CompTIA Cybersecurity Analyst (CySA+) Training Course Outline
Overview
This training is for CompTIA CySA+ Cybersecurity Analyst Certification exam CS0-003. This course is intended for those wishing to qualify with CompTIA CySA+ Cybersecurity Analyst Certification. CompTIA's CySA+ Certification is an intermediate-level certificate for IT professionals with previous experience of working in the field of IT security. The CompTIA CySA+ examination is designed for IT security analysts, vulnerability analysts, or threat intelligence analysts. The exam will certify that the successful candidate has the knowledge and skills required to configure and use threat detection tools, perform data analysis, and interpret the results to identify vulnerabilities, threats, and risks to an organization with the end goal of securing and protecting applications and systems within an organization.
CompTIA Certification Track
This courseware bears the seal of CompTIA Approved Quality Content. This seal signifies this content covers 100% of the exam objectives and implements important instructional design principles. CompTIA recommends multiple learning tools to help increase coverage of the learning objectives.
The contents of this training material was created for the CompTIA CySA+ Cybersecurity Analyst Certification CS0-003 exam.
Exam Prep Software--INCLUDED!
All of our CompTIA classes include access to web-based practice exams. CompTIA certification exams are very rigorous and challenging. By studying after the class and using these practice exams, you will greatly improve your chances of passing the actual certification exam the first time. Exam prep software is included with all CompTIA classes delivered by ONLC Training Centers.
ONLC’s Exam Pass Guarantee--INCLUDED!
Our CompTIA certification classes include our Exam Pass Guarantee. Work through the Exam Prep Software included with your course. When you achieve a practice test score of 85% or better in Certification mode, send proof of that score to exam@onlc.com. We will then release the exam voucher for the authorized certification exam to you. If you fail the authorized certification exam on the first attempt, we will provide a second exam voucher to you at no charge. HOWEVER, if you don't use the practice test or you take the authorized exam without first achieving 85% or better on the practice test, then the Exam Pass Guarantee is null and void. See all details at:
Exam Pass Guarantee
Additional Notes Regarding CompTIA Certification Exams
As with most professional IT certifications, additional hours of study are needed before the class (meeting the prerequisites) and after the class (reviewing exam objectives and practice questions). Expect to spend a significant number of hours studying outside of the class before you take a CompTIA or any other IT professional exam.
Target audience and course prerequisites
CompTIA CySA+ certification is aimed at IT professionals with (or seeking) job roles such as IT Security Analyst, Security Operations Center (SOC) Analyst, Vulnerability Analyst, Cybersecurity Specialist, Threat
Intelligence Analyst, and Security Engineer.
Ideally, you should have successfully completed:
CompTIA Network+ Certification AND
Security+ Certification courses or have equivalent knowledge before attending this training.
Specifically, it is recommended that you have the following skills and knowledge before starting this course:
◾ Know basic network terminology and functions (such as OSI Model, Topology, Ethernet, WiFi, switches, routers).
◾ Understand TCP/IP addressing, core protocols, and troubleshooting tools.
◾ Identify network attack strategies and defenses.
◾ Know the technologies and uses of cryptographic standards and products.
◾ Identify network- and host-based security technologies and practices.
◾ Describe the standards and products used to enforce security on web and communications technologies.
COMPTIA CYSA+ COURSE OUTLINE
Lesson 1: Understanding Vulnerability Response, Handling and Management
Topic 1A: Understanding Cybersecurity Leadership Concepts
Topic 1B: Exploring Control Types and Methods
Topic 1C: Explaining Patch Management Concepts
Lesson 2: Exploring Threat Intelligence and Threat Hunting Concepts
Topic 2A: Exploring Threat Actor Concepts
Topic 2B: Identifying Active Threats
Topic 2C: Exploring Threat-Hunting Concepts
Lesson 3: Explaining Important System and Network Architecture Concepts
Topic 3A: Reviewing System and Network Architecture Concepts
Topic 3B: Exploring Identity and Access Management (IAM)
Topic 3C: Maintaining Operational Visibility
Lesson 4: Understanding Process Improvement in Security Operations
Topic 4A: Exploring Leadership in Security Operations
Topic 4B: Understanding Technology for Security Operations
Lesson 5: Implementing Vulnerability Scanning Methods
Topic 5A: Explaining Compliance Requirements
Topic 5B: Understanding Vulnerability Scanning Methods
Topic 5C: Exploring Special Considerations in Vulnerability Scanning
Lesson 6: Performing Vulnerability Analysis
Topic 6A: Understanding Vulnerability Scoring Concepts
Topic 6B: Exploring Vulnerability Context Considerations
Lesson 7: Communicating Vulnerability Information
Topic 7A: Explaining Effective Communication Concepts
Topic 7B: Understanding Vulnerability Reporting Outcomes and Action Plans
Lesson 8: Explaining Incident Response Activities
Topic 8A: Exploring Incident Response Planning
Topic 8B: Performing Incident Response Activities
Lesson 9: Demonstrating Incident Response Communication
Topic 9A: Understanding Incident Response Communication
Topic 9B: Analyzing Incident Response Activities
Lesson 10: Applying Tools to Identify Malicious Activity
Topic 10A: Identifying Malicious Activity
Topic 10B: Explaining Attack Methodology Frameworks
Topic 10C: Explaining Techniques for Identifying Malicious Activity
Lesson 11: Analyzing Potentially Malicious Activity
Topic 11A: Exploring Network Attack Indicators
Topic 11B: Exploring Host Attack Indicators
Topic 11C: Exploring Vulnerability Assessment Tools
Lesson 12: Understanding Application Vulnerability Assessment
Topic 12A: Analyzing Web Vulnerabilities
Topic 12B: Analyzing Cloud Vulnerabilities
Lesson 13: Exploring Scripting Tools and Analysis Concepts
Topic 13A: Understanding Scripting Languages
Topic 13B: Identifying Malicious Activity Through Analysis
Lesson 14: Understanding Application Security and Attack Mitigation
Best Practices
Topic 14A: Exploring Secure Software Development Practices
Topic 14B: Recommending Controls to Mitigate Successful Application Attacks
Topic 14C: Implementing Controls to Prevent Attacks
View outline in Word
XCSA03