The CompTIA Cybersecurity Analyst (CySA+) examination is the only intermediate high-stakes cybersecurity analyst certification with performance-based questions covering security analytics, intrusion detection and response. High-stakes exams are proctored at a Pearson VUE testing center in a highly secure environment. CySA+ is the most up-to-date security analyst certification that covers advanced persistent threats in a post-2014 cybersecurity environment. The behavioral analytics skills covered by the CompTIA CySA+ certification identify and combat malware and advanced persistent threats (APTs), resulting in better threat visibility across a broad attack surface by focusing on network behavior, including an organization’s interior network. The exam will certify that the successful candidate has the knowledge and skills required to:
Full Time
Security analysts, SOC analysts, engineers, administrators, IT professionals transitioning to cybersecurity, recent graduates, and anyone interested in cybersecurity
6 Days
48 Hours
- Explain concepts related to vulnerability response, handling, and management.
- Explain concepts related to vulnerability response, handling, and management.
- Explain concepts related to vulnerability response, handling, and management.
- Compare and contrast threat intelligence and threat-hunting concepts
- Compare and contrast threat intelligence and threat-hunting concepts.
- Compare and contrast threat intelligence and threat-hunting concepts
- Explain them importance of system and network architecture concepts in security operations
- Explain them importance of system and network architecture concepts in security operations
- Explain them importance of system and network architecture concepts in security operations
- Explain the importance of efficiency and process improvement in security operations
- Explain the importance of efficiency and process improvement in security operations
Module 5: Implementing Vulnerability Scanning Methods
- Given a scenario, implement vulnerability scanning methods and concepts
- Given a scenario, implement vulnerability scanning methods and concepts
- Given a scenario, implement vulnerability scanning methods and concepts
Module 6: Performing Vulnerability Analysis
- Given a scenario, analyze data to prioritize vulnerabilities
- Given a scenario, analyze data to prioritize vulnerabilities
Module 7: Communicating Vulnerability Information
- Explain the importance of vulnerability management reporting and communication.
- Explain concepts related to vulnerability response, handling, and management.
- Explain the importance of vulnerability management reporting and communication.
Module 8: Explaining Incident Response Activities
- Given a scenario, perform incident response activities.
- Explain the preparation and post incident activity phases of the incident management life cycle.
- Explain the importance of incident response reporting and communication.
- Given a scenario, perform incident response activities.
Module 9: Demonstrating Incident Response Communication
- Explain the importance of incident response reporting and communication
- Given a scenario, perform incident response activities.
- Explain the importance of incident response reporting and communication
Module 10: Applying Tools to Identify Malicious Activity
- Given a scenario, use appropriate tools or techniques to determine malicious activity
- Explain concepts related to attack methodology frameworks.
- Given a scenario, use appropriate tools or techniques to determine malicious activity
Module 11: Analyzing Potentially Malicious Activity
- Given a scenario, analyze indicators of potentially malicious activity.
- Given a scenario, analyze indicators of potentially malicious activity
- Given a scenario, analyze indicators of potentially malicious activity.
- Given a scenario, analyze output from vulnerability assessment tools.
Module 12: Understanding Application Vulnerability Assessment
- Given a scenario, analyze output from vulnerability assessment tools.
- Given a scenario, analyze output from vulnerability assessment tools.
Module 13: Exploring Scripting Tools and Analysis Concepts
- Given a scenario, analyze indicators of potentially malicious activity.
- Given a scenario, use appropriate tools or techniques to determine malicious activity.
- Given a scenario, analyze indicators of potentially malicious activity.
- Given a scenario, use appropriate tools or techniques to determine malicious activity
Module 14: Understanding Application Security and Attack Mitigation Best Practices
- Explain concepts related to vulnerability response, handling, and management.
- Explain concepts related to attack methodology frameworks
- Given a scenario, recommend controls to mitigate attacks and software vulnerabilities.
- Explain concepts related to vulnerability response, handling, and management.
CompTIA
To get the most out of the CompTIA CySA+ Study Guide and be able to prepare for your exam you should have successfully earned the CompTIA Network+ certification and CompTIA Security+ certification or have equivalent knowledge. Specifically, it is recommended that you have the following skills and knowledge before starting this course:
Course Fee Payable | ||
---|---|---|
Original Fee | Before SST | With SST (8%) |
Course Fee | RM4,984.54 | RM5,383.30 |
Individual Pricing (Fee payable to Training Provider) | Before SST | With SST (8%) |
YPPB ALTI | RM0.00 | RM0.00 |