Course Overview
CompTIA Cybersecurity Analyst (CySA+) is a certification for cyber professionals tasked with incident detection, prevention, and response through continuous security monitoring.
Make yourself a valuable team member and show your knowledge of current trends that affect the daily work of security analysts, such as cloud and hybrid environments.
Demonstrate your skills in detecting and analyzing indicators of malicious activity using the most up-to-date methods and tools, such as threat intelligence, security information and event management (SIEM), endpoint detection and response (EDR), and extended detection and response (XDR).
Prove your knowledge of incident response and vulnerability management processes, and highlight the communication skills critical to security analysis and compliance.
This course can benefit you in two ways. If you intend to pass the CompTIA CySA+ (Exam CS0-003) certification examination, this course can be a significant part of your preparation. But certification is not the only key to professional success in the field of security analysis. Today’s job market demands individuals with demonstrable skills, and the information and activities in this course can help you build your security analyst skill set so that you can confidently perform your duties in any security analyst role.
Exam Details:
Maximum of 85 questions
Multiple choice and performance-based
165 minutes
Passing Score: 750 (on a scale of 100-900)
What you’ll learn
During this course you will learn the following skills:
Security Operations: Improve processes in security operations and differentiate between threat intelligence and threat hunting concepts; identify and analyze malicious activity using the appropriate tools and techniques
Vulnerability Management: Implement and analyze vulnerability assessments, prioritize vulnerabilities and make recommendations on mitigating attacks and vulnerability response
Incident Response and Management: Apply updated concepts of attack methodology frameworks, perform incident response activities and understand the incident management lifecycle
Reporting and Communication: Apply communication best practices in vulnerability management and incident response as it relates to stakeholders, action plans, escalation and metrics
Requirements
- Recommended experience: Network+, Security+, or equivalent knowledge. Minimum of 4 years of hands-on experience as an incident response analyst or security operations center (SOC) analyst, or equivalent experience.
Target audiences
- All Source Analyst, Warning Analyst, Forensics Analyst, Cyber Defense Forensics Analyst, Cyber Crime Investigator, Systems Security Analyst, Cyber Defense Analyst, Cyber Defense Incident Responder, Vulnerability Assessment Analyst, Security Control Assessor.
Curriculum
- 1 Section
- 14 Lessons
- 51 Weeks
- Topics14
- 1.1Lesson 1: Understanding Vulnerability Response, Handling, and Management Topic 1A: Understanding Cybersecurity Leadership Concepts Topic 1B: Exploring Control Types and Methods Topic 1C: Explaining Patch Management Concepts
- 1.2Lesson 2: Exploring Threat Intelligence and Threat Hunting Concepts Topic 2A: Exploring Threat Actor Concepts Topic 2B: Identifying Active Threats Topic 2C: Exploring Threat-Hunting Concepts
- 1.3Lesson 3: Explaining Important System and Network Architecture Concepts Topic 3A: Reviewing System and Network Architecture Concepts Topic 3B: Exploring Identity and Access Management (IAM) Topic 3C: Maintaining Operational Visibility
- 1.4Lesson 4: Understanding Process Improvement in Security Operations Topic 4A: Exploring Leadership in Security Operations Topic 4B: Understanding Technology for Security Operations
- 1.5Lesson 5: Implementing Vulnerability Scanning Methods Topic 5A: Explaining Compliance Requirements Topic 5B: Understanding Vulnerability Scanning Methods Topic 5C: Exploring Special Considerations in Vulnerability Scanning
- 1.6Lesson 6: Performing Vulnerability Analysis Topic 6A: Understanding Vulnerability Scoring Concepts Topic 6B: Exploring Vulnerability Context Considerations
- 1.7Lesson 7: Communicating Vulnerability Information Topic 7A: Explaining Effective Communication Concepts Topic 7B: Understanding Vulnerability Reporting Outcomes and Action Plans
- 1.8Lesson 8: Explaining Incident Response Activities Topic 8A: Exploring Incident Response Planning Topic 8B: Performing Incident Response Activities
- 1.9Lesson 9: Demonstrating Incident Response Communication Topic 9A: Understanding Incident Response Communication Topic 9B: Analyzing Incident Response Activities
- 1.10Lesson 10: Applying Tools to Identify Malicious Activity Topic 10A: Identifying Malicious Activity Topic 10B: Explaining Attack Methodology Frameworks Topic 10C: Explaining Techniques for Identifying Malicious Activity
- 1.11Lesson 11: Analyzing Potentially Malicious Activity Topic 11A: Exploring Network Attack Indicators Topic 11B: Exploring Host Attack Indicators Topic 11C: Exploring Vulnerability Assessment Tools
- 1.12Lesson 12: Understanding Application Vulnerability Assessment Topic 12A: Analyzing Web Vulnerabilities Topic 12B: Analyzing Cloud Vulnerabilities
- 1.13Lesson 13: Exploring Scripting Tools and Analysis Concepts Topic 13A: Understanding Scripting Languages Topic 13B: Identifying Malicious Activity Through Analysis
- 1.14Lesson 14: Understanding Application Security and Attack Mitigation Best Practices Topic 14A: Exploring Secure Software Development Practices Topic 14B: Recommending Controls to Mitigate Successful Application Attacks Topic 14C: Implementing Controls to Prevent Attacks
