Alternate Text

Course Outline

CompTIA Cybersecurity Analyst (CySA+) Intensive Tutoring

Course Code





call us




39,000 Baht






This course is for students who are preparing for the CompTIA CySA+ certification exam CS0-002. This course has been created for cybersecurity practitioners who perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This course focuses on the knowledge, ability, and skills necessary to defend those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. In addition, the course ensures that all members of an IT team—everyone from help desk staff to the Chief Information Officer—understand their role in these security processes.



3 Days



The Official CompTIA Cybersecurity Analyst (CySA+) Study Guide (CS0-002) has been developed by CompTIA for the CompTIA certification candidate. Rigorously evaluated by third party subject matter experts to validate adequate coverage of the Cybersecurity Analyst (CySA+) exam objectives, the Official CompTIA Cybersecurity Analyst (CySA+) Study Guide teaches the essential skills and information required for the CompTIA certification exam (CS0-002).



CompTIA CySA+ certification is aimed at IT professionals with (or seeking) job roles such as IT Security Analyst, Security Operations Center (SOC) Analyst, Vulnerability Analyst, Cybersecurity Specialist, Threat Intelligence Analyst, and Security Engineer. Ideally, you should have successfully completed:

CompTIA Network+ Certification AND Security+ Certification courses or have equivalent knowledge before attending this training. Specifically, it is recommended that you have the following skills and knowledge before starting this course:

  • Know basic network terminology and functions (such as OSI Model, Topology, Ethernet, Wi-Fi, switches, routers).
  • Understand TCP/IP addressing, core protocols, and troubleshooting tools.
  • Identify network attack strategies and defenses.
  • Know the technologies and uses of cryptographic standards and products.
  • Identify network- and host-based security technologies and practices.
  • Describe the standards and products used to enforce security on web and communications technologies.



After completing the CompTIA CySA+ course, delegates will have the skills and knowledge to:

  • Assess information security risk in computing and network environments
  • Analyst the cybersecurity threat landscape
  • Analyst reconnaissance threats to computing and network environments
  • Analyst attacks on computing and network environments
  • Analyst post-attack techniques on computing and network environments
  • Implement a vulnerability management program
  • Evaluate the organization’s security through penetration testing
  • Collect cybersecurity intelligence
  • Analyst data collected from security and event logs
  • Perform active analysis on assets and networks
  • Investigate & respond to cybersecurity incidents
  • Address security issues with the organization’s technology architecture



Module 1: Explaining the Importance of Security Controls and Security Intelligence

  • Identify Security Control Types
  • Explain the Importance of Threat Data and Intelligence


Module 2: Utilizing Threat Data and Intelligence

  • Classify Threats and Threat Actor Types
  • Utilize Attack Frameworks and Indicator Management
  • Utilize Threat Modeling and Hunting Methodologies


Module 3: Analyzing Security Monitoring Data

  • Analyze Network Monitoring Output
  • Analyze Appliance Monitoring Output
  • Analyze Endpoint Monitoring Output
  • Analyze Email Monitoring Output


Module 4: Collecting and Querying Security Monitoring Data

  • Configure Log Review and SIEM Tools
  • Analyze and Query Logs and SIEM Data


Module 5: Applying Risk Mitigation and Security frameworks

  • Apply Risk Identification, Calculation, and Prioritization Processes
  • Explain Frameworks, Policies, and Procedures


Module 6: Performing Vulnerability Management

  • Analyze Output from Enumeration Tools
  • Configure Infrastructure Vulnerability Scanning Parameters
  • Analyze Output from Infrastructure Vulnerability Scanners
  • Mitigate Vulnerability Issues


Module 7: Applying Security Solutions for Infrastructure Management

  • Apply Identity and Access Management Security Solutions
  • Apply Network Architecture and Segmentation Security Solutions
  • Explain Hardware Assurance Best Practices
  • Explain Vulnerabilities Associated with Specialized Technology


Module 8: Understanding Data Privacy and Protection

  • Identify Non-technical Data and Privacy Controls
  • Identify Technical Data and Privacy Controls


Module 9: Applying Security Solutions for Cloud and Automation

  • Identify Cloud Service and Deployment Model Vulnerabilities
  • Explain Service-oriented Architecture
  • Analyze Output from Cloud Infrastructure Assessment Tools
  • Compare Automation Concepts and Technologies


Are you interested this course?

Let’s join with us to improve your skill

Alternate Text