CySA+ - Cybersecurity Analyst+ Prep Course
Learn how to analyze, monitor, and protect critical infrastructures using threat-detection and threat-analysis tools.
GK# 5867
Learn how to analyze, monitor, and protect critical infrastructures using threat-detection and threat-analysis tools.
GK# 5867
Learn about the duties of cybersecurity analysts who are responsible for monitoring and detecting security incidents in information systems and networks and for executing a proper response to such incidents. Depending on the size of the organization, this individual may act alone or may be a member of a cybersecurity incident response team (CSIRT).
Gain the tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate an organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur. This is a comprehensive approach to security aimed toward those on the front lines of defense.
This course is designed to assist students in preparing for the CompTIA CySA+ - Cybersecurity Analyst+ (CS0-002) certification exam.
Learn more about this topic in this recorded webinar From Analyst to Threat Hunter.
Learn more about this topic in this recorded webinar The Importance of Maintaining Cyber Security Skills.
Learn more about this topic in this recorded webinar Deploying MITRE ATT&CK Navigator to Improve Incident Response.
Assess and respond to security threats and operate a systems and network security analysis platform.
Lesson 1: Explaining the Importance of Security Controls and Security Intelligence
Lesson 2: Utilizing Threat Data and Intelligence
Lesson 3: Analyzing Security Monitoring Data
Lesson 4: Collecting and Querying Security Monitoring Data
Lesson 5: Utilizing Digital Forensics and Indicator Analysis Techniques
Lesson 6: Applying Incident Response Procedures
Lesson 7: Applying Risk Mitigation and Security Frameworks
Lesson 8: Performing Vulnerability Management
Lesson 9: Applying Security Solutions for Infrastructure Management
Lesson 10: Understanding Data Privacy and Protection
Lesson 11: Applying Security Solutions for Software Assurance
Lesson 12: Applying Security Solutions for Cloud and Automation
Labs Available:
To ensure your success in this course, you should meet the following requirements:
This course is available in the following formats:
Receive face-to-face instruction at one of our training center locations.
Experience live, expert-led online training from the convenience of your home, office or anywhere with an internet connection.