CySA+ (CS0-002) Online Training

Course

Online

Save 50%

Special Emagister price

£ 195 £ 395 VAT inc.

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

"Course Description

This entry-level CompTIA CySA+ training prepares learners to take the CS0-002 exam, which is the one exam required to earn the CompTIA CySA+ certification.

When a cybersecurity framework built on fire-and-forget policies and sit-and-wait enforcement just isn't enough, enter the CompTIA Cybersecurity Analyst (CySA+) certification. CySA+ demonstrates a security professional's competence with providing continuous security monitoring. A CySA+ can prevent, detect and combat threats by applying behavioral analytics to networks and devices -- it's what makes the CySA+ one of the most up-to-date core security analyst skill certifications. When an organization needs proactive capturing, monitoring, and response to network traffic findings, nothing but the cybersecurity certification that emphasizes software and application security, automation, threat hunting, and IT regulatory compliance will do. This training familiarizes IT security professionals with the concepts, knowledge and tools passing the CySA+ exam depends on.

For IT managers, this CompTIA training can be used for CS0-002 exam prep, onboarding new security professionals, individual or team training plans, or as a CompTIA reference resource.

CompTIA Cybersecurity Analyst Entry Requirements

It's recommended - though not required, that you have Network+, Security+ or equivalent knowledge. Minimum of 4 years of hands-on information security or related experience. 

Bulk discounts

Bulk discounts are available on purchases of 10 or more courses.

If you wish to discuss a large individual order for this course, and/or would like to be invoiced in advance, please call our sales team on 01707 828 751 to make an enquiry."

Important information

Price for Emagister users:

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

"Who Is This Course For?

This CySA+ training is considered professional-level CompTIA training, which means it was designed for security professionals. This security analysis skills course is valuable for new IT professionals with at least a year of experience with security and experienced security professionals looking to validate their CompTIA skills.

New or aspiring security professionals. Earning your CompTIA CySA+ certificate is a challenging experience that involves a high-stakes, hands-on, performance-based exam, on top of multiple-choice questions. The CySA+ might be a little bit more ambitious than a new security professional is prepared for. This training, however, can show you the advanced security principles you should be aiming for to prove yourself an expert in your future career.

Experienced security professionals. For a security professional with several years of experience, the CySA+ represents one of the most up-to-date tests of skills that threat intelligence and application security analysts, compliance analysts, incident responders, and threat hunters need to excel in their careers. With this training, you'll be prepared to earn one of the more challenging cybersecurity exams in the IT workforce certification world.

By choosing online learning instead of a classroom based course, it eliminates the need for time away from work, saving you valuable time and money. It is ideal for those with tight schedules as our online courses give you 12 months unlimited access to all the course materials, so you can study at a pace that suits you. Allowing you to easily resume your studies whenever you have the time. All you need is internet connection to study, so you can study from the comfort of your home or any environment that suits you."

"Requirements

Our training works on all devices including Mobile phones, IPad’s, Android tablets, Macs and PC’s.

For the best viewing experience on our state-of-the-art eLearning platform we recommend an internet connection of 10Mbps or better. Please also use Google Chrome or Mozilla Firefox as your browser with Adobe Flash Player."

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Fill in your details to get a reply

We will only publish your name and question

Emagister S.L. (data controller) will process your data to carry out promotional activities (via email and/or phone), publish reviews, or manage incidents. You can learn about your rights and manage your preferences in the privacy policy.

Reviews

Subjects

  • Risk
  • Monitoring
  • Compliance
  • Network
  • Systems
  • IT risk
  • Team Training
  • Network Training

Course programme

"

Course Outline


Course Outline

CompTIA Cybersecurity Analyst course outline

Module 1: Intro & Threat and Vulnerability Management

  1. Instructor Introduction
  2. About the Exam
  3. Test Taking Tips and Techniques
  4. Explain the importance of threat data and intelligence
  5. Given a scenario, utilize threat intelligence to support organizational security
  6. Given a scenario, perform vulnerability management activities pt.1
  7. Given a scenario, perform vulnerability management activities pt.2
  8. Given a scenario, analyze the output from common vulnerability assessment tools
  9. Explain the threats and vulnerabilities associated with the specialized technology
  10. Explain the threats and vulnerabilities associated with operating in the cloud
  11. Given a scenario, implement controls to mitigate attacks and software vulnerabilities pt.1
  12. Given a scenario, implement controls to mitigate attacks and software vulnerabilities pt.2

Module 2: Software and Systems Security

  1. Given a scenario, apply security solutions for infrastructure management pt.1
  2. Given a scenario, apply security solutions for infrastructure management pt.2
  3. Given a scenario, apply security solutions for infrastructure management pt.3
  4. Explain software assurance best practices
  5. Explain hardware assurance best practices

Module 3: Security Operations and Monitoring

  1. Given a scenario, analyze data as part of security monitoring activities pt.1
  2. Given a scenario, analyze data as part of security monitoring activities pt.2
  3. Given a scenario, analyze data as part of security monitoring activities pt.3
  4. Given a scenario, implement configuration changes to existing controls to improve security pt.1
  5. Given a scenario, implement configuration changes to existing controls to improve security pt.2
  6. Explain the importance of proactive threat hunting
  7. Compare and contrast automation concepts and technologies

Module 4: Incident Response

  1. Explain the importance of the incident response process
  2. Given a scenario, apply the appropriate incident response procedure
  3. Given an incident, analyze potential indicators of compromise
  4. Given a scenario, utilize basic digital forensic techniques

