CompTIA Cybersecurity Analyst (CySA+)
This CompTIA CySA+ exam is a globally targeted course for intermediate-level security knowledge & skills. Although no specific prerequisite needed for this course, the CompTIA CySA+ certification adheres to CompTIA Security+ or equivalent experience and has a technical and hands-on emphasis on IT security analytics. The CompTIA CySA+ examination is best suited for IT security analysts, threat intelligence analysts and vulnerability analysts. The learners will be certified on successful completion with the knowledge and skills of configuring, utilizing threat detection tools, ability of performing data analysis & will interpret the results for identifying threats, vulnerabilities, and risks in an organization that hamper achieving the end goals of securing & protecting systems and applications.
This course deals with a certification which is DoD Approved 8570 Baseline Certification and satisfies the requirements of DoD 8570 training.
What Will I Learn?
- Application of environmental reconnaissance techniques by means of suitable tools & processes.
- Able to analyze network reconnaissance results.
- Implement/recommend the suitable response and countermeasure for a given network-based threat.
- Know about the purpose of practices that are used to secure corporate environments.
- Implement information security vulnerability management process.
- Analyze outputs from a vulnerability scan.
- Compare & contrast common vulnerabilities that are in the numerous targets of an organization.
- Differentiate threat data or behavior for determining the impact of incidents.
- Prepare a toolkit and make use of necessary forensics tools for an investigation.
- Know the importance of communication in the incident response process.
- Analyzing the common symptoms for choosing the best cyber security course of action that supports incident response.
- Summarize the incident recovery & able to post-incident response process.
- Describe the relationship between common policies, controls, frameworks and procedures.
- Make use of data for recommending security issues remediation that are related to identity & access management.
- Review security architecture & recommendations that are needed for implementing compensating controls.
- Application security best practices utilization in the Software Development Life Cycle (SDLC).
- Compare & contrast the common goal and reasons for usage of various cybersecurity tools & technologies.