CompTIA Cybersecurity Analyst (CySA+)
Virtual Instructor Led Course delivered online
Churchill Square Training and Development
Summary
- Tutor is available to students
Add to basket or enquire
Overview
Introduction:
The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization’s security, collect and analyze cybersecurity intelligence, and handle incidents as they occur.
Objectives:
In this course, you will assess and respond to security threats and operate a systems and network security analysis platform.
You will:
– Assess information security risk in computing and network environments.
– Analyze reconnaissance threats to computing and network environments.
– Analyze attacks on computing and network environments.
– Analyze post-attack techniques on computing and network environments.
– Implement a vulnerability management program.
– Collect cybersecurity intelligence.
– Analyze data collected from security and event logs.
– Perform active analysis on assets and networks.
– Respond to cybersecurity incidents.
– Investigate cybersecurity incidents.
– Address security issues with the organization’s technology architecture.
Resources
- CompTIA Cybersecurity Analyst (CySA+) - download
Description
Course Outline:
1 – ASSESSING INFORMATION SECURITY RISK
- Identify the Importance of Risk Management
- Assess Risk
- Mitigate Risk
- Integrate Documentation into Risk Management
- Assess the Impact of Reconnaissance Incidents
- Assess the Impact of Social Engineering
- Assess the Impact of System Hacking Attacks
- Assess the Impact of Web-Based Attacks
- Assess the Impact of Malware
- Assess the Impact of Hijacking and Impersonation Attacks
- Assess the Impact of DoS Incidents
- Assess the Impact of Threats to Mobile Security
- Assess the Impact of Threats to Cloud Security
- Assess Command and Control Techniques
- Assess Persistence Techniques
- Assess Lateral Movement and Pivoting Techniques
- Assess Data Exfiltration Techniques
- Assess Anti-Forensics Techniques
- Implement a Vulnerability Management Plan
- Assess Common Vulnerabilities
- Conduct Vulnerability Scans
- Conduct Penetration Tests on Network Assets
- Deploy a Security Intelligence Collection and Analysis Platform
- Collect Data from Network-Based Intelligence Sources
- Collect Data from Host-Based Intelligence Sources
- Use Common Tools to Analyze Logs
- Use SIEM Tools for Analysis
- Analyze Incidents with Windows-Based Tools
- Analyze Incidents with Linux-Based Tools
- Analyze Malware
- Analyze Indicators of Compromise
- Deploy an Incident Handling and Response Architecture
- Mitigate Incidents
- Prepare for Forensic Investigation as a CSIRT
- Apply a Forensic Investigation Plan
- Securely Collect and Analyze Electronic Evidence
- Follow Up on the Results of an Investigation
- Remediate Identity and Access Management Issues
- Implement Security During the SDLC
Questions and answers
Currently there are no Q&As for this course. Be the first to ask a question.
Reviews
Currently there are no reviews for this course. Be the first to leave a review.
Legal information
This course is advertised on reed.co.uk by the Course Provider, whose terms and conditions apply. Purchases are made directly from the Course Provider, and as such, content and materials are supplied by the Course Provider directly. Reed is acting as agent and not reseller in relation to this course. Reed's only responsibility is to facilitate your payment for the course. It is your responsibility to review and agree to the Course Provider's terms and conditions and satisfy yourself as to the suitability of the course you intend to purchase. Reed will not have any responsibility for the content of the course and/or associated materials.