CompTIA Cybersecurity Analyst (CySA+)

by QA Claim Listing

The CompTIA CySA+ is an internationally targeted validation of intermediate-level security skills and knowledge. While there is no required prerequisite, the CompTIA CySA+ certification is intended to follow CompTIA Security+ or equivalent experience and has a technical, “hands-on” focus on IT secur

£2930

Contact the Institutes

Fill this form

Advertisement

QA Logo

img Duration

5 Days

Course Details

Overview

The CompTIA CySA+ is an internationally targeted validation of intermediate-level security skills and knowledge.

While there is no required prerequisite, the CompTIA CySA+ certification is intended to follow CompTIA Security+ or equivalent experience and has a technical, “hands-on” focus on IT security analytics.

The CompTIA CySA+ is designed for IT security analysts, vulnerability analysts,or threat intelligence analysts. The exam (available separately from this course, please contact your QA Account Manager for details) will certify that the successful candidate has the knowledge and skills required to configure and use threat detection tools, perform data analysis and interpret the results to identify vulnerabilities, threats, and risks to an organization with theend goal of securing and protecting applications and systems within an organization.

 

Prerequisites

  • 3-4 years of hands-on information security or related experience

  • Network+, Security+, or equivalent knowledge

 

CySA+ certification is valid for three years; upon which it requires to be renewed.

 

Delegates will learn how to

Upon Completion of this Course, you will accomplish following:

  • Apply environmental reconnaissance techniques using appropriate tools and processes.

  • Analyze the results of a network reconnaissance.

  • Given a network-based threat, implement or recommend the appropriate response and countermeasure.

  • Explain the purpose of practices used to secure a corporate environment.

  • Implement an information security vulnerability management process.

  • Analyze the output resulting from a vulnerability scan.

  • Compare and contrast common vulnerabilities found in the various targets within an organization.

  • Distinguish threat data or behavior to determine the impact of an incident.

  • Prepare a toolkit and use appropriate forensics tools during an investigation.

  • Explain the importance of communication during the incident response process.

  • Analyze common symptoms to select the best course of action to support incident response.

  • Summarize the incident recovery and post-incident response process.

  • Explain the relationship between frameworks, common policies, controls, and procedures.

  • Use data to recommend remediation of security issues related to identity and access management.

  • Review security architecture and make recommendations to implement compensating controls.

  • Use application security best practices while participating in the Software Development Life Cycle (SDLC).

  • Compare and contrast the general purpose and reasons for using various cybersecurity tools and technologies.

  • London Branch

    1st Floor International House 1 St Katharines Way, London
  • Manchester Branch

    8th Floor St James Buildings 79 Oxford Street, Manchester
  • Birmingham Branch

    10th Floor Centre City 5-7 Hill Street, Birmingham
  • Glasgow Branch

    Portland House 17 Renfield Street, Glasgow
  • Newcastle Branch

    2nd Floor 1 St James Gate, Newcastle
  • Leeds Branch

    Islington House Brown Lane West, Leeds
  • Edinburgh Branch

    10 Colinton Road, Edinburgh

Check out more Cybersecurity courses in UK

London IT Training (LIT) Logo

Bind DNS Administration Training

BIND (Berkeley Internet Name Domain) DNS (Domain Name System) Administration Training course covers DNS fundamentals.

by London IT Training (LIT)
Nottingham City Council Logo

Certificate in Information Security Management Principles (Includes Online Exam Voucher)

Certificate in Information Security Management Principles (includes online exam voucher) course is offered by Nottingham City Council

by Nottingham City Council [Claim Listing ]
Nemstar Logo

EC Council Official Certified Incident Handler (ECIH) with Exam

Focusing on detection and response to cyber threats E|CIH covers incident handling and response preparation, incident validation and prioritization, incident escalation and notification, forensic evidence gathering and analysis, incident containment, systems recovery, and incident eradication

by Nemstar [Claim Listing ]
Alliance Manchester Business School Logo

Coping with Cyber Risk

This ‘live-run’ exercise comprises a safe-space experience of a cyber incident, enabling you to rise above the technical babble of fear, uncertainty, and doubt. Hear from experts and increase the risk of your connected technologies being resilient and sustainable.

by Alliance Manchester Business School [Claim Listing ]
Impact IT Training Logo

Comptia Security+ (SY0-601)

The Security+ exam covers the most important foundational principles for securing a network and managing risk. Access control, identity management and cryptography are important topics on the exam

by Impact IT Training [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy