Existing User Login

New User? Create An Account

Request new password

We Are All About You

XpertSkills - the parent company under which iCollege operates - was established in South Africa in 2003 and since then, we have grown globally in leaps and bounds with customers and partners in more than 120 countries. With employees on 3 continents and as a next-generation, virtual organization we are unconstrained by the limits that are usually associated with traditional “brick & mortar” companies.

This allows us to focus, without distraction, on reaching our ultimate goal – ensuring your ongoing success – by providing affordable, reliable, high quality and relevant learning products whilst remaining innovative and agile.

Contact Details:

Web: www.xpertskills.com
Skype: xpertskills
Mail: info@xpertskills.com
Phone: +27 10 020 2067

Physical Address:

Head Office - South Africa
16 Monte Carlo Crescent
Kyalami business Park
Johannesburg
South Africa 1684

You are here

CompTIA CySA+ (Cyber Security Analyst)

LIVE LAB:

CompTIA CySA+ (Cyber Security Analyst)

Practical exercises in a live environment to help you get real-world, hands-on experience.

Overview

The CompTIA Cybersecurity Analyst (CySA+) Practice Lab will provide you with the necessary platform to gain hands on skills in information security. By completing the lab tasks you will improve your practical skills in configuring and using threat detection tools, data analysis, identifying vulnerabilities, identifying threats, and risks, and securing and protecting applications and systems within an organization. These same tasks will help you understand the objectives and competencies required by the CompTIA CySA+ certification exam (CS0-001). CompTIA Cybersecurity Analyst (CySA+) is an intermediate certificate aimed at IT security analysts, vulnerability analysts, threat intelligence analysts, or IT professionals seeking to advance into the industry. This Practice Lab focuses on the practical aspects of the exam objectives. It is therefore advised to refer to your own course materials to gain a deeper understanding of any theoretical aspects of the exam objectives. It is also recommended that you have gained the following certification before attempting the CySA+ (CS0-001) exam: Security + (SY0-401) No prior hands-on experience is required to use or complete this Practice Lab, however we have assumed that you know how to use a computer and that you are familiar with basic networking technologies and information security concepts.

Vendor:   CompTIA
Vendor Id:   CS0-001
Version:   1
Level:   Entry
Learning Time:   1500  Minutes

