YPPB - CompTIA Cybersecurity Analyst (CySA+)

Course Overview

The CompTIA Cybersecurity Analyst (CySA+) examination is the only intermediate high-stakes cybersecurity analyst certification with performance-based questions covering security analytics, intrusion detection and response. High-stakes exams are proctored at a Pearson VUE testing center in a highly secure environment. CySA+ is the most up-to-date security analyst certification that covers advanced persistent threats in a post-2014 cybersecurity environment. The behavioral analytics skills covered by the CompTIA CySA+ certification identify and combat malware and advanced persistent threats (APTs), resulting in better threat visibility across a broad attack surface by focusing on network behavior, including an organization’s interior network. The exam will certify that the successful candidate has the knowledge and skills required to:


  • Leverage intelligence and threat detection techniques
  • Analyze and interpret data
  • Identify and address vulnerabilities
  • Suggest preventative measures
  • Effectively respond to and recover from incidents

Training Type

Full Time


Who Should Attend

Security analysts, SOC analysts, engineers, administrators, IT professionals transitioning to cybersecurity, recent graduates, and anyone interested in cybersecurity


Course Duration

6 Days


Total Training Duration (Hour)

48 Hours


Course Outline

 

Module 1: Understanding Vulnerability Response, Handling, and Management

  • Understanding Cybersecurity Leadership Concepts

-         Explain concepts related to vulnerability response, handling, and management.

  • Exploring Control Types and Methods

-         Explain concepts related to vulnerability response, handling, and management.

  • Explaining Patch Management Concepts

-         Explain concepts related to vulnerability response, handling, and management.

 

Module 2: Exploring Threat Intelligence and Threat Hunting Concepts

  • Exploring Threat Actor Concepts

-         Compare and contrast threat intelligence and threat-hunting concepts

  • Identifying Active Threats

-         Compare and contrast threat intelligence and threat-hunting concepts.

  • Exploring Threat-Hunting Concepts

-         Compare and contrast threat intelligence and threat-hunting concepts

 

Module 3: Explaining Important System and Network Architecture Concepts

  • Reviewing System and Network Architecture Concepts

-         Explain them importance of system and network architecture concepts in security operations

  • Exploring Identity and Access Management (IAM)

-         Explain them importance of system and network architecture concepts in security operations

  • Maintaining Operational Visibility

-         Explain them importance of system and network architecture concepts in security operations

 

Module 4: Understanding Process Improvement in Security Operations

  • Exploring Leadership in Security Operations

-         Explain the importance of efficiency and process improvement in security operations

  • Understanding Technology for Security Operations

-         Explain the importance of efficiency and process improvement in security operations

 

Module 5: Implementing Vulnerability Scanning Methods

  • Explaining Compliance Requirements

-         Given a scenario, implement vulnerability scanning methods and concepts

  • Understanding Vulnerability Scanning Methods

-         Given a scenario, implement vulnerability scanning methods and concepts

  • Exploring Special Considerations in Vulnerability Scanning

-         Given a scenario, implement vulnerability scanning methods and concepts

 

Module 6: Performing Vulnerability Analysis

  • Understanding Vulnerability Scoring Concepts

-         Given a scenario, analyze data to prioritize vulnerabilities

  • Exploring Vulnerability Context Considerations

-         Given a scenario, analyze data to prioritize vulnerabilities

 

 

 

Module 7: Communicating Vulnerability Information

  • Explaining Effective Communication Concepts

-         Explain the importance of vulnerability management reporting and communication.

  • Understanding Vulnerability Reporting Outcomes and Action Plans

-         Explain concepts related to vulnerability response, handling, and management.

-         Explain the importance of vulnerability management reporting and communication.

 

Module 8: Explaining Incident Response Activities

  • Exploring Incident Response Planning

-         Given a scenario, perform incident response activities.

-         Explain the preparation and post incident activity phases of the incident management life cycle.

-         Explain the importance of incident response reporting and communication.

  • Performing Incident Response Activities

-         Given a scenario, perform incident response activities.

