CompTIA CySA+
The CySA+ course is designed for cybersecurity professionals who want to learn how to apply behavioral analysis to networks and devices to prevent, detect and combat cybersecurity threats through continuous security monitoring. You will dive into how to configure threat detection tools, perform data analysis, and interpret the results to identify vulnerabilities, threats, and risks to an organization.
Learning how to perform information security analysis will allow professionals who attend CySa+ to have more visibility of possible threats and will be able to focus more on network behavior, including an organization’s internal network.
The course also prepares for the exam to obtain the  CompTIA Cybersecurity Analyst CySA+ CS0-002 vendor neutral international certification .
The course combines theory lessons  and  labs in virtual environments to best prepare you for the certification exam.
COD: CompTIA CySA +
Categorie:Â CompTIA
Teaching methodology
The course includes educational laboratories in which each student will be able to work in order to complete training exercises that will provide practical experience in using the instrument, for each of the topics covered during the course.
Prerequisites
Educational program
MODULE 1 – Threat and Vulnerability Management
Use and apply proactive threat intelligence to support organizational security and perform vulnerability management activities.
MODULE 2 – Software and Systems Security
Apply security solutions for infrastructure management and explain software and hardware security best practices.
MODULE 3 – Compliance and Assessment
The student will be able to apply security concepts in support of organizational risk mitigation and understand the importance of structures, policies, procedures and controls.
MODULE 4 – Security Operations and Monitoring
Analyze data as part of ongoing security monitoring activities and implement configuration changes to existing controls to improve security.
MODULE 5 – Incident Response
Apply appropriate incident response procedure, analyze potential indicators of compromise and use basic techniques of digital forensics
Duration – 40 hours (8 days)
Delivery – in Classroom, On Site, Remote
PC and SW requirements:
- Internet connection
- Web browser, Google Chrome
- Zoom
Language
Instructor: English
Labs: English
Slides: English