Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

CompTIA CySA+ Certification Prep Course - Cybersecurity Analyst

Learn how to analyze, monitor, and protect critical infrastructures using threat-detection and threat-analysis tools.

Learn about the duties of cybersecurity analysts who are responsible for monitoring and detecting security incidents in information systems and networks and for executing a proper response to such incidents. Depending on the size of the organization, this individual may act alone or may be a member of a cybersecurity incident response team (CSIRT).

Gain the tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate an organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur. This is a comprehensive approach to security aimed toward those on the front lines of defense.

This course is designed to assist students in preparing for the CompTIACySA+ - Cybersecurity Analyst+ (CS0-002) certification exam.

This course includes an exam voucher, study guide, and practice exams.

GK# 5867
Vendor Credits:
  • Global Knowledge Delivered Course
  • Training Exclusives
No matching courses available.
Start learning as soon as today! Click Add To Cart to continue shopping or Buy Now to check out immediately.
Access Period:
Scheduling a custom training event for your team is fast and easy! Click here to get started.
$
Your Selections:
Location:
Access Period:
No available dates

Is This The Right Course?

To ensure your success in this course, you should meet the following requirements:

  • At least two years (recommended) of experience in computer network security technology or a related field.
  • The ability to recognize information security vulnerabilities and threats in the context of risk management.
  • Foundation-level operational skills with some of the common operating systems for computing environments.
  • Foundational knowledge of the concepts and operational framework of common assurance safeguards in computing environments. Safeguards include, but are not limited to, basic authentication and authorization, resource permissions, and anti-malware mechanisms.
  • Foundation-level understanding of some of the common concepts for network environments, such as routing and switching.
  • Foundational knowledge of major TCP/IP networking protocols including, but not limited to, TCP, IP, UDP, DNS, HTTP, ARP, ICMP, and DHCP.
  • Foundational knowledge of the concepts and operational framework of common assurance safeguards in network environments. Safeguards include, but are not limited to, firewalls, intrusion prevention systems, and VPNs.

Who Should Attend?

  • IT Security Analyst
  • Security Operations Center (SOC) Analyst
  • Vulnerability Analyst
  • Cybersecurity Specialist
  • Threat Intelligence Analyst
  • Security Engineer

What You'll Learn

  • Explain the Importance of Security Controls and Security Intelligence
  • Utilize Threat Data and Intelligence
  • Analyze Security Monitoring Data
  • Collect and Query Security Monitoring Data
  • Utilize Digital Forensics and Indicator Analysis Techniques
  • Apply Incident Response Procedures
  • Apply Risk Mitigation and Security Frameworks
  • Perform Vulnerability Management
  • Apply Security Solutions for Infrastructure Management
  • Understand Data Privacy and Protection
  • Apply Security Solutions for Software Assurance
  • Apply Security Solutions for Cloud and Automation

Course Outline

  • Lesson 1: Explaining the Importance of Security Controls and Security Intelligence
  • Lesson 2: Utilizing Threat Data and Intelligence
  • Lesson 3: Analyzing Security Monitoring Data
  • Lesson 4: Collecting and Querying Security Monitoring Data
  • Lesson 5: Utilizing Digital Forensics and Indicator Analysis Techniques
  • Lesson 6: Applying Incident Response Procedures
  • Lesson 7: Applying Risk Mitigation and Security Frameworks
  • Lesson 8: Performing Vulnerability Management
  • Lesson 9: Applying Security Solutions for Infrastructure Management
  • Lesson 10: Understanding Data Privacy and Protection
  • Lesson 11: Applying Security Solutions for Software Assurance
  • Lesson 12: Applying Security Solutions for Cloud and Automation
BUY NOW

Labs Outline

  • Analyzing Output from Network Security Monitoring Tools
  • Discovering the Lab Environment
  • Analyzing Output from Security Appliance Logs
  • Analyzing Output from Endpoint Security Monitoring Tools
  • Analyzing Email Headers
  • Configuring SIEM Agents and Collectors
  • Analyzing, Filtering, and Searching Event Log and syslog Output
  • Collecting and Validating Digital Evidence
  • Analyzing Network-related IoCs
  • Analyzing Host and Application IoCs
  • Observing IoCs during a Security Incident
  • Analyzing Output from Topology and Host Enumeration Tools
  • Testing Credential Security
  • Configuring Vulnerability Scanning and Analyzing Outputs
  • Assessing Vulnerability Scan Outputs
  • Assessing the Impact of Regulation on Vulnerability Management
  • Performing Account and Permissions Audits
  • Configuring Network Segmentation and Security
  • Configuring and Analyzing Share Permissions
  • Assessing the Impact of Web Application Vulnerabilities
  • Analyzing Output from Web Application Assessment Tools
  • Analyzing Output from Cloud Infrastructure Assessment Tools
BUY NOW

Prerequisites

To ensure your success in this course, you should meet the following requirements:

  • At least two years (recommended) of experience in computer network security technology or a related field.
  • The ability to recognize information security vulnerabilities and threats in the context of risk management.
  • Foundation-level operational skills with some of the common operating systems for computing environments.
  • Foundational knowledge of the concepts and operational framework of common assurance safeguards in computing environments. Safeguards include, but are not limited to, basic authentication and authorization, resource permissions, and anti-malware mechanisms.
  • Foundation-level understanding of some of the common concepts for network environments, such as routing and switching.
  • Foundational knowledge of major TCP/IP networking protocols including, but not limited to, TCP, IP, UDP, DNS, HTTP, ARP, ICMP, and DHCP.
  • Foundational knowledge of the concepts and operational framework of common assurance safeguards in network environments. Safeguards include, but are not limited to, firewalls, intrusion prevention systems, and VPNs.

Related Certifications

This course is designed to assist students preparing for the CompTIA CySA+ - Cybersecurity Analyst+ (CS0-001) certification exam. What you learn and practice in this course can be a significant part of your preparation.

Follow-On Courses