CompTIA Cybersecurity Analyst CySA

by Inovasi EduTech Claim Listing

CompTIA Cybersecurity Analyst CySA course is offered by Inovasi EduTech. We strive to empower learners with the knowledge, skills, and expertise they need to succeed in today’s rapidly evolving technology landscape.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Inovasi EduTech Logo

img Duration

Please Enquire

Course Details

CompTIA Cybersecurity Analyst CySA course is offered by Inovasi EduTech. We strive to empower learners with the knowledge, skills, and expertise they need to succeed in today’s rapidly evolving technology landscape. We believe that education is a lifelong pursuit and that learning should be engaging, practical, and accessible.

 

Course Outline:

  • Lesson 1
  • 1.0 Threat Management
  • 1.1 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes.
  • Procedures/common tasks
  • Variables
  • Tools
  • Lesson 2
  • 1.2 Given a scenario, analyze the results of a network reconnaissance.
  • Point-in-time data analysis
  • Data correlation and analytics
  • Data output
  • Tools
  • Lesson 3
  • 1.3 Given a network-based threat, implement or recommend the appropriate response and countermeasure.
  • Network segmentation
  • Honeypot
  • Endpoint security
  • Group policies
  • ACLs
  • Hardening
  • Network Access Control (NAC)
  • Lesson 5
  • 2.0 Vulnerability Management
  • 2.1 Given a scenario, implement an information
  • security vulnerability management process.
  • Identification of requirements
  • Establish scanning frequency
  • Configure tools to perform scans according to specification
  • Execute scanning
  • Generate reports
  • Remediation
  • Ongoing scanning and continuous monitoring
  • Lesson 7
  • 2.3 Compare and contrast common vulnerabilities found in the following targets within an organization.
  • Servers
  • Endpoints
  • Network infrastructure
  • Network appliances
  • Virtual infrastructure
  • Mobile devices
  • Interconnected networks
  • Virtual private networks (VPNs)
  • Industrial Control Systems (ICSs)
  • SCADA devices
  • Lesson 9
  • 3.2 Given a scenario, prepare a toolkit and use appropriate forensics tools during an investigation.
  • Forensics kit
  • Forensic investigation suite
  • Lesson 11
  • 3.4 Given a scenario, analyze common symptoms to select the best course of action to support incident response.
  • Common network-related symptoms
  • Common host-related symptoms
  • Common application-related symptoms
  • Lesson 13
  • 4.0 Security Architecture and Tool Sets
  • 4.1 Explain the relationship between frameworks, common policies, controls, and procedures.
  • Regulatory compliance
  • Frameworks
  • Policies
  • Controls
  • Procedures
  • Verifications and quality control
  • Lesson 15
  • 4.4 Given a scenario, use application security best practices while
  • participating in the Software Development Life Cycle (SDLC).
  • Best practices during software development frameworks
  • Secure coding best practices
  • Lesson 4
  • 1.4 Explain the purpose of practices used to secure a corporate environment.
  • Penetration testing
  • Reverse engineering
  •  Software/malware
  • Training and exercises
  • Risk evaluation 
  • Lesson 6
  • 2.2 Given a scenario, analyze the output resulting from a vulnerability scan.
  • Analyze reports from a vulnerability scan
  • Validate results and correlate other data points
  • Lesson 8
  • 3.0 Cyber Incident Response
  • 3.1 Given a scenario, distinguish threat data or behaviour to determine the impact of an incident.
  • Threat classification
  • Factors contributing to incident severity and prioritization
  • Lesson 10
  • 3.3 Explain the importance of communication during the
  • incident response process.
  • Stakeholders
  • Purpose of communication processes
  • Role-based responsibilities
  • Lesson 12
  • 3.5 Summarize the incident recovery and post-incident response process.
  • Containment techniques
  • Eradication techniques
  • Validation
  • Corrective actions
  • Incident summary report
  • Lesson 14
  • 4.2 Given a scenario, use data to recommend remediation of security issues related to identity and access management.
  • Security issues associated with context-based
  • authentication
  • Security issues associated with identities
  • Security issues associated with identity repositories
  • Security issues associated with the federation and single sign-on
  • Exploits
  • Lesson 16
  • 4.3 Given a scenario, review security architecture and make recommendations to implement compensating controls.
  • Security data analytics
  • Manual review
  • Lesson 17
  • 4.5 Compare and contrast the general purpose and reasons for using various cybersecurity tools and technologies. (**The intent of this objective is NOT to test specific vendor feature sets.)
  • Preventative
  • Collective
  • Vulnerability scanning
  • Analytical
  • Exploit
  • Forensics
  • Petaling Jaya Branch

    Suite B8, Bangunan Khas, Lorong 8/1e, Petaling Jaya

Check out more Cybersecurity courses in Malaysia

IMTC Logo

Certified Cyber Threat Hunter (CCTH)

This technical course is designed to meet the needs of professionals who wish to enhance and develop their skills and capability in the field of Cyber Security Incident Response (CSIR).

by IMTC [Claim Listing ]
Training Valley Logo

Cyber Security Awareness Training

Cyber Security Awareness course is offered by Training Valley. Leave your employees in our hands and we will return them completely equipped with enriched skill set, fresher attitude, world-class knowledge and impressive competency because in Training Valley, we provide Top Notch Training.

by Training Valley [Claim Listing ]
Inovasi EduTech Logo

Certified In The Governance Of Enterprise IT (CGEIT)

Certified in the Governance of Enterprise IT course is offered by Inovasi EduTech. We strive to empower learners with the knowledge, skills, and expertise they need to succeed in today’s rapidly evolving technology landscape.

by Inovasi EduTech [Claim Listing ]
Sakra Academy (M) Sdn.Bhd. Logo

CSX Cybersecurity Fundamentals

The Cybersecurity Fundamentals (CSX) course is an excellent way to gain foundational knowledge in cybersecurity, begin to build your knowledge,, and kick-start your career in this crucial area.

by Sakra Academy (M) Sdn.Bhd. [Claim Listing ]
OSI Technology Sdn Bhd Logo

Cyber Defence For Network Administrator

The Cyber Defence for Network Administrator “intensive hands-on” training focuses on creating Network Administrators who are trained on protecting, detecting and responding to the threats on the network.

by OSI Technology Sdn Bhd [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy