TRAINING INQUIRY

    LEAVE YOUR DETAILS BELOW AND WE WILL GET BACK TO YOU.

    Best way to contact me *

    About this Course

    This 5-day course is intended for those wishing to qualify with CompTIA CySA+ Cybersecurity Analyst Certification. CompTIA’s CySA+ Certification is an intermediate-level certificate for IT professionals with previous experience of working in the field of IT security.

     

    The CompTIA CySA+ examination is designed for IT security analysts, vulnerability analysts, or threat intelligence analysts. The exam will certify that the successful candidate has the knowledge and skills required to configure and use threat detection tools, perform data analysis, and interpret the results to identify vulnerabilities, threats, and risks to an organization with the end goal of securing and protecting applications and systems within an organization.

    Outline

    Module 1 / Threat Management 1

    Cybersecurity Analysts
    *Cybersecurity Roles and Responsibilities
    *Frameworks and Security Controls
    *Risk Evaluation
    *Penetration Testing Processes
    Reconnaissance Techniques
    *The Kill Chain
    *Open Source Intelligence
    *Social Engineering
    *Topology Discovery
    *Service Discovery
    *OS Fingerprinting

    Module 2 / Threat Management 2

    Security Appliances
    *Configuring Firewalls
    *Intrusion Detection and Prevention
    *Configuring IDS
    *Malware Threats
    *Configuring Anti-virus Software
    *Sysinternals
    *Enhanced Mitigation Experience Toolkit
    Logging and Analysis
    *Packet Capture
    *Packet Capture Tools
    *Monitoring Tools
    *Log Review and SIEM
    *SIEM Data Outputs
    *SIEM Data Analysis
    *Point-in-Time Data Analysis

    Module 3 / Vulnerability Management

    Managing Vulnerabilities
    *Vulnerability Management Requirements
    *Asset Inventory
    *Data Classification
    *Vulnerability Management Processes
    *Vulnerability Scanners
    *Microsoft Baseline
    *Security Analyzer
    *Vulnerability Feeds and SCAP
    *Configuring Vulnerability Scans
    *Vulnerability Scanning Criteria
    *Exploit Frameworks
    Remediating Vulnerabilities
    *Analyzing Vulnerability Scans
    *Remediation and Change Control
    *Remediating Host Vulnerabilities
    *Remediating Network Vulnerabilities
    *Remediating Virtual Infrastructure Vulnerabilities
    Secure Software Development
    *Software Development Lifecycle
    *Software Vulnerabilities
    *Software Security Testing
    *Interception Proxies
    *Web Application Firewalls
    *Source Authenticity
    *Reverse Engineering

    Module 4 / Cyber Incident Response

    Incident Response
    *Incident Response Processes
    *Threat Classification
    *Incident Severity and Prioritization
    *Types of Data
    Forensics Tools
    *Digital Forensics Investigations
    *Documentation and Forms
    *Digital Forensics Crime Scene
    *Digital Forensics Kits
    *Image Acquisition
    *Password Cracking
    *Analysis Utilities
    Incident Analysis and Recovery
    *Analysis and Recovery Frameworks
    *Analyzing Network Symptoms
    *Analyzing Host Symptoms
    *Analyzing Data Exfiltration
    *Analyzing Application Symptoms
    *Using Sysinternals
    *Containment Techniques
    *Eradication Techniques
    *Validation Techniques
    *Corrective Actions

    Module 5 / Security Architecture

    Secure Network Design
    *Network Segmentation
    *Blackholes, Sinkholes, and Honeypots
    *System Hardening
    *Group Policies and MAC
    *Endpoint Security
    Managing Identities and Access
    *Network Access Control
    *Identity Management
    *Identity Security Issues
    *Identity Repositories
    *Context-based Authentication
    *Single Sign On and Federations
    *Exploiting Identities
    *Exploiting Web Browsers and Applications
    Security Frameworks and Policies
    *Frameworks and Compliance
    *Reviewing Security Architecture
    *Procedures and Compensating Controls
    *Verifications and Quality Control
    *Security Policies and Procedures
    *Personnel Policies and Training

    Prerequisites

    Target audience and course prerequisites
    CompTIA CySA+ certification is aimed at IT professionals with (or seeking) job roles such as IT Security Analyst, Security Operations Center (SOC) Analyst, Vulnerability Analyst, Cybersecurity Specialist, Threat Intelligence Analyst, and Security Engineer.
    Ideally, you should have successfully completed gtslearning’s “CompTIA Network+ Certification” and “CompTIA Security+ Certification” courses or have equivalent knowledge. Specifically, it is recommended that you have the following skills and knowledge before starting this course:

    • Know basic network terminology and functions (such as OSI Model, Topology, Ethernet, Wi-Fi, switches, routers).
    • Understand TCP/IP addressing, core protocols, and troubleshooting tools.
    • Identify network attack strategies and defenses.
    • Know the technologies and uses of cryptographic standards and products.
    • Identify network- and host-based security technologies and practices.
    • Describe the standards and products used to enforce security on web and communications technologies.

    Venue:  

    Address:
    Online Event

    Description:

    Live Online Training

    Get the same training you expect in the classroom without leaving your office or home. These are NOT recorded classes. They are LIVE sessions with an expert instructor. We use the latest in video conferencing technologies and audio so you can confidently participate in any class just like being right there in person. We guarantee the effectiveness of our online training delivery approach that we will give you your money back if you are not totally satisfied.  Ask us for a demo.

    Online class requirements:

    • Moderate to fast Internet
    • A phone or computer headset is required in order to hear the instructor/moderator). You can use Computer Audio (VoIP) or you can dial in from a regular phone.  For convenience, we recommend a hands-free headset or phone.
    • Training software must be installed on your computer (trial versions are acceptable)
    • RECOMMENDED: Dual Monitors or computers. For optimal online learning experience, we recommend participants have dual monitors or two computers. Your online classroom credentials allow you to join multiple times from multiple computers. Participants should use one monitor or computer to view the instructor’s shared screen and another monitor or computer to work with the software.

    What happens when you enroll in an online class

    When you register for an online class, you will receive a welcome email followed by login access to the Citrix GoToTraining virtual classroom. A workbook (printed copy or eBook) will be sent to you prior to the start of class.

    Online Training Advantages

    Convenience: You don’t have to travel and can attend from your home, office or anywhere with an internet connection. Our online classes are conducted using GoToTraining, a more robust version of the popular GoToMeeting screen sharing and conferencing platform. To accommodate multiple time zones, courses are typically scheduled from 10am – 5pm Eastern with a one-hour lunch break at 12:30 – 1:30 pm Eastern and a 10-minute break in the morning and afternoon. When conducting custom online course for your group, class times can be modified to accommodate your timezone.

    Interactive Learning: Our online training is fully interactive. You can speak and chat with the instructor and classmates at any time. Various interactive techniques are used in every class. Our small class sizes (typically 4 – 8 students), allow our instructors to focus on individual performance and issues and to work closely with you to meet your unique needs. Classes are designed to be a hands-on learning experience, providing opportunities for you to try your new skills while the instructor is available for review, questions, and feedback. You have the option to give the instructor permission to view your computer to provide one-on-one assistance when needed.

    GSA Schedule: 47QTCA19D008F