CompTIA Cybersecurity Analyst (CySA+)

by NILC Training Claim Listing

CompTIA is a not-for-profit trade association with the purpose of advancing the interests of IT professionals and IT channel organizations, and its industry-leading IT certifications are an important part of that mission.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

NILC Training Logo

img Duration

5 Days

Course Details

CompTIA is a not-for-profit trade association with the purpose of advancing the interests of IT professionals and IT channel organizations, and its industry-leading IT certifications are an important part of that mission. 

CompTIA CyberSecurity Analyst (CySA+) certification is an intermediate-level certification designed to demonstrate the knowledge and competencies of a security analyst or specialist with four years’ experience in the field.

This course covers the duties of cybersecurity analysts who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents.

 The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization’s security, collect and analyze cybersecurity intelligence, and handle incidents as they occur. The course will also prepare you for the CompTIA CySA+ (Exam CS0-002) certification examination.

 

After you complete this course you will be able to:

  • Assess and respond to security threats and operate a systems and network security analysis platform.
  • Collect and use cybersecurity intelligence and threat data.
  • Identify modern cybersecurity threat actors types and tactics, techniques and procedures.
  • Analyze data collected from security and event logs and network packet captures.
  • Respond to and investigate cybersecurity incidents using forensic analysis techniques.
  • Assess information security risk in computing and network environments.
  • Implement a vulnerability management program.
  • Address security issues with an organization‘s network architecture.
  • Understand the importance of data governance controls.
  • Address security issues with an organization‘s software development life cycle.
  • Address security issues with an organization‘s use of cloud and service-oriented architecture.

 

Outline:

  • CompTIA Cybersecurity Analyst (CySA+)
  • Lesson 1: Explaining the Importance of Security Controls and Security Intelligence
  • Topic 1A: Identify Security Control Types
  • Topic 1B: Explain the Importance of Threat Data and Intelligence
  • Lesson 2: Utilizing Threat Data and Intelligence
  • Topic 2A: Classify Threats and Threat Actor Types
  • Topic 2B: Utilize Attack Frameworks and Indicator Management
  • Topic 2C: Utilize Threat Modeling and Hunting Methodologies
  • Lesson 3: Analyzing Security Monitoring Data
  • Topic 3A: Analyze Network Monitoring Output
  • Topic 3B: Analyze Appliance Monitoring Output
  • Topic 3C: Analyze Endpoint Monitoring Output
  • Topic 3D: Analyze Email Monitoring Output
  • Lesson 4: Collecting and Querying Security Monitoring Data
  • Topic 4A: Configure Log Review and SIEM Tools
  • Topic 4B: Analyze and Query Logs and SIEM Data
  • Lesson 5: Utilizing Digital Forensics and Indicator Analysis Techniques
  • Topic 5A: Identify Digital Forensics Techniques
  • Topic 5B: Analyze Network-related IoCs
  • Topic 5C: Analyze Host-related IoCs
  • Topic 5D: Analyze Application-Related IoCs
  • Topic 5E: Analyze Lateral Movement and Pivot IoCs
  • Lesson 6: Applying Incident Response Procedures
  • Topic 6A: Explain Incident Response Processes
  • Topic 6B: Apply Detection and Containment Processes
  • Topic 6C: Apply Eradication, Recovery, and Post‑Incident Processes
  • Lesson 7: Applying Risk Mitigation and Security Frameworks
  • Topic 7A: Apply Risk Identification, Calculation, and Prioritization Processes
  • Topic 7B: Explain Frameworks, Policies, and Procedures
  • Lesson 8: Performing Vulnerability Management
  • Topic 8A: Analyze Output from Enumeration Tools
  • Topic 8B: Configure Infrastructure Vulnerability Scanning Parameters
  • Topic 8C: Analyze Output from Infrastructure Vulnerability Scanners
  • Topic 8D: Mitigate Vulnerability Issues
  • Lesson 9 Applying Security Solutions for Infrastructure Management
  • Topic 9A: Apply Identity and Access Management Security Solutions
  • Topic 9B: Apply Network Architecture and Segmentation Security Solutions
  • Topic 9C: Explain Hardware Assurance Best Practices
  • Topic 9D: Explain Vulnerabilities Associated with Specialized Technology
  • Lesson 10: Understanding Data Privacy and Protection
  • Topic 10A: Identify Non-Technical Data and Privacy Controls
  • Topic 10B: Identify Technical Data and Privacy Controls
  • Lesson 11: Applying Security Solutions for Software Assurance
  • Topic 11A: Mitigate Software Vulnerabilities and Attacks
  • Topic 11B: Mitigate Web Application Vulnerabilities and Attacks
  • Topic 11C: Analyze Output from Application Assessments
  • Lesson 12: Applying Security Solutions for Cloud and Automation
  • Topic 12A: Identify Cloud Service and Deployment Model Vulnerabilities
  • Topic 12B: Explain Service-Oriented Architecture
  • Topic 12C: Analyze Output from Cloud Infrastructure Assessment Tools
  • Topic 12D: Compare Automation Concepts and Technologies
  • Cardiff Branch

    Temple Court, 13a Cathedral Road, Cardiff

Check out more CompTIA A+ courses in UK

Datrix Training Logo

CISCO CCNP Training

The CISCO CCNP Certification has been intended to help you to prepare for CISCO CCNP certification. The CCNP certification is a section of the CCNP programme. The ROUTE course is aimed to deliver professionals of medium to large network sites.

by Datrix Training [Claim Listing ]
IT Professional Training Logo

CCNP Security

ITPT is currently offering a fully funded Cisco CCNP Security course.  It is a great opportunity to be Cisco certified for those of you who would like to establish a career in Cisco Networking. Cisco Certifications are globally recognised & respected.

by IT Professional Training [Claim Listing ]
MSP Training Logo

CCNP Security Training

A Professional recognizes a Cisco Certified Network Professional who can manage certain security features such as switches, routers, modems and other networking devices supported by Cisco firm.

by MSP Training [Claim Listing ]
Eu-Sam IT Training Logo

Network Essentials

Networking is essential to many businesses function today. It also the heart of digital transformation with great impact across critical data and operations, cybersecurity and many more.

by Eu-Sam IT Training [Claim Listing ]
Learning Tree Logo

Introduction To Networking Training

This hands-on Introduction to Networking course will enable you to take a more active part in the discussion and decision-making processes related to networking technology issues.v

by Learning Tree [Claim Listing ]

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy