CompTIA Cybersecurity Analyst (CySA+)

  • Course level: Intermediate
  • Categories CompTIA
  • Last Update 06/03/2021


This CompTIA CySA+ exam is a globally targeted course for intermediate-level security knowledge & skills. Although no specific prerequisite needed for this course, the CompTIA CySA+ certification adheres to CompTIA Security+ or equivalent experience and has a technical and hands-on emphasis on IT security analytics. The CompTIA CySA+ examination is best suited for IT security analysts, threat intelligence analysts and vulnerability analysts. The learners will be certified on successful completion with the knowledge and skills of configuring, utilizing threat detection tools, ability of performing data analysis & will interpret the results for identifying threats, vulnerabilities, and risks in an organization that hamper achieving the end goals of securing & protecting systems and applications.

This course deals with a certification which is DoD Approved 8570 Baseline Certification and satisfies the requirements of DoD 8570 training.

What Will I Learn?

  • Application of environmental reconnaissance techniques by means of suitable tools & processes.
  • Able to analyze network reconnaissance results.
  • Implement/recommend the suitable response and countermeasure for a given network-based threat.
  • Know about the purpose of practices that are used to secure corporate environments.
  • Implement information security vulnerability management process.
  • Analyze outputs from a vulnerability scan.
  • Compare & contrast common vulnerabilities that are in the numerous targets of an organization.
  • Differentiate threat data or behavior for determining the impact of incidents.
  • Prepare a toolkit and make use of necessary forensics tools for an investigation.
  • Know the importance of communication in the incident response process.
  • Analyzing the common symptoms for choosing the best cyber security course of action that supports incident response.
  • Summarize the incident recovery & able to post-incident response process.
  • Describe the relationship between common policies, controls, frameworks and procedures.
  • Make use of data for recommending security issues remediation that are related to identity & access management.
  • Review security architecture & recommendations that are needed for implementing compensating controls.
  • Application security best practices utilization in the Software Development Life Cycle (SDLC).
  • Compare & contrast the common goal and reasons for usage of various cybersecurity tools & technologies.

Material Includes

  • Full-time: 09 March | Duration: 5 Days
  • Part-time: 07 March | Duration: 3 Months
  • 28 hours on-demand video
  • 11 articles
  • 1 downloadable resource
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion


  • 3-4 years of experience in information security or related field
  • Network+, Security+, or equivalent knowledge

Target Audience

  • Computer Science University students
  • Aspiring computer and IT technicians
  • Service Desk Analysts
  • Data Support Technicians
  • Computing Technicians
  • Technical Support Specialists
  • System Support Specialists
  • Associate Network Engineers
  • Help Desk Technicians