CompTIA Cybersecurity Analyst (CySA+)

(CySA-plus) / ISBN : 978-1-61691-025-9
This course includes
Interactive Lessons
Gamified TestPrep
Hands-On Labs
183 Reviews
Get A Free Trial

About This Course

Skills You’ll Get

1

Introduction

  • What Does This Book Cover?
  • Setting Up a Kali and Metasploitable Learning Environment
  • Setting Up Your Environment
  • Objectives Map for CompTIA Cybersecurity Analyst (CySA+) Exam CS0-001
2

Defending Against Cybersecurity Threats

  • Cybersecurity Objectives
  • Evaluating Security Risks
  • Building a Secure Network
  • Secure Endpoint Management
  • Penetration Testing
  • Reverse Engineering
  • Summary
  • Exam Essentials
  • Lab Exercises
3

Reconnaissance and Intelligence Gathering

  • Footprinting
  • Passive Footprinting
  • Gathering Organizational Intelligence
  • Detecting, Preventing, and Responding to Reconnaissance
  • Summary
  • Exam Essentials
  • Lab Exercises
4

Designing a Vulnerability Management Program

  • Identifying Vulnerability Management Requirements
  • Configuring and Executing Vulnerability Scans
  • Developing a Remediation Workflow
  • Overcoming Barriers to Vulnerability Scanning
  • Summary
  • Exam Essentials
  • Lab Exercises
5

Analyzing Vulnerability Scans

  • Reviewing and Interpreting Scan Reports
  • Validating Scan Results
  • Common Vulnerabilities
  • Summary
  • Exam Essentials
  • Lab Exercises
6

Building an Incident Response Program

  • Security Incidents
  • Phases of Incident Response
  • Building the Foundation for Incident Response
  • Creating an Incident Response Team
  • Coordination and Information Sharing
  • Classifying Incidents
  • Summary
  • Exam Essentials
  • Lab Exercises
7

Analyzing Symptoms for Incident Response

  • Analyzing Network Events
  • Handling Network Probes and Attacks
  • Investigating Host Issues
  • Investigating Service and Application Issues
  • Summary
  • Exam Essentials
  • Lab Exercises
8

Performing Forensic Analysis

  • Building a Forensics Capability
  • Understanding Forensic Software
  • Conducting a Forensic Investigation
  • Forensic Investigation: An Example
  • Summary
  • Exam Essentials
  • Lab Exercises
9

Recovery and Post-Incident Response

  • Containing the Damage
  • Incident Eradication and Recovery
  • Wrapping Up the Response
  • Summary
  • Exam Essentials
  • Lab Exercises
10

Policy and Compliance

  • Understanding Policy Documents
  • Complying with Laws and Regulations
  • Adopting a Standard Framework
  • Implementing Policy-Based Controls
  • Security Control Verification and Quality Control
  • Summary
  • Exam Essentials
  • Lab Exercises
11

Defense-in-Depth Security Architectures

  • Understanding Defense in Depth
  • Implementing Defense in Depth
  • Analyzing Security Architecture
  • Summary
  • Exam Essentials
  • Lab Exercises
12

Identity and Access Management Security

  • Understanding Identity
  • Threats to Identity and Access
  • Identity as a Security Layer
  • Understanding Federated Identity and Single Sign-On
  • Summary
  • Exam Essentials
  • Lab Exercises
13

Software Development Security

  • Understanding the Software Development Life Cycle
  • Designing and Coding for Security
  • Software Security Testing
  • Summary
  • Exam Essentials
  • Lab Exercises
14

Cybersecurity Toolkit

  • Host Security Tools
  • Monitoring and Analysis Tools
  • Scanning and Testing Tools
  • Network Security Tools
  • Web Application Security Tools
  • Forensics Tools
  • Summary

1

Reconnaissance and Intelligence Gathering

  • Performing Reconnaissance on a Network
  • Identifying Search Options in Metasploit
  • Performing the Initial Scan
  • Initiating an SSH Session from your Windows 10 Client to your Windows Server
2

Designing a Vulnerability Management Program

  • Conducting Vulnerability Scans
3

Analyzing Vulnerability Scans

  • Consulting a Vulnerability Database
4

Analyzing Symptoms for Incident Response

  • Examining the DDOS_Attack.pcap File
  • Retrieving a Real-Time List of Running Processes
  • Examining the Audited Events
5

Policy and Compliance

  • Adding Revision to the Revision History
  • Viewing and Downloading the Policy Templates
  • Opening the Policy Template and Setting the Company Name
  • Reviewing and Modifying the Policy Items
6

Software Development Security

  • Inspecting the Vulnerability in the echo Server's Source Code
7

Cybersecurity Toolkit

  • Using the Process Explorer to View Specific Details About Running Processes on the System
  • Making Syslog Entries Readable
  • Installing Splunk on the Server
  • Scanning the Rootkit
  • Working with Wireshark's Interface
  • Analyzing the Capture File to Find the Attack(s)
  • Generating Network Traffic and Using Filters
  • Confirming the Spoofing Attack in Wireshark
  • Starting a Live Packet Capture

Why Do Learners Love This Course?

Throughout the course there are many knowledge checks to assess your understanding of the topics. This really helped to identify both my strengths and weaknesses of the content. There are also labs that give you hands-on training to practice and ensure you fully grasp all of the concepts. All of the information covered goes into great detail that will ensure you will successfully pass.

Kevin Yamamoto
Systems Analyst II

This course will give you the skills you need to protect what a company cares most about. This course will help you learn about logs, attacks, risks, how to address these issues. The test is a hard one and every bit of help you can get is always useful. I can tell you this course will make sure you have an easier time with it weather you're new or a seasoned analyst. If you are looking for a nice supplement to your cyber security learning or prepping for the test, check them out.

Kathleen Monthy
IT Help Desk

Ucertify was the great e-learning experience i ever had. I got an opportunity to study CompTIA Cybersecurity Analyst (CySA+) Course & Labs with Ucertify. Course materials was well organize and explain very clearly. Practice Labs help me to get hands-on-experience regarding what i learnt from the course. Pre and pose assessments help me to measure my knowledge according to the objects of the exam. This course was a great preparation for CompTIA Cybersecurity Analyst (CySA+) exam. I highly recommend this course to anyone who preparing for the CompTIA Cybersecurity Analyst (CySA+) exam.

Dilan Dodangoda
Junior Cyber Security Consultant

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

CompTIA Cybersecurity Analyst (CySA+)

$ 433.42

Buy Now

Related Courses

All Course
scroll to top