CompTIA Cybersecurity Analyst (CompTIA CYSA+)

DATE

Duration

LOCATION

FEES

Book Now

21 Jan
- 25 Jan 2024

5 Days

Dubai

$4,200

21 Jul
- 25 Jul 2024

5 Days

Dubai

$4,200

28 Apr
- 2 May 2024

5 Days

Virtual Online

$2,000

13 Oct
- 17 Oct 2024

5 Days

Virtual Online

$2,000

Are you looking to get into the exciting world of hackers, cybersecurity, threat hunting, and digital forensics? Do you find the idea of gathering and analyzing intelligence to detect and combat hackers intriguing? Then this is the course for you!

This course is aimed at the aspirational junior analyst looking to step up in their career. However, if your tech skills don’t include cybersecurity, you can also gain a great deal of knowledge from this course to help launch yourself towards a career in cybersecurity.

This course covers everything you need to know to respond to cybersecurity threats and attacks. You’ll learn how to:

  • Leverage intelligence and threat detection techniques
  • Analyze and interpret data
  • Identify and address vulnerabilities
  • Suggest preventative measures
  • Effectively respond to and recover from incidents
  • Analyze the results of network reconnaissance, and recommend or implement countermeasures
  • Secure a corporate environment

By the end of the course, you‘ll be able to:

  • Threat data and intelligence
  • Vulnerability management with mobile, IoT, the cloud, and more
  • Security solutions for your network and in the cloud
  • Identity and access management (IAM)
  • Software and hardware best practices
  • Analyzing data using heuristics, trend analysis, and log review
  • Implementing intrusion prevention systems (IPS) and intrusion detection systems (IDS)
  • Threat hunting
  • Automation concepts like workflow orchestration, machine learning, scripting, API integration, and SCAP
  • Incident response process
  • Digital forensics
  • Controls, policies, frameworks, and procedures to protect data and secure networks
  • Business impact analysis and organizational risk mitigation

This course is made for :

  • anyone who is interested in a Cybersecurity position or looking to improve their security skills. The course will prepare you to pass the CompTIA CySA+ Certification Exam. It goes beyond certification and gives you the skills you need to be a better cybersecurity analyst.
  • Security analyst

  • Tier II SOC analyst
  • Security monitoring
  • Security engineer
  • Threat hunter
  • Incident response or handler
  • Threat intelligence analyst
  • Application security analyst
  • Compliance analyst

Day One
THREAT AND VULNERABILITY MANAGEMENT

  • Explain the importance of threat data and intelligence.
  • Given a scenario, utilize threat intelligence to support organizational security.
  • Given a scenario, perform vulnerability management activities
  • Given a scenario, analyze the output from common vulnerability assessment tools.
  • Explain the threats and vulnerabilities associated with specialized technology.
  • Explain the threats and vulnerabilities associated with operating in the cloud.
  • Given a scenario, implement controls to mitigate attacks and software vulnerabilities.

Day Two
SOFTWARE AND SYSTEMS SECURITY

  • Given a scenario, apply security solutions for infrastructure management.
  • Explain software assurance best practices.
  • Explain hardware assurance best practices.

Day Three
SECURITY OPERATIONS AND MONITORING

  • Given a scenario, analyze data as part of security monitoring activities.
  • Given a scenario, implement configuration changes to existing controls to improve security.
  • Explain the importance of proactive threat hunting.
  • Compare and contrast automation concepts and technologies.

Day Four
INCIDENT RESPONSE

  • Explain the importance of the incident response process.
  • Given a scenario, apply the appropriate incident response procedure.
  • Given an incident, analyze potential indicators of compromise.
  • Given a scenario, utilize basic digital forensics techniques

Day Five

COMPLIANCE AND ASSESSMENT

  • Understand the importance of data privacy and protection.
  • Given a scenario, apply security concepts in support of organizational risk mitigation.
  • Explain the importance of frameworks, policies, procedures, and controls.
Training Subject
Training Location