Existing User Login

New User? Create An Account

Request new password

We Are All About You

XpertSkills - the parent company under which iCollege operates - was established in South Africa in 2003 and since then, we have grown globally in leaps and bounds with customers and partners in more than 120 countries. With employees on 3 continents and as a next-generation, virtual organization we are unconstrained by the limits that are usually associated with traditional “brick & mortar” companies.

This allows us to focus, without distraction, on reaching our ultimate goal – ensuring your ongoing success – by providing affordable, reliable, high quality and relevant learning products whilst remaining innovative and agile.

Contact Details:

Web: www.xpertskills.com
Skype: xpertskills
Mail: info@xpertskills.com
Phone: +27 10 020 2067

Physical Address:

Head Office - South Africa
16 Monte Carlo Crescent
Kyalami business Park
Johannesburg
South Africa 1684

You are here

CompTIA CySA+ (Cyber Security Analyst)

E-COURSE:

CompTIA CySA+ (Cyber Security Analyst)

Instructor-led video course with presentations, workbooks, games, flashcards and quizzes.
Overview

The CompTIA CySA (Cybersecurity Analyst) certification prep course is designed to help prepare candidates to sit for the CySA+ exam, as well as reinforce concepts for work roles such as Systems Security Analyst, Threat Analyst, and Vulnerability Assessment Analysts.

Objectives
  • Apply environmental reconnaissance techniques like OS fingerprinting, e-mail harvesting, and social media profiling using tools such as Nmap, Netstat, and Syslog
  • Analyze the results of network reconnaissance, and recommend or implement countermeasures
  • Secure a corporate environment by scanning for vulnerabilities
  • Respond to cyber incidents with a forensics toolkit, maintain the chain of custody, and analyze incident severity.
Prerequisites
  • Primary audience: Anyone preparing for the CompTIA Cybersecurity Analyst CySA+ examination.
  • Secondary audience: Anyone interested in learning cyber security fundamentals.
Target Audience

The CompTIA Cybersecurity Analyst (CySA+) examination is designed for IT security analysts, vulnerability analysts, or threat intelligence analysts. The exam will certify that the successful candidate has the knowledge and skills required to configure and use threat detection tools, perform data analysis, and interpret the results to identify vulnerabilities, threats, and risks to an organization with the end goal of securing and protecting applications and systems within an organization.

Module 1: Threat Management

1.1 Introduction

1.2 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 1

1.3 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 2

1.4 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 3

1.5 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 4

1.6 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 5

1.7 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 6

1.8 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 7

1.9 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 8

1.10 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 9

1.11 Given a scenario, analyze the results of a network reconnaissance - Part 1

1.12 Given a scenario, analyze the results of a network reconnaissance - Part 2

1.13 Given a scenario, analyze the results of a network reconnaissance - Part 3

1.14 Given a scenario, analyze the results of a network reconnaissance - Part 4

1.15 Given a scenario, analyze the results of a network reconnaissance - Part 5

1.16 Given a network-based threat, implement or recommend the appropriate response and countermeasure - Part 1

1.17 Given a network-based threat, implement or recommend the appropriate response and countermeasure - Part 2

1.18 Given a network-based threat, implement or recommend the appropriate response and countermeasure - Part 3

1.19 Given a network-based threat, implement or recommend the appropriate response and countermeasure - Part 4

1.20 Explain the purpose of practices used to secure a corporate environment - Part 1

1.21 Explain the purpose of practices used to secure a corporate environment - Part 2

1.22 Explain the purpose of practices used to secure a corporate environment - Part 3

1.23 Explain the purpose of practices used to secure a corporate environment - Part 4

Module 2: Vulnerability Management

2.1 Given a scenario, implement an information security vulnerability management process - Part 1

2.2 Given a scenario, implement an information security vulnerability management process - Part 2

2.3 Given a scenario, implement an information security vulnerability management process - Part 3

2.4 Given a scenario, implement an information security vulnerability management process - Part 4

2.5 Given a scenario, implement an information security vulnerability management process - Part 5

2.6 Given a scenario, implement an information security vulnerability management process - Part 6

2.7 Given a scenario, implement an information security vulnerability management process - Part 7

2.8 Given a scenario, analyze the output resulting from a vulnerability scan - Part 1

2.9 Given a scenario, analyze the output resulting from a vulnerability scan - Part 2

2.10 Compare and contrast common vulnerabilities found in the following targets within an organization - Part 1

2.11 Compare and contrast common vulnerabilities found in the following targets within an organization - Part 2

2.12 Compare and contrast common vulnerabilities found in the following targets within an organization - Part 3

Module 3: Cyber Incident Response

3.1 Given a scenario, distinguish threat data or behavior to determine the impact of an incident - Part 1

3.2 Given a scenario, distinguish threat data or behavior to determine the impact of an incident - Part 2

3.3 Given a scenario, distinguish threat data or behavior to determine the impact of an incident - Part 3

3.4 Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation - Part 1

3.5 Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation - Part 2

3.6 Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation - Part 3

3.7 Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation - Part 4

3.8 Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation - Part 5

3.9 Explain the importance of communications during the incident response process

3.10 Given a scenario, analyze common symptoms to select the best course of action to support incident response - Part 1

3.11 Given a scenario, analyze common symptoms to select the best course of action to support incident response - Part 2

3.12 Given a scenario, analyze common symptoms to select the best course of action to support incident response - Part 3

3.13 Given a scenario, analyze common symptoms to select the best course of action to support incident response - Part 4

3.14 Summarize the incident recovery and post-incident response process - Part 1

3.15 Summarize the incident recovery and post-incident response process - Part 2

3.16 Summarize the incident recovery and post-incident response process - Part 3

3.17 Summarize the incident recovery and post-incident response process - Part 4

Module 4: Security Architecture and Tool Sets

4.1 Explain the relationship between frameworks, common policies, controls, and procedures - Part 1

4.2 Explain the relationship between frameworks, common policies, controls, and procedures - Part 2

4.3 Explain the relationship between frameworks, common policies, controls, and procedures - Part 3

4.4 Explain the relationship between frameworks, common policies, controls, and procedures - Part 4

4.5 Given a scenario, use data to recommend remediation of security issues related to identity and access management - Part 1

4.6 Given a scenario, use data to recommend remediation of security issues related to identity and access management - Part 2

4.7 Given a scenario, use data to recommend remediation of security issues related to identity and access management - Part 3

4.8 Given a scenario, use data to recommend remediation of security issues related to identity and access management - Part 4

4.9 Given a scenario, review security architecture and make recommendations to implement compensating controls - Part 1

4.10 Given a scenario, review security architecture and make recommendations to implement compensating controls - Part 2

4.11 Given a scenario, review security architecture and make recommendations to implement compensating controls - Part 3

4.12 Given a scenario, use applications security best practices while participating in the Software Development Life Cycle (SDLC) - Part 1

4.13 Given a scenario, use applications security best practices while participating in the Software Development Life Cycle (SDLC) - Part 2

4.14 Overview

4.15 Conclusion

E-COURSE E-Learning Expert-led video course with presentations, workbooks, quizzes, games and flashcards.
USD 195 USD 95 51% OFF
  • 17:54:00
    + Hours Of learning
  • Includes video, presentations, workbooks, quizzes, flashcards & games
  • Receive a Certificate of Excellence on successful completion
  • Presented by highly qualified, industry leading experts
  • 12 Months access
  • 10-Day money-back guarantee
Back to Top