10Aug

CompTIA Cybersecurity Analyst (CySA+)

CompTIA Cybersecurity Analyst (CySA+) Training Details

Training: CompTIA Cybersecurity Analyst (CySA+)
Exam Code: CS0-002
Duration: 5 Days
Schedule: Oct 31 & Nov 1 – 4 of 2022 (Weekdays)
Time: 9 am – 5 pm
Fee: RM3,000 (including exam)
Venue: Allied View Centre, Old Klang Road, Kuala Lumpur

This is a subsidized course and is only limited to 25 pax. Kindly fill up our Google Form to pre-register or to enquire.

 

GOOGLE FORM

 

FLYER

 

OUTLINE

Introduction

CompTIA CySA+ is the only intermediate high-stakes cybersecurity analyst certification with both hands-on, performance-based questions and multiple-choice questions. CySA+ focuses on the candidates’ ability to not only proactively capture, monitor and respond to network traffic findings, but also emphasizes software and application security, automation, threat hunting and IT regulatory compliance, which affects the daily work of security analysts. CySA+ covers the most up-to-date core security analyst skills and upcoming job skills used by threat intelligence analysts, application security analysts, compliance analysts, incident responders/handlers and threat hunters, bringing new techniques for combating threats inside and outside of the Security Operations Center (SOC).

 

Target Audience

This course is designed primarily for cybersecurity practitioners who perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality and non-repudiation. This course focuses on the knowledge, ability and skills necessary to provide for the defence of those information systems in a cybersecurity context, including protection, detection, analysis, investigation and response processes. In addition, the course ensures that all members of an IT team, everyone from helpdesk staff to the Chief Information Officer to understand their roles in these security processes.

 

Prerequisites

Before attending this course, delegates must have achieved the following requirements:

  • At least two years (recommended) of experience in computer network security technology or a related field
  • The ability to recognize information security vulnerabilities and threats in the context of risk management
  • Foundation-level operational skills with some of the common operating systems for computing environments
  • Foundational knowledge of the concepts and operational framework of common assurance safeguards in computing environments. Safeguards include but are not limited to basic authentication and authorization, resource permissions and anti-malware mechanisms
  • Foundation-level understanding of some of the common concepts for network environments, such as routing and switching
  • Foundational knowledge of major TCP/IP networking protocols, including but not limited to TCP, IP, UDP, DNS, HTTP, ARP, ICMP and DHCP
  • Foundational knowledge of the concepts and operational framework of common assurance safeguards in network environments. Safeguards include, but are not limited to firewalls, intrusion prevention systems and VPNs

What Skills Will You Learn?

  • Threat and Vulnerability Management
  • Software and Systems Security
  • Compliance and Assessment
  • Security Operations and Monitoring
  • Incident Response

Jobs that use CompTIA CySA+

  • Security Analyst
  • Security Engineer
  • Incident Response or Handler
  • Threat Hunter
  • Threat Intelligence Analyst
  • Application Security Analyst
  • Compliance Analyst

Course Outline

  • Identify the Importance of Risk Management
  • Assess Risk
  • Mitigate Risk
  • Integrate Documentation into Risk Management
  • Classify Threats and Threat Profiles
  • Perform Ongoing Threat Research
  • Implement Threat Modeling
  • Assess the Impact of Reconnaissance Incidents
  • Assess the Impact of Social Engineering
  • Assess the Impact of System Hacking Attacks
  • Assess the Impact of Web-Based Attacks
  • Assess the Impact of Malware
  • Assess the Impact of Hijacking and Impersonation Attacks
  • Assess the Impact of DoS Incidents
  • Assess the Impact of Threats to Mobile Security
  • Assess the Impact of Threats to Cloud Security
  • Assess Command and Control Techniques
  • Assess Persistence Techniques
  • Assess Lateral Movement and Pivoting Techniques
  • Assess Data Exfiltration Techniques
  • Assess Anti-Forensics Techniques
  • Implement a Vulnerability Management Plan
  • Assess Common Vulnerabilities
  • Conduct Vulnerability Scans
  • Conduct Penetration Tests on Network Assets
  • Follow Up on Penetration Testing
  • Deploy a Security Intelligence Collection and Analysis Platform
  • Collect Data from Network-Based Intelligence Sources
  • Collect Data from Host-Based Intelligence Sources
  • Use Common Tools to Analyse Logs
  • Use SIEM Tools for Analysis
  • Parse Log Files with Regular Expressions
  • Analyse Incidents with Windows-Based Tools
  • Analyse Incidents with Linux-Based Tools
  • Analyse Malware
  • Analyse Indicators of Compromise
  • Deploy an Incident Handling and Response Architecture
  • Mitigate Incidents
  • Prepare for Forensic Investigation as a CSIRT
  • Apply Forensic Investigation Plan
  • Securely Collect and Analyse Electronic Evidence
  • Follow Up on the Results of an Investigation
  • Remedies Identity and Access Management Issues
  • Implement Security During the SDLC

Interested in our CompTIA Cybersecurity Analyst (CySA+) certification training? WhatsApp us or fill in form today!

    Please tick the boxes:
    Course OutlineTraining DatesFlyer

    Leave A Comment