Course Highlights
The CompTIA CySA+ (CS0-002) Cyber Analyst certification is the ideal next step for IT professionals who want to advance their careers in cybersecurity. This certification validates the skills and knowledge required to perform various cybersecurity analyst tasks, including threat detection, vulnerability management, and incident response. You will familiarise yourself with myriad vulnerability assessment tools, gaining insight into the threats and vulnerabilities unique to specialised technology and cloud operations.
Next, delve into the realms of infrastructure management security solutions, software, and hardware assurance best practices. You will immerse in data analysis for security monitoring activities, learn to implement configuration changes for improved security and understand the necessity of proactive threat hunting. Subsequent sections focus on automation concepts and technologies and underline the criticality of the incident response process.
Round off your learning journey by analysing potential indicators of compromise, harnessing basic digital forensics techniques, and comprehending the importance of data privacy and protection. The final sections of the CompTIA CySA+ (CS0-002) Cyber Analyst course emphasize security concepts supporting organisational risk mitigation and the significance of frameworks, policies, procedures, and controls.
Learning outcome
- Understand the importance of threat data and intelligence
- Apply threat intelligence to improve organizational security
- Manage vulnerabilities in your organization's infrastructure
- Protect your organization from cloud-based threats
- Respond to security incidents effectively
Course media
Why should I take this course?
- It is a valuable credential that can help you advance your career in cybersecurity
- To cover the latest cybersecurity threats and technologies
- It is taught by experienced instructors who are experts in their field
- It provides you with the skills and knowledge you need to be a successful cybersecurity analyst
Career Path
- Cybersecurity analyst
- Security engineer
- Incident responder
- Forensics analyst
- Security consultant
Requirements
- CompTIA Network+ certification or equivalent experience
- Basic knowledge of cybersecurity concepts
Course Curriculum
-
Introduction00:02:00
-
All about the Exam00:08:00
-
What’s New on the CompTIA CySA+ Exam?00:05:00
-
Meet the Instructors00:02:00
-
Thinking like the Enemy00:09:00
-
Tools of the Trade00:08:00
-
Resource – CompTIA CySA+ (CS0-002) Exam Objectives
-
Intelligence Sources and Confidence Levels00:08:00
-
Threat Indicators and Actors00:08:00
-
Threat Trends00:07:00
-
Intelligence Cycle and ISACs00:06:00
-
Resource: Slides Handouts
-
Attack Frameworks00:06:00
-
Threat Research00:11:00
-
Threat Modeling and Intelligence Sharing00:06:00
-
Resource: Slides Handouts
-
Vulnerability Identification00:07:00
-
Scanning Parameters and Criteria00:09:00
-
Scanning Special Considerations00:06:00
-
Validation00:03:00
-
Remediation and Mitigation00:08:00
-
Inhibitors to Remediation00:07:00
-
Resource: Slides Handouts
-
Web Applications Scanners, Part 100:10:00
-
Web Applications Scanners, Part 200:05:00
-
Scanning00:06:00
-
Configuring and Executing Scans00:08:00
-
Vulnerability Scanning00:10:00
-
Reverse Engineering00:08:00
-
Enumeration00:06:00
-
Wireless Assessment Tools00:08:00
-
Cloud Assessment Tools00:04:00
-
Resource: Slides Handouts
-
Mobile and IoT00:10:00
-
Embedded and Firmware Systems (RTOS, SoC, and FPGA)00:09:00
-
Access and Vehicles Risk00:08:00
-
Automation and Control Risk00:10:00
-
Resource: Slides Handouts
-
Cloud Models00:07:00
-
Remote Service Invocation (FaaS, IaC, API)00:10:00
-
Cloud Vulnerabilities00:06:00
-
Resource Handouts
-
Injection and Overflow Attacks00:09:00
-
Authentication Attacks00:07:00
-
Exploits00:08:00
-
Application Vulnerabilities, Part 100:08:00
-
Application Vulnerabilities, Part 200:07:00
-
Resource Handouts
-
Network Architecture and Asset Management00:09:00
-
Protecting Your Territory00:05:00
-
Identity and Access Management00:11:00
-
Encryption and Active Defense00:08:00
-
Resource Handouts
-
Platforms00:07:00
-
SOA and DevSecOps00:09:00
-
Secure Software Development00:08:00
-
Best Coding Practices00:04:00
-
Resource Handouts
-
Trusted Hardware00:10:00
-
Hardware Encryption00:04:00
-
Hardware Security00:08:00
-
Resource Handouts
-
Data Analytics00:10:00
-
Endpoint Security00:08:00
-
Recon Results, Part 100:13:00
-
Recon Results, Part 200:05:00
-
Impact Analysis00:05:00
-
Collective Tools00:09:00
-
Query Writing00:07:00
-
E-mail Analysis, Part 100:10:00
-
E-mail Analysis, Part 200:08:00
-
Resource Handouts
-
Permissions00:09:00
-
Firewalls00:08:00
-
Intrusion Prevention Rules00:05:00
-
DLP and Endpoint Detection00:05:00
-
Frustration and attrition00:13:00
-
Resource Handouts
-
Threat Hunting and the Hypothesis00:06:00
-
Threat Hunting Process00:07:00
-
Results and Benefits00:05:00
-
Resource Handouts
-
Workflow and Scripting00:07:00
-
API and Malware Signature Creation00:08:00
-
Threat Feeds and Machine Learning00:06:00
-
Protocols, Standards, and Software Engineering00:05:00
-
Resource Handouts
-
IR Roles and Responsibilities00:08:00
-
IR Active Preparation00:10:00
-
Resource Handouts
-
Incident Response Process00:07:00
-
Resource Handouts
-
Network Symptoms00:04:00
-
Host Symptoms00:08:00
-
Application Symptoms00:04:00
-
Resource Handouts
-
Digital Forensics00:10:00
-
Seizure and Acquisitions00:05:00
-
Forensics Acquisition Tools00:09:00
-
Mobile, Virtualization, and Cloud00:06:00
-
Forensics Analysis, Part 100:04:00
-
Forensics Analysis, Part 200:08:00
-
Packet Capture00:12:00
-
Resource Handouts
-
Data Privacy and Security00:06:00
-
Nontechnical Controls00:09:00
-
Technical Controls00:08:00
-
Resource Handouts
-
Business Impact Analysis00:05:00
-
Risk Identification00:05:00
-
Risk Calculation and Communication00:06:00
-
Training00:04:00
-
Supply Chain Assessment00:04:00
-
Resource Handouts
-
Frameworks00:13:00
-
Policies and Procedures00:05:00
-
Controls and Procedures00:08:00
-
Verification00:06:00
-
Resource Handouts
14-Day Money-Back Guarantee
-
Duration:11 hours, 46 minutes
-
Access:1 Year
-
Units:119
Want to get everything for £149
Take Lifetime Pack