CompTIA Cybersecurity Analyst CySA

by Inovasi EduTech Claim Listing

CompTIA Cybersecurity Analyst CySA course is offered by Inovasi EduTech. We strive to empower learners with the knowledge, skills, and expertise they need to succeed in today’s rapidly evolving technology landscape.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Inovasi EduTech Logo

img Duration

Please Enquire

Course Details

CompTIA Cybersecurity Analyst CySA course is offered by Inovasi EduTech. We strive to empower learners with the knowledge, skills, and expertise they need to succeed in today’s rapidly evolving technology landscape. We believe that education is a lifelong pursuit and that learning should be engaging, practical, and accessible.

 

Course Outline:

  • Lesson 1
  • 1.0 Threat Management
  • 1.1 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes.
  • Procedures/common tasks
  • Variables
  • Tools
  • Lesson 2
  • 1.2 Given a scenario, analyze the results of a network reconnaissance.
  • Point-in-time data analysis
  • Data correlation and analytics
  • Data output
  • Tools
  • Lesson 3
  • 1.3 Given a network-based threat, implement or recommend the appropriate response and countermeasure.
  • Network segmentation
  • Honeypot
  • Endpoint security
  • Group policies
  • ACLs
  • Hardening
  • Network Access Control (NAC)
  • Lesson 5
  • 2.0 Vulnerability Management
  • 2.1 Given a scenario, implement an information
  • security vulnerability management process.
  • Identification of requirements
  • Establish scanning frequency
  • Configure tools to perform scans according to specification
  • Execute scanning
  • Generate reports
  • Remediation
  • Ongoing scanning and continuous monitoring
  • Lesson 7
  • 2.3 Compare and contrast common vulnerabilities found in the following targets within an organization.
  • Servers
  • Endpoints
  • Network infrastructure
  • Network appliances
  • Virtual infrastructure
  • Mobile devices
  • Interconnected networks
  • Virtual private networks (VPNs)
  • Industrial Control Systems (ICSs)
  • SCADA devices
  • Lesson 9
  • 3.2 Given a scenario, prepare a toolkit and use appropriate forensics tools during an investigation.
  • Forensics kit
  • Forensic investigation suite
  • Lesson 11
  • 3.4 Given a scenario, analyze common symptoms to select the best course of action to support incident response.
  • Common network-related symptoms
  • Common host-related symptoms
  • Common application-related symptoms
  • Lesson 13
  • 4.0 Security Architecture and Tool Sets
  • 4.1 Explain the relationship between frameworks, common policies, controls, and procedures.
  • Regulatory compliance
  • Frameworks
  • Policies
  • Controls
  • Procedures
  • Verifications and quality control
  • Lesson 15
  • 4.4 Given a scenario, use application security best practices while
  • participating in the Software Development Life Cycle (SDLC).
  • Best practices during software development frameworks
  • Secure coding best practices
  • Lesson 4
  • 1.4 Explain the purpose of practices used to secure a corporate environment.
  • Penetration testing
  • Reverse engineering
  •  Software/malware
  • Training and exercises
  • Risk evaluation 
  • Lesson 6
  • 2.2 Given a scenario, analyze the output resulting from a vulnerability scan.
  • Analyze reports from a vulnerability scan
  • Validate results and correlate other data points
  • Lesson 8
  • 3.0 Cyber Incident Response
  • 3.1 Given a scenario, distinguish threat data or behaviour to determine the impact of an incident.
  • Threat classification
  • Factors contributing to incident severity and prioritization
  • Lesson 10
  • 3.3 Explain the importance of communication during the
  • incident response process.
  • Stakeholders
  • Purpose of communication processes
  • Role-based responsibilities
  • Lesson 12
  • 3.5 Summarize the incident recovery and post-incident response process.
  • Containment techniques
  • Eradication techniques
  • Validation
  • Corrective actions
  • Incident summary report
  • Lesson 14
  • 4.2 Given a scenario, use data to recommend remediation of security issues related to identity and access management.
  • Security issues associated with context-based
  • authentication
  • Security issues associated with identities
  • Security issues associated with identity repositories
  • Security issues associated with the federation and single sign-on
  • Exploits
  • Lesson 16
  • 4.3 Given a scenario, review security architecture and make recommendations to implement compensating controls.
  • Security data analytics
  • Manual review
  • Lesson 17
  • 4.5 Compare and contrast the general purpose and reasons for using various cybersecurity tools and technologies. (**The intent of this objective is NOT to test specific vendor feature sets.)
  • Preventative
  • Collective
  • Vulnerability scanning
  • Analytical
  • Exploit
  • Forensics
  • Petaling Jaya Branch

    Suite B8, Bangunan Khas, Lorong 8/1e, Petaling Jaya

Check out more Cybersecurity courses in Malaysia

Orbitage Logo

Essentials of Information Security

This program provides an introduction to the area of information security, covering both attack and defence aspects. It covers the need for security in organisations, common threats and vulnerabilities as well as best practices in security implementation

by Orbitage [Claim Listing ]
Iverson Logo

Cyber Security

The Certified Application Security Engineer (CASE) credential is developed in partnership with large application and software development experts globally.

by Iverson [Claim Listing ]
Sakra Academy (M) Sdn.Bhd. Logo

CSX Cybersecurity Fundamentals

The Cybersecurity Fundamentals (CSX) course is an excellent way to gain foundational knowledge in cybersecurity, begin to build your knowledge,, and kick-start your career in this crucial area.

by Sakra Academy (M) Sdn.Bhd. [Claim Listing ]
Academy Adelphi Worldwide Edu Sdn Bhd Logo

Network Defender

Network Defender course is offered by Academy Adelphi Worldwide Edu Sdn Bhd. Our in-house training option enables you to select the mix of participants to ensure optimum results and promote team spirit.

by Academy Adelphi Worldwide Edu Sdn Bhd [Claim Listing ]
Bumiputera Education Leader Foundation Logo

Cyber Security

Cyber Security course is offered by Bumiputera Education Leader Foundation. Understanding the challenges of the industry's needs, the programs we run not only focus on technical competence but also 'soft skills'.

by Bumiputera Education Leader Foundation [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy