CompTIA Cybersecurity Analyst CySA

by Inovasi EduTech Claim Listing

CompTIA Cybersecurity Analyst CySA course is offered by Inovasi EduTech. We strive to empower learners with the knowledge, skills, and expertise they need to succeed in today’s rapidly evolving technology landscape.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Inovasi EduTech Logo

img Duration

Please Enquire

Course Details

CompTIA Cybersecurity Analyst CySA course is offered by Inovasi EduTech. We strive to empower learners with the knowledge, skills, and expertise they need to succeed in today’s rapidly evolving technology landscape. We believe that education is a lifelong pursuit and that learning should be engaging, practical, and accessible.

 

Course Outline:

  • Lesson 1
  • 1.0 Threat Management
  • 1.1 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes.
  • Procedures/common tasks
  • Variables
  • Tools
  • Lesson 2
  • 1.2 Given a scenario, analyze the results of a network reconnaissance.
  • Point-in-time data analysis
  • Data correlation and analytics
  • Data output
  • Tools
  • Lesson 3
  • 1.3 Given a network-based threat, implement or recommend the appropriate response and countermeasure.
  • Network segmentation
  • Honeypot
  • Endpoint security
  • Group policies
  • ACLs
  • Hardening
  • Network Access Control (NAC)
  • Lesson 5
  • 2.0 Vulnerability Management
  • 2.1 Given a scenario, implement an information
  • security vulnerability management process.
  • Identification of requirements
  • Establish scanning frequency
  • Configure tools to perform scans according to specification
  • Execute scanning
  • Generate reports
  • Remediation
  • Ongoing scanning and continuous monitoring
  • Lesson 7
  • 2.3 Compare and contrast common vulnerabilities found in the following targets within an organization.
  • Servers
  • Endpoints
  • Network infrastructure
  • Network appliances
  • Virtual infrastructure
  • Mobile devices
  • Interconnected networks
  • Virtual private networks (VPNs)
  • Industrial Control Systems (ICSs)
  • SCADA devices
  • Lesson 9
  • 3.2 Given a scenario, prepare a toolkit and use appropriate forensics tools during an investigation.
  • Forensics kit
  • Forensic investigation suite
  • Lesson 11
  • 3.4 Given a scenario, analyze common symptoms to select the best course of action to support incident response.
  • Common network-related symptoms
  • Common host-related symptoms
  • Common application-related symptoms
  • Lesson 13
  • 4.0 Security Architecture and Tool Sets
  • 4.1 Explain the relationship between frameworks, common policies, controls, and procedures.
  • Regulatory compliance
  • Frameworks
  • Policies
  • Controls
  • Procedures
  • Verifications and quality control
  • Lesson 15
  • 4.4 Given a scenario, use application security best practices while
  • participating in the Software Development Life Cycle (SDLC).
  • Best practices during software development frameworks
  • Secure coding best practices
  • Lesson 4
  • 1.4 Explain the purpose of practices used to secure a corporate environment.
  • Penetration testing
  • Reverse engineering
  •  Software/malware
  • Training and exercises
  • Risk evaluation 
  • Lesson 6
  • 2.2 Given a scenario, analyze the output resulting from a vulnerability scan.
  • Analyze reports from a vulnerability scan
  • Validate results and correlate other data points
  • Lesson 8
  • 3.0 Cyber Incident Response
  • 3.1 Given a scenario, distinguish threat data or behaviour to determine the impact of an incident.
  • Threat classification
  • Factors contributing to incident severity and prioritization
  • Lesson 10
  • 3.3 Explain the importance of communication during the
  • incident response process.
  • Stakeholders
  • Purpose of communication processes
  • Role-based responsibilities
  • Lesson 12
  • 3.5 Summarize the incident recovery and post-incident response process.
  • Containment techniques
  • Eradication techniques
  • Validation
  • Corrective actions
  • Incident summary report
  • Lesson 14
  • 4.2 Given a scenario, use data to recommend remediation of security issues related to identity and access management.
  • Security issues associated with context-based
  • authentication
  • Security issues associated with identities
  • Security issues associated with identity repositories
  • Security issues associated with the federation and single sign-on
  • Exploits
  • Lesson 16
  • 4.3 Given a scenario, review security architecture and make recommendations to implement compensating controls.
  • Security data analytics
  • Manual review
  • Lesson 17
  • 4.5 Compare and contrast the general purpose and reasons for using various cybersecurity tools and technologies. (**The intent of this objective is NOT to test specific vendor feature sets.)
  • Preventative
  • Collective
  • Vulnerability scanning
  • Analytical
  • Exploit
  • Forensics
  • Petaling Jaya Branch

    Suite B8, Bangunan Khas, Lorong 8/1e, Petaling Jaya

Check out more Cybersecurity courses in Malaysia

New Horizons Logo

CompTIA Security+

CompTIA Security+ Training is offered by New Horizons. We are the authorised learning partner to the top technology providers.

by New Horizons [Claim Listing ]
Symphony Digest Logo

Cyber Security

Cyber Security course is offered by Symphony Digest. Whether you are looking for public courses or HR looking for in-house courses, Symphony has over 200 courses to suit your needs.

by Symphony Digest [Claim Listing ]
Globenex Solutions Logo

NetApp

Give new wings to your career with the NetApp SAN and NAS Storage Ninja NetApp training comprising know-how of NetApp Data Operating System, SAN configuration and many more to explore at our corporate training institute.

by Globenex Solutions [Claim Listing ]
AA Knowledge Malaysia Sdn Bhd Logo

Certificate In Cyber Security

Certificate in Cyber Security is offered by AA Knowledge Malaysia Sdn Bhd. We fill needs creatively and seek new ways of looking at old problems. By promoting learning, research, and education, we contribute to the advancement of education and training.

by AA Knowledge Malaysia Sdn Bhd [Claim Listing ]
Iverson Logo

Cyber Security

The Certified Application Security Engineer (CASE) credential is developed in partnership with large application and software development experts globally.

by Iverson [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy