certification, you display an understanding of security best practices and protocols beyond that which is provided by the Security+ certification. You will prove a level of expertise beyond that of basic security practices that are followed when using a computer.

This allows any employee to prove a better understanding of enterprise security practices, and the necessary tools needed to protect a company network. The modules of this course align with the official objectives of the certification. The course expands past the scope of the certification. It also provides real-life examples and lead-ins to direct further study.

This will give students an easier understanding of the material for the certification as well as a basic understanding to apply to real-life applications.

We encourage you to visit the CompTIA website for full details on the CySA+ certification and exam code CS0-001.

Course Lesson Video

Take this opportunity to view a sample of this course below.

How Much Can I Make?

With a strong focus on information security these days, positions related to cybersecurity in the U.S. average between $82,000 to $97,000 annually. Individuals accomplishing this certification often have the title of Security Analyst or Information Security Analyst. Indeed.com is a great resource for up-to-date information on the Cybersecurity Analyst Salaries in the United States.

Course Outline

Module 1: Threat Management

  • ¬†Introduction
  • ¬†Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 1
  • ¬†Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 2
  • ¬†Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 3
  • ¬†Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 4
  • ¬†Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 5
  • ¬†Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 6
  • ¬†Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 7
  • ¬†Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 8
  • ¬†Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 9
  • ¬†Given a scenario, analyze the results of a network reconnaissance Part 1
  • ¬†Given a scenario, analyze the results of a network reconnaissance Part 2
  • ¬†Given a scenario, analyze the results of a network reconnaissance Part 3
  • ¬†Given a scenario, analyze the results of a network reconnaissance Part 4
  • ¬†Given a scenario, analyze the results of a network reconnaissance Part 5
  • ¬†Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 1
  • ¬†Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 2
  • ¬†Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 3
  • ¬†Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 4
  • ¬†Explain the purpose of practices used to secure a corporate environment Part 1
  • ¬†Explain the purpose of practices used to secure a corporate environment Part 2
  • ¬†Explain the purpose of practices used to secure a corporate environment Part 3
  • ¬†Explain the purpose of practices used to secure a corporate environment Part 4

Module 2: Vulnerability Management

  • ¬†Given a scenario, implement an information security vulnerability management process Part 1
  • ¬†Given a scenario, implement an information security vulnerability management process Part 2
  • ¬†Given a scenario, implement an information security vulnerability management process Part 3
  • ¬†Given a scenario, implement an information security vulnerability management process Part 4
  • ¬†Given a scenario, implement an information security vulnerability management process Part 5
  • ¬†Given a scenario, implement an information security vulnerability management process Part 6
  • ¬†Given a scenario, implement an information security vulnerability management process Part 7
  • ¬†Given a scenario, analyze the output resulting from a vulnerability scan Part 1
  • ¬†Given a scenario, analyze the output resulting from a vulnerability scan Part 2
  • ¬†Compare and contrast common vulnerabilities found in the following targets within an organization Part 1
  • ¬†Compare and contrast common vulnerabilities found in the following targets within an organization Part 2
  • ¬†Compare and contrast common vulnerabilities found in the following targets within an organization Part 3

Module 3: Cyber Incident Response

  • ¬†Given a scenario, distinguish threat data or behavior to determine the impact of an incident Part 1
  • ¬†Given a scenario, distinguish threat data or behavior to determine the impact of an incident Part 2
  • ¬†Given a scenario, distinguish threat data or behavior to determine the impact of an incident Part 3
  • ¬†Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 1
  • ¬†Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 2
  • ¬†Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 3
  • ¬†Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 4
  • ¬†Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 5
  • ¬†Explain the importance of communications during the incident response process
  • ¬†Given a scenario, analyze common symptoms to select the best course of action to support incident response Part 1
  • ¬†Given a scenario, analyze common symptoms to select the best course of action to support incident response Part 2
  • ¬†Given a scenario, analyze common symptoms to select the best course of action to support incident response Part 3
  • ¬†Given a scenario, analyze common symptoms to select the best course of action to support incident response Part 4
  • ¬†Summarize the incident recovery and post-incident response process Part 1
  • ¬†Summarize the incident recovery and post-incident response process Part 2
  • ¬†Summarize the incident recovery and post-incident response process Part 3
  • ¬†Summarize the incident recovery and post-incident response process Part 4
  • ¬†Given a scenario, distinguish threat data or behavior to determine the impact of an incident Part 1
  • ¬†Given a scenario, distinguish threat data or behavior to determine the impact of an incident Part 2
  • ¬†Given a scenario, distinguish threat data or behavior to determine the impact of an incident Part 3
  • ¬†Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 1
  • ¬†Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 2
  • ¬†Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 3
  • ¬†Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 4
  • ¬†Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 5
  • ¬†Explain the importance of communications during the incident response process
  • ¬†Given a scenario, analyze common symptoms to select the best course of action to support incident response Part 1
  • ¬†Given a scenario, analyze common symptoms to select the best course of action to support incident response Part 2
  • ¬†Given a scenario, analyze common symptoms to select the best course of action to support incident response Part 3
  • ¬†Given a scenario, analyze common symptoms to select the best course of action to support incident response Part 4
  • ¬†Summarize the incident recovery and post-incident response process Part 1
  • ¬†Summarize the incident recovery and post-incident response process Part 2
  • ¬†Summarize the incident recovery and post-incident response process Part 3
  • ¬†Summarize the incident recovery and post-incident response process Part 4

Module 4: Security Architecture and Tool Sets

  • ¬†Explain the relationship between frameworks, common policies, controls, and procedures Part 1
  • ¬†Explain the relationship between frameworks, common policies, controls, and procedures Part 2
  • ¬†Explain the relationship between frameworks, common policies, controls, and procedures Part 3
  • ¬†Explain the relationship between frameworks, common policies, controls, and procedures Part 4
  • ¬†Given a scenario, use data to recommend remediation of security issues related to identity and access management Part 1
  • ¬†Given a scenario, use data to recommend remediation of security issues related to identity and access management Part 2
  • ¬†Given a scenario, use data to recommend remediation of security issues related to identity and access management Part 3
  • ¬†Given a scenario, use data to recommend remediation of security issues related to identity and access management Part 4
  • ¬†Given a scenario, review security architecture and make recommendations to implement compensating controls Part 1
  • ¬†Given a scenario, review security architecture and make recommendations to implement compensating controls Part 2
  • ¬†Given a scenario, review security architecture and make recommendations to implement compensating controls Part 3
  • ¬†Given a scenario, use applications security best practices while participating in the Software Development Life Cycle (SDLC) Part 1
  • ¬†Given a scenario, use applications security best practices while participating in the Software Development Life Cycle (SDLC) Part 2
  • ¬†Overview
  • ¬†Conclusion

Reviews

There are no reviews yet.

Be the first to review “CompTIA Cybersecurity Analyst (CySA+)”

Your email address will not be published. Required fields are marked *