Module 5: Compliance and Assessment

  1. Understand the importance of data privacy and protection
  2. Given a scenario, apply security concepts in support of organizational risk mitigation pt.1
  3. Given a scenario, apply security concepts in support of organizational risk mitigation pt.2
  4. Explain the importance of frameworks, policies, procedures and controls pt.1
  5. Explain the importance of frameworks, policies, procedures and controls pt.2

Module 6: Afterword

  1. Recap
  2. Review Questions
  3. Before the exam


CompTIA Cybersecurity Analyst course outline

Module 1: Intro & Threat and Vulnerability Management


Module 1: Intro & Threat and Vulnerability Management
  1. Instructor Introduction
  2. About the Exam
  3. Test Taking Tips and Techniques
  4. Explain the importance of threat data and intelligence
  5. Given a scenario, utilize threat intelligence to support organizational security
  6. Given a scenario, perform vulnerability management activities pt.1
  7. Given a scenario, perform vulnerability management activities pt.2
  8. Given a scenario, analyze the output from common vulnerability assessment tools
  9. Explain the threats and vulnerabilities associated with the specialized technology
  10. Explain the threats and vulnerabilities associated with operating in the cloud
  11. Given a scenario, implement controls to mitigate attacks and software vulnerabilities pt.1
  12. Given a scenario, implement controls to mitigate attacks and software vulnerabilities pt.2

  • Instructor Introduction

  • About the Exam

  • Test Taking Tips and Techniques

  • Explain the importance of threat data and intelligence

  • Given a scenario, utilize threat intelligence to support organizational security

  • Given a scenario, perform vulnerability management activities pt.1

  • Given a scenario, perform vulnerability management activities pt.2

  • Given a scenario, analyze the output from common vulnerability assessment tools

  • Explain the threats and vulnerabilities associated with the specialized technology

  • Explain the threats and vulnerabilities associated with operating in the cloud

  • Given a scenario, implement controls to mitigate attacks and software vulnerabilities pt.1

  • Given a scenario, implement controls to mitigate attacks and software vulnerabilities pt.2

  • Module 2: Software and Systems Security


    Module 2: Software and Systems Security
    1. Given a scenario, apply security solutions for infrastructure management pt.1
    2. Given a scenario, apply security solutions for infrastructure management pt.2
    3. Given a scenario, apply security solutions for infrastructure management pt.3
    4. Explain software assurance best practices
    5. Explain hardware assurance best practices

  • Given a scenario, apply security solutions for infrastructure management pt.1

  • Given a scenario, apply security solutions for infrastructure management pt.2

  • Given a scenario, apply security solutions for infrastructure management pt.3

  • Explain software assurance best practices

  • Explain hardware assurance best practices

  • Module 3: Security Operations and Monitoring


    Module 3: Security Operations and Monitoring
    1. Given a scenario, analyze data as part of security monitoring activities pt.1
    2. Given a scenario, analyze data as part of security monitoring activities pt.2
    3. Given a scenario, analyze data as part of security monitoring activities pt.3
    4. Given a scenario, implement configuration changes to existing controls to improve security pt.1
    5. Given a scenario, implement configuration changes to existing controls to improve security pt.2
    6. Explain the importance of proactive threat hunting
    7. Compare and contrast automation concepts and technologies

  • Given a scenario, analyze data as part of security monitoring activities pt.1

  • Given a scenario, analyze data as part of security monitoring activities pt.2

  • Given a scenario, analyze data as part of security monitoring activities pt.3

  • Given a scenario, implement configuration changes to existing controls to improve security pt.1

  • Given a scenario, implement configuration changes to existing controls to improve security pt.2

  • Explain the importance of proactive threat hunting

  • Compare and contrast automation concepts and technologies

  • Module 4: Incident Response


    Module 4: Incident Response
    1. Explain the importance of the incident response process
    2. Given a scenario, apply the appropriate incident response procedure
    3. Given an incident, analyze potential indicators of compromise
    4. Given a scenario, utilize basic digital forensic techniques

  • Explain the importance of the incident response process

  • Given a scenario, apply the appropriate incident response procedure

  • Given an incident, analyze potential indicators of compromise

  • Given a scenario, utilize basic digital forensic techniques

  • Module 5: Compliance and Assessment


    Module 5: Compliance and Assessment
    1. Understand the importance of data privacy and protection
    2. Given a scenario, apply security concepts in support of organizational risk mitigation pt.1
    3. Given a scenario, apply security concepts in support of organizational risk mitigation pt.2
    4. Explain the importance of frameworks, policies, procedures and controls pt.1
    5. Explain the importance of frameworks, policies, procedures and controls pt.2

  • Understand the importance of data privacy and protection

  • Given a scenario, apply security concepts in support of organizational risk mitigation pt.1

  • Given a scenario, apply security concepts in support of organizational risk mitigation pt.2

  • Explain the importance of frameworks, policies, procedures and controls pt.1

  • Explain the importance of frameworks, policies, procedures and controls pt.2

  • Module 6: Afterword


    Module 6: Afterword
    1. Recap
    2. Review Questions
    3. Before the exam

  • Recap

  • Review Questions

  • Before the exam

  • "

    CySA+ (CS0-002) Online Training

    Special Emagister price

    £ 195 £ 395 VAT inc.