CompTIA Cybersecurity Analyst (CySA+) CS0-001

Hours: 50 / Access Length: 12 Months / Delivery: Online, Self-Paced
Retail Price: $995.00

Course Overview:

CySA+ is the only intermediate high-stakes cybersecurity analyst certification with performance-based questions covering security analytics, intrusion detection and response. High-stakes exams are proctored at a Pearson VUE testing center in a highly secure environment. CySA+ is the most up-to-date security analyst certification that covers advanced persistent threats in a post-2014 cybersecurity environment.

This course includes FREE access for 12 months to a cloud based lab platform to assist students develop the practical information technology (IT) skills necessary to succeed in high in demand IT jobs.  This cloud based lab solution uses real equipment that enables our students to execute each practical task in a safe environment that is accessible from anywhere without needing to buy their own hardware or risk damage to their own system.

Along with providing the necessary hardware in a virtual environment, students gain access to high quality practical exercises that cover many of the exam topics they will encounter on their certifying exams.

This course prepares students to take the CompTIA Cybersecurity Analyst (CySA+) CS0-001 certification exam.

Course Outline:

Chapter 1: Introduction
  • Goals and Methods
  • Who Should Read This Book?
  • Strategies for Exam Preparation
Chapter 2: Applying Environmental Reconnaissance Techniques
  • Procedures/Common Tasks
  • Variables
  • Tools
  • Review All Key Topics
Chapter 3: Analyzing the Results of Network Reconnaissance
  • Point-in-Time Data Analysis
  • Data Correlation and Analytics
  • Data Output
  • Tools
  • Review All Key Topics
Chapter 4: Recommending and Implementing the Appropriate Response and Countermeasure
  • Network Segmentation
  • Honeypot
  • Endpoint Security
  • Group Policies
  • ACLs
  • Hardening
  • Network Access Control
  • Review All Key Topics
Chapter 5: Practices Used to Secure a Corporate Environment
  • Penetration Testing
  • Reverse Engineering
  • Training and Exercises
  • Risk Evaluation
  • Review All Key Topics
Chapter 6: Implementing an Information Security Vulnerability Management Process
  • Identification of Requirements
  • Establish Scanning Frequency
  • Configure Tools to Perform Scans According to Specification
  • Execute Scanning
  • Generate Reports
  • Remediation
  • Ongoing Scanning and Continuous Monitoring
  • Review All Key Topics
Chapter 7: Analyzing Scan Output and Identifying Common Vulnerabilities
  • Analyzing Output Resulting from a Vulnerability Scan
  • Common Vulnerabilities Found in Targets Within an Organization
  • Review All Key Topics
Chapter 8: Identifying Incident Impact and Assembling a Forensic Toolkit
  • Threat Classification
  • Factors Contributing to Incident Severity and Prioritization
  • Forensics Kit
  • Forensic Investigation Suite
  • Review All Key Topics
Chapter 9: The Incident Response Process
  • Stakeholders
  • Purpose of Communication Processes
  • Role-Based Responsibilities
  • Using Common Symptoms to Select the Best Course of Action to Support Incident Response
  • Review All Key Topics
Chapter 10: Incident Recovery and Post-Incident Response
  • Containment Techniques
  • Eradication Techniques
  • Validation
  • Corrective Actions
  • Incident Summary Report
  • Review All Key Topics
Chapter 11: Frameworks, Policies, Controls, and Procedures
  • Regulatory Compliance
  • Frameworks
  • Policies
  • Controls
  • Procedures
  • Verifications and Quality Control
  • Review All Key Topics
Chapter 12: Remediating Security Issues Related to Identity and Access Management
  • Security Issues Associated with Context-Based Authentication
  • Security Issues Associated with Identities
  • Security Issues Associated with Identity Repositories
  • Security Issues Associated with Federation and Single Sign-on
  • Exploits
  • Review All Key Topics
Chapter 13: Security Architecture and Implementing Compensating Controls
  • Security Data Analytics
  • Manual Review
  • Defense in Depth
  • Review All Key Topics
Chapter 14: Application Security Best Practices
  • Best Practices During Software Development
  • Secure Coding Best Practices
  • Review All Key Topics
Chapter 15: Using Cybersecurity Tools and Technologies
  • Preventative Tools
  • Collective Tools
  • Analytical Tools
  • Exploit Tools
  • Forensics Tools
  • Review All Key Topics
Chapter 16: Module 1: Threat Management
  • Lesson 1: Reconnaissance Techniques
  • Lesson 2: Network Reconnaissance
  • Lesson 3: Response and Counter Measures
  • Lesson 4: Securing Corporate Environments
Chapter 17: Module 2: Vulnerability Management
  • Lesson 5: Implementing the Information Security Vulnerability Management Process
  • Lesson 6: Analyze Output of Vulnerability Scan
  • Lesson 7: Compare and Contrast Common Vulnerabilities
Chapter 18: Module 3: Cyber Incident Response
  • Lesson 8: Determine Impact of an Incident
  • Lesson 9: Forensics Tools and Investigation
  • Lesson 10: Incident Reporting and Communications
  • Lesson 11: Analyzing Incident Response Symptoms and Recovery Techniques
  • Lesson 12: Post-Incident Response Process
Chapter 19: Module 4: Security Architectures and Tool Sets
  • Lesson 13: Frameworks, Common Policies, Controls, and Procedures
  • Lesson 14: Access Control and Access Management Remediation
  • Lesson 15: Reviewing Security Architectures
  • Lesson 16: Software Development Lifecycle (SDLC) Best Practices
  • Lesson 17: Cybersecurity Tools and Technologies
CompTIA Cybersecurity Analyst (CySA+) Live Labs

All necessary course materials are included.

Certification(s):

This course prepares students to take the CompTIA Cybersecurity Analyst (CySA+) CS0-001 certification exam.


System Requirements:

System Requirements:

Internet Connectivity Requirements:
  • Cable and DSL internet connections are recommended for the best experience.
Hardware Requirements:
  • CPU: 1 GHz or higher
  • RAM: 2 GB or higher
  • Resolution: 1280 x 720 or higher
  • Speakers / Headphones
  • Microphone (Webinar / Live Online sessions)
Operating System Requirements:
  • Microsoft Windows 7 or 10 (Home, Pro)
  • Mac OSX 10 or higher.
  • Latest Chrome OS
  • Latest Linux Distributions

NOTE: While we understand that our courses can be viewed on Android and iPhone devices, we do not recommend the use of these devices for our courses. The size of these devices do not provide a good learning environment for students taking online or live online based courses.

Web Browser Requirements:
  • Latest Google Chrome is recommended for the best experience.
  • Latest Mozilla FireFox
  • Latest Microsoft Edge
  • Latest Apple Safari
Basic Software Requirements (These are recommendations of software to use):
  • Office suite software (Microsoft Office, OpenOffice, or LibreOffice)
  • PDF reader program (Adobe Reader, FoxIt)
  • Courses may require other software that is denoted in the above course outline.


** The course outlines displayed on this website are subject to change at any time without prior notice. **