CompTIA Cybersecurity Analyst (CySA+)

(pearson-cysa-plus-complete) / ISBN : 978-1-61691-993-1
Lessons
Lab
TestPrep
Video Lessons (Add-on)
72 Reviews
Get A Free Trial

Skills You’ll Get

The CompTIA Cybersecurity Analyst (CySA+) certification is an internationally acknowledged vendor-neutral credential that applies behavioral analytics to improve the overall state of IT security. CompTIA CySA+ CS0-001 exam validates the critical knowledge and skills that are required to prevent, detect, and combat cybersecurity threats. The CS0-001 exam is also designed for IT security analysts, vulnerability analysts, or threat intelligence analysts.

1

Introduction

  • Goals and Methods
  • Who Should Read This Book?
  • Strategies for Exam Preparation
2

Applying Environmental Reconnaissance Techniques

  • Procedures/Common Tasks
  • Variables
  • Tools
  • Review All Key Topics
3

Analyzing the Results of Network Reconnaissance

  • Point-in-Time Data Analysis
  • Data Correlation and Analytics
  • Data Output
  • Tools
  • Review All Key Topics
4

Recommending and Implementing the Appropriate Response and Countermeasure

  • Network Segmentation
  • Honeypot
  • Endpoint Security
  • Group Policies
  • ACLs
  • Hardening
  • Network Access Control
  • Review All Key Topics
5

Practices Used to Secure a Corporate Environment

  • Penetration Testing
  • Reverse Engineering
  • Training and Exercises
  • Risk Evaluation
  • Review All Key Topics
6

Implementing an Information Security Vulnerability Management Process

  • Identification of Requirements
  • Establish Scanning Frequency
  • Configure Tools to Perform Scans According to Specification
  • Execute Scanning
  • Generate Reports
  • Remediation
  • Ongoing Scanning and Continuous Monitoring
  • Review All Key Topics
7

Analyzing Scan Output and Identifying Common Vulnerabilities

  • Analyzing Output Resulting from a Vulnerability Scan
  • Common Vulnerabilities Found in Targets Within an Organization
  • Review All Key Topics
8

Identifying Incident Impact and Assembling a Forensic Toolkit

  • Threat Classification
  • Factors Contributing to Incident Severity and Prioritization
  • Forensics Kit
  • Forensic Investigation Suite
  • Review All Key Topics
9

The Incident Response Process

  • Stakeholders
  • Purpose of Communication Processes
  • Role-Based Responsibilities
  • Using Common Symptoms to Select the Best Course of Action to Support Incident Response
  • Review All Key Topics
10

Incident Recovery and Post-Incident Response

  • Containment Techniques
  • Eradication Techniques
  • Validation
  • Corrective Actions
  • Incident Summary Report
  • Review All Key Topics
11

Frameworks, Policies, Controls, and Procedures

  • Regulatory Compliance
  • Frameworks
  • Policies
  • Controls
  • Procedures
  • Verifications and Quality Control
  • Review All Key Topics
12

Remediating Security Issues Related to Identity and Access Management

  • Security Issues Associated with Context-Based Authentication
  • Security Issues Associated with Identities
  • Security Issues Associated with Identity Repositories
  • Security Issues Associated with Federation and Single Sign-on
  • Exploits
  • Review All Key Topics
13

Security Architecture and Implementing Compensating Controls

  • Security Data Analytics
  • Manual Review
  • Defense in Depth
  • Review All Key Topics
14

Application Security Best Practices

  • Best Practices During Software Development
  • Secure Coding Best Practices
  • Review All Key Topics
15

Using Cybersecurity Tools and Technologies

  • Preventative Tools
  • Collective Tools
  • Analytical Tools
  • Exploit Tools
  • Forensics Tools
  • Review All Key Topics
A

Appendix: Conclusion

1

Applying Environmental Reconnaissance Techniques

  • Performing Reconnaissance on a Network
  • Scanning the Rootkit
2

Practices Used to Secure a Corporate Environment

  • Assessing the impact of malware
3

Implementing an Information Security Vulnerability Management Process

  • Consulting a Vulnerability Database
4

The Incident Response Process

  • Initiating an SSH Session from your Windows 10 Client to your Windows Server
5

Frameworks, Policies, Controls, and Procedures

  • Opening the Policy Template and Setting the Company Name
  • Reviewing and Modifying the Policy Items
  • Adding Revision to the Revision History
6

Remediating Security Issues Related to Identity and Access Management

  • Identifying security apps available for Android
  • Accessing remotely the DT_Watch folder to generate audit logs
  • Acquiring the Trojan horse simulator
  • Uploading the Trojan horse simulator to VirusTotal
  • Uploading the Trojan horse simulator to Malware
  • Identifying a suspicious account on the System User Groups
  • Enabling auditing of the DT_Watch folder
  • Enabling logging for audited objects
  • Examining the Audited Events
7

Security Architecture and Implementing Compensating Controls

  • Making Syslog Entries Readable
8

Application Security Best Practices

  • Inspecting the Vulnerability in the echo Server's Source Code
9

Using Cybersecurity Tools and Technologies

  • Collecting network-based security intelligence
  • Confirming the Spoofing Attack in Wireshark
  • Generating Network Traffic and Using Filters
  • Downloading and Installing Wireshark and WinPcap
  • Working with Wireshark's Interface
  • Analyzing the Capture File to Find the Attack(s)
  • Examining the traffic between client and server
  • Conducting Vulnerability Scans
  • Installing Splunk on the Server
  • Manipulating Kali Linux VM's network interfaces
  • Starting a Live Packet Capture
  • Using the Process Explorer to View Specific Details About Running Processes on the System
  • Examining the ipconfig options and creating the activity log
  • Identifying Search Options in Metasploit
  • Performing the Initial Scan

Why Do Learners Love This Course?

I always received my study materials and support in time and we never had hiccup regarding my studies. The course has offered me a huge growing range of high-quality e-learning solutions. uCertify is a top-notch institution that provides high quality IT certification practicing study material. You'll not only pass your exam but also get a profound understanding of the respective subject.

Peter Kanu Letsoalo
Emergency Dispatcher

The uCertify CompTIA CySA+ course is very much interactive and contains very detailed information on all the exam domains. The course did justice to the exam objectives and I would very recommend to anybody who wishes to prepare for the CompTIA CySA+ certification exam.

Sumit Shrestha
Sumit Shrestha
IT specialist

I chose the CS0-001-complete course which covers the CompTIA CySA+ CS0-001 exam. It made sense to do this one as I’m studying for the Cysa+ certification.

Jose Mejia Castañeda
Security Analyst/PCI

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

CompTIA Cybersecurity Analyst (CySA+)

$279.99

Buy Now

Related Courses

All Courses
scroll to top