Course Highlights
The CompTIA CySA+ (CS0-002) Cyber Analyst certification is the ideal next step for IT professionals who want to advance their careers in cybersecurity. This certification validates the skills and knowledge required to perform various cybersecurity analyst tasks, including threat detection, vulnerability management, and incident response. You will familiarise yourself with myriad vulnerability assessment tools, gaining insight into the threats and vulnerabilities unique to specialised technology and cloud operations.
Next, delve into the realms of infrastructure management security solutions, software, and hardware assurance best practices. You will immerse in data analysis for security monitoring activities, learn to implement configuration changes for improved security and understand the necessity of proactive threat hunting. Subsequent sections focus on automation concepts and technologies and underline the criticality of the incident response process.
Round off your learning journey by analysing potential indicators of compromise, harnessing basic digital forensics techniques, and comprehending the importance of data privacy and protection. The final sections of the CompTIA CySA+ (CS0-002) Cyber Analyst course emphasize security concepts supporting organisational risk mitigation and the significance of frameworks, policies, procedures, and controls.
Learning outcome
- Understand the importance of threat data and intelligence
- Apply threat intelligence to improve organizational security
- Manage vulnerabilities in your organization's infrastructure
- Protect your organization from cloud-based threats
- Respond to security incidents effectively
Course media
Why should I take this course?
- It is a valuable credential that can help you advance your career in cybersecurity
- To cover the latest cybersecurity threats and technologies
- It is taught by experienced instructors who are experts in their field
- It provides you with the skills and knowledge you need to be a successful cybersecurity analyst
Career Path
- Cybersecurity analyst
- Security engineer
- Incident responder
- Forensics analyst
- Security consultant
Requirements
- CompTIA Network+ certification or equivalent experience
- Basic knowledge of cybersecurity concepts
Course Curriculum
-
Introduction
00:02:00
-
All about the Exam
00:08:00
-
What’s New on the CompTIA CySA+ Exam?
00:05:00
-
Meet the Instructors
00:02:00
-
Thinking like the Enemy
00:09:00
-
Tools of the Trade
00:08:00
-
Resource – CompTIA CySA+ (CS0-002) Exam Objectives
-
Intelligence Sources and Confidence Levels
00:08:00
-
Threat Indicators and Actors
00:08:00
-
Threat Trends
00:07:00
-
Intelligence Cycle and ISACs
00:06:00
-
Resource: Slides Handouts
-
Attack Frameworks
00:06:00
-
Threat Research
00:11:00
-
Threat Modeling and Intelligence Sharing
00:06:00
-
Resource: Slides Handouts
-
Vulnerability Identification
00:07:00
-
Scanning Parameters and Criteria
00:09:00
-
Scanning Special Considerations
00:06:00
-
Validation
00:03:00
-
Remediation and Mitigation
00:08:00
-
Inhibitors to Remediation
00:07:00
-
Resource: Slides Handouts
-
Web Applications Scanners, Part 1
00:10:00
-
Web Applications Scanners, Part 2
00:05:00
-
Scanning
00:06:00
-
Configuring and Executing Scans
00:08:00
-
Vulnerability Scanning
00:10:00
-
Reverse Engineering
00:08:00
-
Enumeration
00:06:00
-
Wireless Assessment Tools
00:08:00
-
Cloud Assessment Tools
00:04:00
-
Resource: Slides Handouts
-
Mobile and IoT
00:10:00
-
Embedded and Firmware Systems (RTOS, SoC, and FPGA)
00:09:00
-
Access and Vehicles Risk
00:08:00
-
Automation and Control Risk
00:10:00
-
Resource: Slides Handouts
-
Cloud Models
00:07:00
-
Remote Service Invocation (FaaS, IaC, API)
00:10:00
-
Cloud Vulnerabilities
00:06:00
-
Resource Handouts
-
Injection and Overflow Attacks
00:09:00
-
Authentication Attacks
00:07:00
-
Exploits
00:08:00
-
Application Vulnerabilities, Part 1
00:08:00
-
Application Vulnerabilities, Part 2
00:07:00
-
Resource Handouts
-
Network Architecture and Asset Management
00:09:00
-
Protecting Your Territory
00:05:00
-
Identity and Access Management
00:11:00
-
Encryption and Active Defense
00:08:00
-
Resource Handouts
-
Platforms
00:07:00
-
SOA and DevSecOps
00:09:00
-
Secure Software Development
00:08:00
-
Best Coding Practices
00:04:00
-
Resource Handouts
-
Trusted Hardware
00:10:00
-
Hardware Encryption
00:04:00
-
Hardware Security
00:08:00
-
Resource Handouts
-
Data Analytics
00:10:00
-
Endpoint Security
00:08:00
-
Recon Results, Part 1
00:13:00
-
Recon Results, Part 2
00:05:00
-
Impact Analysis
00:05:00
-
Collective Tools
00:09:00
-
Query Writing
00:07:00
-
E-mail Analysis, Part 1
00:10:00
-
E-mail Analysis, Part 2
00:08:00
-
Resource Handouts
-
Permissions
00:09:00
-
Firewalls
00:08:00
-
Intrusion Prevention Rules
00:05:00
-
DLP and Endpoint Detection
00:05:00
-
Frustration and attrition
00:13:00
-
Resource Handouts
-
Threat Hunting and the Hypothesis
00:06:00
-
Threat Hunting Process
00:07:00
-
Results and Benefits
00:05:00
-
Resource Handouts
-
Workflow and Scripting
00:07:00
-
API and Malware Signature Creation
00:08:00
-
Threat Feeds and Machine Learning
00:06:00
-
Protocols, Standards, and Software Engineering
00:05:00
-
Resource Handouts
-
IR Roles and Responsibilities
00:08:00
-
IR Active Preparation
00:10:00
-
Resource Handouts
-
Incident Response Process
00:07:00
-
Resource Handouts
-
Network Symptoms
00:04:00
-
Host Symptoms
00:08:00
-
Application Symptoms
00:04:00
-
Resource Handouts
-
Digital Forensics
00:10:00
-
Seizure and Acquisitions
00:05:00
-
Forensics Acquisition Tools
00:09:00
-
Mobile, Virtualization, and Cloud
00:06:00
-
Forensics Analysis, Part 1
00:04:00
-
Forensics Analysis, Part 2
00:08:00
-
Packet Capture
00:12:00
-
Resource Handouts
-
Data Privacy and Security
00:06:00
-
Nontechnical Controls
00:09:00
-
Technical Controls
00:08:00
-
Resource Handouts
-
Business Impact Analysis
00:05:00
-
Risk Identification
00:05:00
-
Risk Calculation and Communication
00:06:00
-
Training
00:04:00
-
Supply Chain Assessment
00:04:00
-
Resource Handouts
-
Frameworks
00:13:00
-
Policies and Procedures
00:05:00
-
Controls and Procedures
00:08:00
-
Verification
00:06:00
-
Resource Handouts
Offer Ends in

-
Duration:11 hours, 46 minutes
-
Access:1 Year
-
Units:119

