CompTIA CySA+Cybersecutiy Analyst
-
COURSE DATES AND LOCATIONS
DATE
Duration
LOCATION
FEES
Book Now
-
INTRODUCTION
This course contains everything you need to get ready for your CySA+ certification exam. This course covers everything you need to know to respond to cybersecurity threats and attacks. You will have the knowledge and skills required to assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; monitor and secure hybrid environments.
Explore training developed by CompTIA and choose an option that fits your learning style.
-
COURSE OBJECTIVES
By the end of the course, you‘ll be able to:
- Leverage intelligence and threat detection techniques
- Threat hunting
- Analyze and interpret data
- Data analysis to combat cyber attacks
- Identify and address vulnerabilities
- Digital forensics
- Securing your network to protect critical data
- Business impact analysis and risk mitigation
- Vulnerability management with networks, IoT, mobile, cloud, and more
- Identity and access management (IAM)
-
COURSE AUDIENCE
This course is made for:
- Security Analyst
- Tier II SOC Analyst
- Security Monitoring
- Security Engineer
- Threat Hunter
- Incident Response or Handler
- Threat Intelligence Analyst
- Application Security Analyst
- Compliance Analyst
- Anyone who is interested in a Cybersecurity position or looking to improve their security skills
-
COURSE OUTLINE
Day One:
• Introduction
• The Importance of Threat Data and Intelligence
• Threat Intelligence in Support of Organizational Security
• Vulnerability Assessment Tools
• Threats and Vulnerabilities Associated with Specialized Technology
Day Two:
• Threats and Vulnerabilities Associated with Specialized Technology
• Threats and Vulnerabilities Associated with Operating in the Cloud
• Mitigating Controls for Attacks and Software Vulnerabilities
• Security Solutions for Infrastructure Management
• Software Assurance Best Practices
Day Three:
• Hardware Assurance Best Practices
• Data Analysis in Security Monitoring Activities
• Implement Configuration Changes to Existing Controls to Improve Security
• The Importance of Proactive Threat Hunting
• Compare and Contrast Automation Concepts and Technologies
Day Four:
• The Importance of the Incident Response Process
• Appropriate Incident Response Procedures
• Analyze Potential Indicators of Compromise
• Utilize Basic Digital Forensics Techniques
• The Importance of Data Privacy and Protection
Day Five:
• Security Concepts in Support of Organizational Risk Mitigation
• The Importance of Frameworks, Policies, Procedures, and Controls