Alternate Text

Course Outline

CompTIA Cybersecurity Analyst (CySA+)

Course Code

CT01-CySA+

Description

-

Period

29 Aug-2 Sep

Duration

5

Price

48,000 Baht

Class

Online

Language

Thai

CORSE OVERVIEW:

This course is for students who are preparing for the CompTIA CySA+ certification exam CS0-002. This course has been created for cybersecurity practitioners who perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This course focuses on the knowledge, ability, and skills necessary to defend those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. In addition, the course ensures that all members of an IT team—everyone from help desk staff to the Chief Information Officer—understand their role in these security processes.

 

COURSE DURATION:

5 Days

 

AUDIENCE PROFILE:

The Official CompTIA Cybersecurity Analyst (CySA+) Study Guide (CS0-002) has been developed by CompTIA for the CompTIA certification candidate. Rigorously evaluated by third party subject matter experts to validate adequate coverage of the Cybersecurity Analyst (CySA+) exam objectives, the Official CompTIA Cybersecurity Analyst (CySA+) Study Guide teaches the essential skills and information required for the CompTIA certification exam (CS0-002).

 

PREREQUISITES:

CompTIA CySA+ certification is aimed at IT professionals with (or seeking) job roles such as IT Security Analyst, Security Operations Center (SOC) Analyst, Vulnerability Analyst, Cybersecurity Specialist, Threat Intelligence Analyst, and Security Engineer. Ideally, you should have successfully completed:

CompTIA Network+ Certification AND Security+ Certification courses or have equivalent knowledge before attending this training. Specifically, it is recommended that you have the following skills and knowledge before starting this course:

  • Know basic network terminology and functions (such as OSI Model, Topology, Ethernet, Wi-Fi, switches, routers).
  • Understand TCP/IP addressing, core protocols, and troubleshooting tools.
  • Identify network attack strategies and defenses.
  • Know the technologies and uses of cryptographic standards and products.
  • Identify network- and host-based security technologies and practices.
  • Describe the standards and products used to enforce security on web and communications technologies.

 

COURSE OBJECTIVES:

After completing the CompTIA CySA+ course, delegates will have the skills and knowledge to:

  • Assess information security risk in computing and network environments
  • Analyst the cybersecurity threat landscape
  • Analyst reconnaissance threats to computing and network environments
  • Analyst attacks on computing and network environments
  • Analyst post-attack techniques on computing and network environments
  • Implement a vulnerability management program
  • Evaluate the organization’s security through penetration testing
  • Collect cybersecurity intelligence
  • Analyst data collected from security and event logs
  • Perform active analysis on assets and networks
  • Investigate & respond to cybersecurity incidents
  • Address security issues with the organization’s technology architecture

 

COURSE OUTLINE:

Module 1: Explaining the Importance of Security Controls and Security Intelligence

  • Identify Security Control Types
  • Explain the Importance of Threat Data and Intelligence

 

Module 2: Utilizing Threat Data and Intelligence

  • Classify Threats and Threat Actor Types
  • Utilize Attack Frameworks and Indicator Management
  • Utilize Threat Modeling and Hunting Methodologies

 

Module 3: Analyzing Security Monitoring Data

  • Analyze Network Monitoring Output
  • Analyze Appliance Monitoring Output
  • Analyze Endpoint Monitoring Output
  • Analyze Email Monitoring Output

 

Module 4: Collecting and Querying Security Monitoring Data

  • Configure Log Review and SIEM Tools
  • Analyze and Query Logs and SIEM Data

 

Module 5: Utilizing Digital Forensics and Indicator Analysis Techniques

  • Identify Digital Forensics Techniques
  • Analyze Network-related IOCS
  • Analyze Host-related IOCs
  • Analyze Application-related IOCs
  • Analyze Lateral Movement and Pivot IOCs

 

Module 6: Applying Incident Response Procedures

  • Explain Incident Response Processes
  • Apply Detection and Containment Processes
  • Apply Eradication, Recovery, and Post-incident Processes

Module 7: Applying Risk Mitigation and Security frameworks

  • Apply Risk Identification, Calculation, and Prioritization Processes
  • Explain Frameworks, Policies, and Procedures

 

Module 8: Performing Vulnerability Management

  • Analyze Output from Enumeration Tools
  • Configure Infrastructure Vulnerability Scanning Parameters
  • Analyze Output from Infrastructure Vulnerability Scanners
  • Mitigate Vulnerability Issues

 

Module 9: Applying Security Solutions for Infrastructure Management

  • Apply Identity and Access Management Security Solutions
  • Apply Network Architecture and Segmentation Security Solutions
  • Explain Hardware Assurance Best Practices
  • Explain Vulnerabilities Associated with Specialized Technology

 

Module 10: Understanding Data Privacy and Protection

  • Identify Non-technical Data and Privacy Controls
  • Identify Technical Data and Privacy Controls

 

Module 11: Applying Security Solutions for Software Assurance

  • Mitigate Software Vulnerabilities and Attacks
  • Mitigate Web Application Vulnerabilities and Attacks
  • Analyze Output from Application Assessments

 

Module 12: Applying Security Solutions for Cloud and Automation

  • Identify Cloud Service and Deployment Model Vulnerabilities
  • Explain Service-oriented Architecture
  • Analyze Output from Cloud Infrastructure Assessment Tools
  • Compare Automation Concepts and Technologies

PLEASE COME AND JOIN US.

Are you interested this course?

Let’s join with us to improve your skill

Alternate TextJOIN THIS CLASS
Alternate Text