This CompTIA Cybersecurity Analyst (CySA+) training course will prepare you to successfully achieve this in-demand certification with hands-on, scenario-based training so you’ll be ready to meet advanced persistent threats (APTs).
This is an intermediate certification that is part of the CompTIA certification pathway, fitting in between the Network+ & CASP certifications. Achieving this certification validates that you have the skills as a cybersecurity analyst, that you can take an analytical approach to cybersecurity, and have the knowledge of network security tools and techniques to combat threats.
Associated Certification:
1.0 Threat and Vulnerability Management
1.1 Explain the importance of threat data and intelligence.
Intelligence sources
Indicator management
Threat classification
Threat actors
Intelligence cycle
Commodity malware
Information sharing and analysis communities
1.2 Given a scenario, utilise threat intelligence to support organisational security.
Attack frameworks
Threat research
Threat modelling methodologies
Threat intelligence sharing with supported functions
1.3 Given a scenario, perform vulnerability management activities.
Vulnerability identification
Validation
Remediation/mitigation
Scanning parameters and criteria
Inhibitors to remediation
1.4 Given a scenario, analyse the output from common vulnerability assessment tools.
Web application scanner
Infrastructure vulnerability scanner
Software assessment tools and techniques
Enumeration
Wireless assessment tools
Cloud Infrastructure assessment tools
1.5 Explain the threats and vulnerabilities associated with specialised technology.
Mobile
Internet of Things (IoT)
Embedded
Real-time operating system (RTOS)
System-on-Chip (SoC)
Field programmable gate array (FPGA)
Physical access control
Busiling automation systems
Vehicles and drones
Workflow and process automation systems
Industrial control system
Supervisory control and data acquisition (SCADA)
1.6 Explain the threats and vulnerabilities associated with operating in the cloud.
Cloud service models
Cloud deployment models
Function as a Service (FaaS)/ serverless architecture
Infrastructure as code (IaC)
Insecure application programming interface (API)
Improper key management
Unprotected storage
Logging and monitoring
1.7 Given a scenario, implement controls to mitigate attacks and software vulnerabilities.
Attack types
Vulnerabilities
2.0 Software and Systems Security
2.1 Given a scenario, apply security solutions for infrastructure management.
2.2 Explain software assurance best practises.
2.3 Explain hardware assurance best practises.
3.0 Security Operations and Monitoring
3.1 Given a scenario, analyse data as part of security monitoring activities
3.2 Given a scenario, implement configuration changes to existing controls to improve security.
3.3 Explain the importance of proactive threat hunting
3.4 Compare and contrast automation concepts and technologies.
4.0 Incident Response
4.1 Explain the importance of the incident response process.
4.2 Given a scenario, apply the appropriate incident response procedure.
4.3 Given an incident, analyse potential indicators of compromise.
4.4 Given a scenario, utilise basic digital forensics techniques.
5.0 Compliance and Assessment
5.1 Understand the importance of data privacy and protection.
5.2 Given a scenario, apply security concepts in support of organisational risk mitigation.
5.3 Explain the importance of frameworks, policies, procedures, and controls.
This CompTIA Cybersecurity Analyst (CySA+) training course will prepare you to successfully achieve this in-demand certification with hands-on, scenario-based training so you’ll be ready to meet advanced persistent threats (APTs).
This is an intermediate certification that is part of the CompTIA certification pathway, fitting in between the Network+ & CASP certifications. Achieving this certification validates that you have the skills as a cybersecurity analyst, that you can take an analytical approach to cybersecurity, and have the knowledge of network security tools and techniques to combat threats.
Associated Certification:
1.0 Threat and Vulnerability Management
1.1 Explain the importance of threat data and intelligence.
Intelligence sources
Indicator management
Threat classification
Threat actors
Intelligence cycle
Commodity malware
Information sharing and analysis communities
1.2 Given a scenario, utilise threat intelligence to support organisational security.
Attack frameworks
Threat research
Threat modelling methodologies
Threat intelligence sharing with supported functions
1.3 Given a scenario, perform vulnerability management activities.
Vulnerability identification
Validation
Remediation/mitigation
Scanning parameters and criteria
Inhibitors to remediation
1.4 Given a scenario, analyse the output from common vulnerability assessment tools.
Web application scanner
Infrastructure vulnerability scanner
Software assessment tools and techniques
Enumeration
Wireless assessment tools
Cloud Infrastructure assessment tools
1.5 Explain the threats and vulnerabilities associated with specialised technology.
Mobile
Internet of Things (IoT)
Embedded
Real-time operating system (RTOS)
System-on-Chip (SoC)
Field programmable gate array (FPGA)
Physical access control
Busiling automation systems
Vehicles and drones
Workflow and process automation systems
Industrial control system
Supervisory control and data acquisition (SCADA)
1.6 Explain the threats and vulnerabilities associated with operating in the cloud.
Cloud service models
Cloud deployment models
Function as a Service (FaaS)/ serverless architecture
Infrastructure as code (IaC)
Insecure application programming interface (API)
Improper key management
Unprotected storage
Logging and monitoring
1.7 Given a scenario, implement controls to mitigate attacks and software vulnerabilities.
Attack types
Vulnerabilities
2.0 Software and Systems Security
2.1 Given a scenario, apply security solutions for infrastructure management.
2.2 Explain software assurance best practises.
2.3 Explain hardware assurance best practises.
3.0 Security Operations and Monitoring
3.1 Given a scenario, analyse data as part of security monitoring activities
3.2 Given a scenario, implement configuration changes to existing controls to improve security.
3.3 Explain the importance of proactive threat hunting
3.4 Compare and contrast automation concepts and technologies.
4.0 Incident Response
4.1 Explain the importance of the incident response process.
4.2 Given a scenario, apply the appropriate incident response procedure.
4.3 Given an incident, analyse potential indicators of compromise.
4.4 Given a scenario, utilise basic digital forensics techniques.
5.0 Compliance and Assessment
5.1 Understand the importance of data privacy and protection.
5.2 Given a scenario, apply security concepts in support of organisational risk mitigation.
5.3 Explain the importance of frameworks, policies, procedures, and controls.