Add to basket or enquire
With cyber criminals constantly learning new techniques to bypass traditional security measures such as firewalls, the need for professionals who can counter these threats is becoming ever more vital in everyday business.
The CompTIA Cybersecurity Analyst course aims to provide those with a passion for cybersecurity with the ability to protect their organisations’ information systems and networks at every level. Students will be introduced to the tools and techniques needed to manage cybersecurity risks, identify various threats, evaluate the security of the organisation’s systems and collect and analyse intelligence.
What you will learn:
- Assess information security risk in computing and network environments
- Analyse the cybersecurity threat landscape
- Analyse reconnaissance threats to computing and network environments
- Analyse attacks on computing and network environments
- Analyse post-attack techniques on computing and network environments
- Implement a vulnerability management program
- Evaluate the organisation's security through penetration testing
- Collect cybersecurity intelligence
Why study online?
Technological improvements and advances in educational design mean that studying online is no longer just a low cost alternative to traditional training methods. In many respects our online courses offer training which is superior to the majority of available classroom options.
Not only is the effectiveness of the training process enhanced, but also the convenience and overall cost efficiency of studying online makes it a compelling option for training. You can learn at your own pace and can repeat each section as many times as required, unlike in a traditional classroom environment.
Studying at your own pace, rewinding and going over the material as often as you need improves your long-term memory retention and makes studying more rewarding.
Curriculum for the CompTIA Cybersecurity Analyst course
Lesson 1: Assessing Information Security Risk
- Topic A: Identify the Importance of Risk Management
- Topic B: Assess Risk
- Topic C: Mitigate Risk
- Topic D: Integrate Documentation into Risk Management
Lesson 2: Analysing the Threat Landscape
- Topic A: Classify Threats and Threat Profiles
- Topic B: Perform Ongoing Threat Research
Lesson 3: Analysing Reconnaissance Threats to Computing and Network Environments
- Topic A: Implement Threat Modeling
- Topic B: Assess the Impact of Reconnaissance Incidents
- Topic C: Assess the Impact of Social Engineering
Lesson 4: Analysing Attacks on Computing and Network Environments
- Topic A: Assess the Impact of System Hacking Attacks
- Topic B: Assess the Impact of Web-Based Attacks
- Topic C: Assess the Impact of Malware
- Topic D: Assess the Impact of Hijacking and Impersonation Attacks
- Topic E: Assess the Impact of DoS Incidents
- Topic F: Assess the Impact of Threats to Mobile Security
- Topic G: Assess the Impact of Threats to Cloud Security
Lesson 5: Analysing Post-Attack Techniques
- Topic A: Assess Command and Control Techniques
- Topic B: Assess Persistence Techniques
- Topic C: Assess Lateral Movement and Pivoting Techniques
- Topic D: Assess Data Exfiltration Techniques
- Topic E: Assess Anti-Forensics Techniques
Lesson 6: Managing Vulnerabilities in the Organisation
- Topic A: Implement a Vulnerability Management Plan
- Topic B: Assess Common Vulnerabilities
- Topic C: Conduct Vulnerability Scans
Lesson 7: Implementing Penetration Testing to Evaluate Security
- Topic A: Conduct Penetration Tests on Network Assets
- Topic B: Follow Up on Penetration Testing
Lesson 8: Collecting Cybersecurity Intelligence
- Topic A: Deploy a Security Intelligence Collection and Analysis Platform
- Topic B: Collect Data from Network-Based Intelligence Sources
- Topic C: Collect Data from Host-Based Intelligence Sources
Lesson 9: Analysing Log Data
- Topic A: Use Common Tools to Analyse Logs
- Topic B: Use SIEM Tools for Analysis
- Topic C: Parse Log Files with Regular Expressions
Lesson 10: Performing Active Asset and Network Analysis
- Topic A: Analyse Incidents with Windows-Based Tools
- Topic B: Analyse Incidents with Linux-Based Tools
- Topic C: Analyse Malware
- Topic D: Analyse Indicators of Compromise
Lesson 11: Responding to Cybersecurity Incidents
- Topic A: Deploy an Incident Handling and Response Architecture
- Topic B: Mitigate Incidents
- Topic C: Prepare for Forensic Investigation as a CSIRT
Lesson 12: Investigating Cybersecurity Incidents
- Topic A: Apply a Forensic Investigation Plan
- Topic B: Securely Collect and Analyse Electronic Evidence
- Topic C: Follow Up on the Results of an Investigation
Lesson 13: Addressing Security Architecture Issues
- Topic A: Remediate Identity and Access Management Issues
- Topic B: Implement Security During the SDLC
Who is this course for?
Anyone looking to start a career as a Cybersecurity Analyst, or who wishes to gain a better understanding of cybersecurity.
There are no formal educational prerequisites to studying the CompTIA Cybersecurity Analyst online course, however, it is intended to follow the CompTIA Security+ course.
- Cybersecurity Analyst
- Security Engineer
- Security Intelligence Analyst
- Threat Intelligence Analyst
- Cybersecurity Manager
Questions and answers
No questions or answers found containing ''.
WOULD I NEED TO SIT FOR ANOTHER EXAM AFTER AT THE END OF THE COURSE
Hi, JUBRIL In order to gain the official certification, you will need to sit the official exam.This was helpful. Thank you for your feedback.
Does this include the exam voucher?
If you check the CompTIA website you will see the exam costs more than the price of this course. Therefore, it obviously does not include the exam as specified in the advertThis was helpful. Thank you for your feedback.
Currently there are no reviews for this course. Be the first to leave a review.