Instructor

CompTIA CySA+ Training Course | Boost Your Cybersecurity Skills

Curriculum

Advance your cybersecurity career with CompTIA CySA+ Training. Gain hands-on skills in threat detection, risk management & incident response. Enroll now!

Ratings

( 4.5 Ratings )

Live Online Classes starting on 01 January, 1970

CompTIA CySA+

The CompTIA Cybersecurity Analyst (CySA+) course is an in-depth training program tailored to develop advanced cybersecurity skills. It covers five critical modules, including threat management, vulnerability management, incident response, and security architecture. Learners will gain expertise in analyzing and responding to cybersecurity threats, managing vulnerabilities, and implementing security solutions. The course emphasizes the use of security frameworks, risk evaluation, and penetration testing, along with practical tools like SIEM for data analysis.

Participants will learn to identify and mitigate system weaknesses, classify threats, prioritize incidents, and apply forensics tools during cyber incident responses. The security architecture module prepares learners to design secure networks, manage identities, and understand security frameworks and policies. This course is ideal for those aiming to enhance their cybersecurity expertise and pursue roles that demand a deep understanding of defending organizations from cyber threats.

 

Course Prerequisites

To maximize the benefits of the CompTIA Cybersecurity Analyst (CySA+) course, it is recommended that participants have:

  • A basic understanding of networks and computing concepts, similar to knowledge from CompTIA Network+ and/or Security+ certifications.

  • Familiarity with operating systems like Windows, Unix/Linux, and macOS, including their command line interfaces.

  • Knowledge of fundamental cybersecurity concepts, including common threats, vulnerabilities, and defense mechanisms.

  • Awareness of cybersecurity’s role in business and the impact of cyber threats on organizations.

  • Experience with common security technologies and tools such as firewalls, intrusion detection systems, and antivirus software.

  • Understanding of risk management basics, including threat assessment and vulnerability analysis.

  • Critical thinking, problem-solving skills, and an analytical mindset for addressing security challenges.

While these prerequisites are not mandatory, they are highly recommended to ensure a successful learning experience.

 

Target Audience

The CompTIA Cybersecurity Analyst (CySA+) course is designed for:

  • Cybersecurity Analysts

  • IT Security Specialists

  • Security Engineers

  • Network Administrators

  • System Administrators

  • Threat Intelligence Analysts

  • Security Operations Center (SOC) Staff

  • Incident Responders

  • Compliance Analysts

  • Vulnerability Analysts

  • Information Security Officers

  • IT Auditors

  • Penetration Testers

  • IT Professionals interested in cybersecurity threats and defenses

  • Military and government personnel seeking cybersecurity credentials

  • Cybersecurity Consultants

  • Risk Managers

  • Technical Support Engineers

  • Application Security Professionals

 

Course Outline:

Module 1 – Threat Management 1

  • Cybersecurity Analysts

    • Cybersecurity Roles and Responsibilities

    • Frameworks and Security Controls

    • Risk Evaluation

    • Penetration Testing Processes

  • Reconnaissance Techniques

    • The Kill Chain

    • Open Source Intelligence

    • Social Engineering

    • Topology Discovery

    • Service Discovery

    • OS Fingerprinting

Module 2 – Threat Management 2

  • Security Appliances

    • Configuring Firewalls

    • Intrusion Detection and Prevention

    • Configuring IDS

    • Malware Threats

    • Configuring Anti-virus Software

    • Sysinternals

    • Enhanced Mitigation Experience Toolkit

  • Logging and Analysis

    • Packet Capture

    • Packet Capture Tools

    • Monitoring Tools

    • Log Review and SIEM

    • SIEM Data Outputs

    • SIEM Data Analysis

    • Point-in-Time Data Analysis

Module 3 – Vulnerability Management

  • Managing Vulnerabilities

    • Vulnerability Management Requirements

    • Asset Inventory

    • Data Classification

    • Vulnerability Management Processes

    • Vulnerability Scanners

    • Microsoft Baseline Security Analyzer

    • Vulnerability Feeds and SCAP

    • Configuring Vulnerability Scans

    • Vulnerability Scanning Criteria

    • Exploit Frameworks

  • Remediating Vulnerabilities

    • Analyzing Vulnerability Scans

    • Remediation and Change Control

    • Remediating Host Vulnerabilities

    • Remediating Network Vulnerabilities

    • Remediating Virtual Infrastructure Vulnerabilities

  • Secure Software Development

    • Software Development Lifecycle

    • Software Vulnerabilities

    • Software Security Testing

    • Interception Proxies

    • Web Application Firewalls

    • Source Authenticity

    • Reverse Engineering

Module 4 – Cyber Incident Response

  • Incident Response

    • Incident Response Processes

    • Threat Classification

    • Incident Severity and Prioritization

    • Types of Data

  • Forensics Tools

    • Digital Forensics Investigations

    • Documentation and Forms

    • Digital Forensics Crime Scene

    • Digital Forensics Kits

    • Image Acquisition

    • Password Cracking

    • Analysis Utilities

  • Incident Analysis and Recovery

    • Analysis and Recovery Frameworks

    • Analyzing Network Symptoms

    • Analyzing Host Symptoms

    • Analyzing Data Exfiltration

    • Analyzing Application Symptoms

    • Using Sysinternals

    • Containment Techniques

    • Eradication Techniques

    • Validation Techniques

    • Corrective Actions

Module 5 – Security Architecture

  • Secure Network Design

    • Network Segmentation

    • Blackholes, Sinkholes, and Honeypots

    • System Hardening

    • Group Policies and MAC

    • Endpoint Security

  • Managing Identities and Access

    • Network Access Control

    • Identity Management

    • Identity Security Issues

    • Identity Repositories

    • Context-based Authentication

    • Single Sign-On and Federations

    • Exploiting Identities

    • Exploiting Web Browsers and Applications

  • Security Frameworks and Policies

    • Frameworks and Compliance

    • Reviewing Security Architecture

    • Procedures and Compensating Controls

    • Verifications and Quality Control

    • Security Policies and Procedures

    • Personnel Policies and Training

(4.5 Ratings)

Download Course Contents

Still unsure?
We're just a click away


Course Outline PDF

SpireTec Unique Features

course-img
1-On-1 Training

Benefit from our 1-On-1 Training for personalized, focused, and effective learning experiences.

course-img
Customized Training

Experience our Customized Training service tailored to meet your specific learning needs and goals

course-img
4 - Hours / Weekend Session

Join our Class featuring 4 - Hours / Weekend Session for in-depth learning and expert training.

course-img
Free Demo Class

Join our Free Demo Class to experience top-notch training and expert guidance first hand!

Purchase This Course

Request More Information

CERTIFICATE

Get Ahead With SpireTec Solutions
Training Certificate

Earn your Certificate

Our course is exhaustive and this certificate is proof that you have taken a big leap in mastering the domain.

Differentiate yourself with Masters Certificate

Our course is exhaustive and this certificate is proof that you have taken a big leap in mastering the domain.

Share your achievement

Our course is exhaustive and this certificate is proof that you have taken a big leap in mastering the domain.

Need Customized Curriculum?

Our course is exhaustive and this certificate is proof that you have taken a big leap in mastering the domain.

Talk To Adviser
course-certificate

Top Certifications