CompTIA Cybersecurity Analyst (CySA+) CS0-002

Hours: 50 / Access Length: 12 Months / Delivery: Online, Self-Paced
Retail Price: $995.00

Course Overview:

Gain the skills required to pass the CompTIA CySA+ certification exam with the CompTIA Cybersecurity Analyst (CySA+) course and lab. The lab is versatile and delivers a hands-on experience, replacing expensive physical labs. The CompTIA CySA+ training course and lab cover the CS0-002 exam objectives and offer an interactive learning experience required to analyze and interpret data; identify and address vulnerabilities, and more. The CySA+ study guide has all the learning resources to help you master all the skills covered in the exam.

This course includes FREE access for 12 months to a cloud based lab platform to assist students develop the practical information technology (IT) skills necessary to succeed in high in demand IT jobs.  This cloud based lab solution uses real equipment that enables our students to execute each practical task in a safe environment that is accessible from anywhere without needing to buy their own hardware or risk damage to their own system.

Along with providing the necessary hardware in a virtual environment, students gain access to high quality practical exercises that cover many of the exam topics they will encounter on their certifying exams.

This course prepares students to take the CompTIA Cybersecurity Analyst (CySA+) CS0-002 certification exam.

Course Outline:

Chapter 1: Introduction
Chapter 2: Today’s Cybersecurity Analyst
  • Cybersecurity Objectives
  • Privacy vs. Security
  • Evaluating Security Risks
  • Building a Secure Network
  • Secure Endpoint Management
  • Penetration Testing
  • Reverse Engineering
  • The Future of Cybersecurity Analytics
  • Summary
  • Exam Essentials
Chapter 3: Using Threat Intelligence
  • Threat Data and Intelligence
  • Threat Classification
  • Attack Frameworks
  • Summary
  • Exam Essentials
Chapter 4: Reconnaissance and Intelligence Gathering
  • Mapping and Enumeration
  • Passive Footprinting
  • Gathering Organizational Intelligence
  • Detecting, Preventing, and Responding to Reconnaissance
  • Summary
  • Exam Essentials
Chapter 5: Designing a Vulnerability Management Program
  • Identifying Vulnerability Management Requirements
  • Configuring and Executing Vulnerability Scans
  • Developing a Remediation Workflow
  • Overcoming Risks of Vulnerability Scanning
  • Vulnerability Scanning Tools
  • Summary
  • Exam Essentials
Chapter 6: Analyzing Vulnerability Scans
  • Reviewing and Interpreting Scan Reports
  • Validating Scan Results
  • Common Vulnerabilities
  • Summary
  • Exam Essentials
Chapter 7: Cloud Security
  • Understanding Cloud Environments
  • Operating in the Cloud
  • Cloud Infrastructure Security
  • Summary
  • Exam Essentials
Chapter 8: Infrastructure Security and Controls
  • Understanding Defense-in-Depth
  • Improving Security by Improving Controls
  • Analyzing Security Architecture
  • Summary
  • Exam Essentials
Chapter 9: Identity and Access Management Security
  • Understanding Identity
  • Threats to Identity and Access
  • Identity as a Security Layer
  • Federation and Single Sign-On
  • Summary
  • Exam Essentials
Chapter 10: Software and Hardware Development Security
  • Software Assurance Best Practices
  • Designing and Coding for Security
  • Software Security Testing
  • Hardware Assurance Best Practices
  • Summary
  • Exam Essentials
Chapter 11: Security Operations and Monitoring
  • Security Monitoring
  • Summary
  • Exam Essentials
Chapter 12: Building an Incident Response Program
  • Security Incidents
  • Phases of Incident Response
  • Building the Foundation for Incident Response
  • Creating an Incident Response Team
  • Coordination and Information Sharing
  • Classifying Incidents
  • Summary
  • Exam Essentials
Chapter 13: Analyzing Indicators of Compromise
  • Analyzing Network Events
  • Investigating Host-Related Issues
  • Investigating Service and Application-Related Issues
  • Summary
  • Exam Essentials
Chapter 14: Performing Forensic Analysis and Techniques
  • Building a Forensics Capability
  • Understanding Forensic Software
  • Conducting Endpoint Forensics
  • Network Forensics
  • Cloud, Virtual, and Container Forensics
  • Conducting a Forensic Investigation
  • Forensic Investigation: An Example
  • Summary
  • Exam Essentials
Chapter 15: Containment, Eradication, and Recovery
  • Containing the Damage
  • Incident Eradication and Recovery
  • Wrapping Up the Response
  • Summary
  • Exam Essentials
Chapter 16: Risk Management
  • Analyzing Risk
  • Managing Risk
  • Security Controls
  • Summary
  • Exam Essentials
Chapter 17: Policy and Compliance
  • Understanding Policy Documents
  • Complying with Laws and Regulations
  • Adopting a Standard Framework
  • Implementing Policy-Based Controls
  • Security Control Verification and Quality Control
  • Summary
  • Exam Essentials
Chapter 18: Appendix: Video Tutorials

All necessary course materials are included.

Certification(s):

This course prepares students to take the CompTIA Cybersecurity Analyst (CySA+) CS0-002 certification exam.


System Requirements:

System Requirements:

Internet Connectivity Requirements:
  • Cable and DSL internet connections are recommended for the best experience.
Hardware Requirements:
  • CPU: 1 GHz or higher
  • RAM: 2 GB or higher
  • Resolution: 1280 x 720 or higher
  • Speakers / Headphones
  • Microphone (Webinar / Live Online sessions)
Operating System Requirements:
  • Microsoft Windows 7 or 10 (Home, Pro)
  • Mac OSX 10 or higher.
  • Latest Chrome OS
  • Latest Linux Distributions

NOTE: While we understand that our courses can be viewed on Android and iPhone devices, we do not recommend the use of these devices for our courses. The size of these devices do not provide a good learning environment for students taking online or live online based courses.

Web Browser Requirements:
  • Latest Google Chrome is recommended for the best experience.
  • Latest Mozilla FireFox
  • Latest Microsoft Edge
  • Latest Apple Safari
Basic Software Requirements (These are recommendations of software to use):
  • Office suite software (Microsoft Office, OpenOffice, or LibreOffice)
  • PDF reader program (Adobe Reader, FoxIt)
  • Courses may require other software that is denoted in the above course outline.


** The course outlines displayed on this website are subject to change at any time without prior notice. **