Exercises

  1. Topology Discovery Part 1
  2. Exercises:
    • Introduction
    • Exercise 1 - Basic Scanning
    • Exercise 2 - Discovering Network Topologies
    • Exercise 3 - Topology Discovery against Firewalls
    • Summary
  3. Topology Discovery Part 2
  4. Exercises:
    • Introduction
    • Exercise 1 - OS Fingerprinting
    • Exercise 2 - Output Logs
    • Exercise 3 - Zenmap the Nmap GUI
    • Summary
  5. DNS Harvesting
  6. Exercises:
    • Introduction
    • Exercise 1 - DNS Harvesting with Application Software
    • Exercise 2 - DNS Harvesting Online
    • Exercise 3 - ICANN Website
    • Summary
  7. Social Engineering Reconnaissance
  8. Exercises:
    • Introduction
    • Exercise 1- Social Engineering Reconnaissance
    • Summary
  9. Windows Command Line Tools
  10. Exercises:
    • Introduction
    • Exercise 1 - IPconfig
    • Exercise 2 - Netstat
    • Exercise 3 - Ping
    • Exercise 4 - Tracert and Route
    • Exercise 5 - ARP and Whoami
    • Summary
  11. Vulnerability Scanner Nessus
  12. Exercises:
    • Introduction
    • Exercise 1 - Downloading and Installing Nessus
    • Exercise 2 - Configuring Nessus
    • Exercise 3 - Scanning with Nessus
    • Exercise 4 - Reviewing a Nessus Scan
    • Exercise 5 - Saving Nessus Reports
    • Summary
  13. Vulnerability Scanner MBSA
  14. Exercises:
    • Introduction
    • Exercise 1 - Introduction to Microsoft Baseline Security Analyser
    • Exercise 2 - Implementing Recommendations
    • Exercise 3 - Saving Microsoft Security Baseline Analyzer Reports
    • Exercise 4 - Reviewing Configuration Changes
    • Summary
  15. Encryption and Hashing
  16. Exercises:
    • Introduction
    • Exercise 1 - Cryptographic Basics
    • Exercise 2 - Hash Algorithms Compared
    • Exercise 3 - Comparing Hash Values
    • Summary
  17. Passive Topology Discovery
  18. Exercises:
    • Introduction
    • Exercise 1 - Packet Capture with Wireshark
    • Exercise 2 - Output Logs
    • Exercise 3 - Packet Analysis Part 1
    • Exercise 4 - Packet Analysis Part 2
    • Summary
  19. Packet Sniffing
  20. Exercises:
    • Introduction
    • Exercise 1 - Packet Sniffing for Passwords
    • Exercise 2 - Packet Sniffing for Image Capture and Extraction
    • Summary
  21. Compliance Patching
  22. Exercises:
    • Introduction
    • Exercise 1 - Install and Configure WSUS
    • Exercise 2 - WSUS Server Certificates Security
    • Exercise 3 - Create Computer Groups for WSUS
    • Exercise 4 - Configure GPO Policy for WSUS
    • Summary
  23. Introduction to Syslog
  24. Exercises:
    • Introduction
    • Exercise 1 - Syslog Forwarder
    • Exercise 2 - Syslog Collector
    • Exercise 3 - Syslog Analysis
    • Summary
  25. Monitoring Servers
  26. Exercises:
    • Introduction
    • Exercise 1 - Data Collector Sets
    • Exercise 2 - Configuring Alerts for Data Collector Sets
    • Exercise 3 - Configure Event Subscription
    • Summary
  27. Alienvault Monitoring - SIEM and Netflow
  28. Exercises:
    • Introduction
    • Exercise 1 - AlienVault Exploration and Configuration
    • Exercise 2 - Netflow Monitoring
    • Exercise 3 - Traffic Capture with AlienVault
    • Exercise 4 - NMAP vs AlienVault
    • Exercise 5 - AlienVault SIEM Analysis and Tickets
    • Summary
  29. Alienvault Monitoring - Threats Vulnerabilities and Reporting
  30. Exercises:
    • Introduction
    • Exercise 1 - Adding AlienVault Users
    • Exercise 2 - Vulnerability Scanning for Threats Through AlienVault
    • Exercise 3 - Viewing the Threat Results
    • Exercise 4 - File Reporting
    • Exercise 5 - Dashboard Events and SIEM Analysis
    • Summary
  31. DVWA - Manual SQL Injection and Password Cracking
  32. Exercises:
    • Introduction
    • Exercise 1 - DVWA Usage
    • Exercise 2 - Performing an SQL Injection Attack
    • Exercise 3 - Password Cracking with John
    • Summary
  33. IPv4 and IPv6 Access Lists for Traffic Filtering
  34. Exercises:
    • Introduction
    • Exercise 1 - Configuring Standard and Extended Access Lists using IPv4
    • Exercise 2 - Configuring Named Access Lists Using IPv4
    • Exercise 3 - Creating Access-Lists in IPv6
    • Summary
  35. Configure Verify and Troubleshoot Port Security
  36. Exercises:
    • Introduction
    • Exercise 1 - Static and Dynamic Port Security
    • Exercise 2 - Additional Port Security Configuration Settings
    • Exercise 3 - Configuring Err-disable Recovery
    • Summary
  37. Implement IOS Features to Mitigate Threats
  38. Exercises:
    • Introduction
    • Exercise 1 - Implementing ACLs using the CLI to Mitigate Address Spoofing
    • Exercise 2 - Implementing ACLs using the CLI to Mitigate Against ICMP Reconnaissance Attacks
    • Exercise 3 - Using TCP Intercept to Help Prevent DOS Attacks
    • Exercise 4 - Configure and Verify VACLs
    • Summary
  39. Securing the Management Plane on Cisco Routers
  40. Exercises:
    • Introduction
    • Exercise 1 - Securing In-Band Remote Access using SSH
    • Exercise 2 - Configuring Custom Privilege Levels and Views
    • Exercise 3 - Cisco IOS and Key Network Services
    • Summary
  41. Configure Verify and Troubleshoot GRE Tunnel Connectivity
  42. Exercises:
    • Introduction
    • Exercise 1 - Configuring a GRE Tunnel
    • Summary
  43. Implement SSL VPN using ASA Device Manager
  44. Exercises:
    • Introduction
    • Exercise 1 - Implement a Clientless SSL VPN using the Cisco ASA Device Manager
    • Exercise 2 - Implement AnyConnect using the Cisco ASA Device Manager
    • Summary
  45. Implement the Cisco Adaptive Security Appliance
  46. Exercises:
    • Introduction
    • Exercise 1 - Configuring Core ASA Features
    • Exercise 2 - Configuring NAT
    • Exercise 3 - Configuring a Security Policy
    • Exercise 4 - Modular Policy Framework
    • Summary
  47. Forensics - E-mail and Social Media Investigations
  48. Exercises:
    • Introduction
    • Exercise 1 - Using OSForensics to Recover E-mail
    • Exercise 2 - Email Examination Example
    • Exercise 3 - Image Examination Example
    • Exercise 4 - FaceBook Forensics
    • Summary
  49. Forensics – Understanding the Digital Forensics Profession and Investigations
  50. Exercises:
    • Introduction
    • Exercise 1 - Acquiring an Image of Evidence Media
    • Exercise 2 - Analyzing Your Digital Evidence
    • Exercise 3 - Analysis Example
    • Exercise 4 - Report Example
    • Exercise 5 - Keyword Search Example
    • Summary
LIVE LAB Access to real hardware and software in real time and with full administrator privileges to gain real-world practical experience.
USD 295 USD 120 59% OFF
  • Gain practical experience with real-world scenarios
  • Access to real hardware & software in real time
  • Experiment & put theory to practice
  • Includes exercises designed to prepare for exams.
  • 12 Months access (Unless indicated otherwise)
  • 10-Day money-back guarantee
Back to Top