 

Module 9: Demonstrating Incident Response Communication

  • Understanding Incident Response Communication

-         Explain the importance of incident response reporting and communication

  • Analyzing Incident Response Activities

-         Given a scenario, perform incident response activities.

-         Explain the importance of incident response reporting and communication

 

Module 10: Applying Tools to Identify Malicious Activity

  • Identifying Malicious Activity

-         Given a scenario, use appropriate tools or techniques to determine malicious activity

  • Explaining Attack Methodology Frameworks

-         Explain concepts related to attack methodology frameworks.

  • Explaining Techniques for Identifying Malicious Activity

-         Given a scenario, use appropriate tools or techniques to determine malicious activity

 

Module 11: Analyzing Potentially Malicious Activity

  • Exploring Network Attack Indicators

-         Given a scenario, analyze indicators of potentially malicious activity.

  • Exploring Host Attack Indicators

-         Given a scenario, analyze indicators of potentially malicious activity

  • Exploring Vulnerability Assessment Tools

-         Given a scenario, analyze indicators of potentially malicious activity.

-         Given a scenario, analyze output from vulnerability assessment tools.

 

Module 12: Understanding Application Vulnerability Assessment

  • Analyzing Web Vulnerabilities

-         Given a scenario, analyze output from vulnerability assessment tools.

  • Analyzing Cloud Vulnerabilities

-         Given a scenario, analyze output from vulnerability assessment tools.

 

Module 13: Exploring Scripting Tools and Analysis Concepts

  • Understanding Scripting Languages

-         Given a scenario, analyze indicators of potentially malicious activity.

-         Given a scenario, use appropriate tools or techniques to determine malicious activity.

  • Identifying Malicious Activity Through Analysis

-         Given a scenario, analyze indicators of potentially malicious activity.

-         Given a scenario, use appropriate tools or techniques to determine malicious activity

 

Module 14: Understanding Application Security and Attack Mitigation Best Practices

  • Exploring Secure Software Development Practices

-         Explain concepts related to vulnerability response, handling, and management.

-         Explain concepts related to attack methodology frameworks

  • Recommending Controls to Mitigate Successful Application Attacks

-         Given a scenario, recommend controls to mitigate attacks and software vulnerabilities.

-         Explain concepts related to vulnerability response, handling, and management.


Certification Obtained and Conferred by

CompTIA


Course Objectives

Course Overview:

CompTIA Cybersecurity Analyst (CySA+) is a certification for cyber professionals tasked with incident detection, prevention and response through continuous security monitoring.


  • Assess information security risk in computing and network environments.
  • Analyze reconnaissance threats to computing and network environments.
  • Analyze attacks on computing and network environments.
  • Analyze post-attack techniques on computing and network environments.
  • Implement a vulnerability management program.
  • Collect cybersecurity intelligence.
  • Analyze data collected from security and event logs.
  • Perform active analysis on assets and networks.
  • Respond to cybersecurity incidents.
  • Investigate cybersecurity incidents.

 


Pre-requisites

To get the most out of the CompTIA CySA+ Study Guide and be able to prepare for your exam you should have successfully earned the CompTIA Network+ certification and CompTIA Security+ certification or have equivalent knowledge. Specifically, it is recommended that you have the following skills and knowledge before starting this course:


  • Know basic network terminology and functions (such as OSI Model, Topology,Ethernet, Wi-Fi, switches, routers).
  • Understand TCP/IP addressing, core protocols, and troubleshooting tools
  • Identify network attack strategies and defenses.
  • Know the technologies and uses of cryptographic standards and products
  • Identify network-and host-based security technologies and practices.
  • Describe the standards and products used to enforce security on web and communications technologies.

Price
Course Fee Payable
Original Fee Before SST With SST (8%)
Course Fee RM4,984.54 RM5,383.30
Individual Pricing (Fee payable to Training Provider) Before SST With SST (8%)
YPPB ALTI RM0.00 RM0.00

Please note that prices are subjected to change.
Back to Catalogue →
Next Available Schedules
Available Seats:
Course Name:
Category:
Delivered By:
Trainer:
Venue:
Language:
Session Dates:

Registration Date:
From To
Keyword Tags
YPPB