Laptop open to ctc academy

CompTIA CySA+

This online, instructor-led training course provides the knowledge needed to defend through incident detection and response at the intermediate-skills level of the cybersecurity career pathway. In this course, students will learn best practices in threat management, security architecture, vulnerability management, and cyber-incident response.

CompTIA CySA+ meets the ISO 17024 standard and is approved by the U.S. Department of Defense to fulfill Directive 8570.01-M requirements. It is compliant with government regulations under the Federal Information Security Management Act (FISMA).

Regulators and government agencies rely on ANSI accreditation, because of the confidence and trust it provides in the outputs of an accredited program.

We make it easier than ever to certify your team and meet requirements.

live-online

The CompTIA CySA+ boot camp is live-online in a couple of different formats. Most camps are 1 to 2 weeks long. If you miss a day of the live-online, you can get access to the recording of that day that same night. You have access for 12 months of any live-online CompTIA CySA+ boot camps.

on-demand

When you sign up for the CompTIA CySA+ boot camp you get access to the previous live-online CompTIA CySA+ boot camp along with all the study material, practice exams and access to the instructor so you can get started right away. You will have access for 12 months to all live-online and recorded CompTIA CySA+ boot camps. Learn at your own pace whenever and wherever you want, even if you work full-time.

The Full Package

what's included

Our mission is to equip you and your team with everything you need to succeed, enhance your skills, and pass your CompTIA CySA+ exam!

  • The hours needed to take the
    CompTIA CySA+
    exam
  • Flexible times on live-online boot camps
  • 12-month access to all live and on-demand content
  • Practice exams with unlimited attempts
  • Virtual labs and study guides
View all features
CompTIA CySA+
[CS0-002]
why choose pmp?

pmp It adds value

CIO magazine ranked the PMP as the top project management certification in North America because it demonstrates you have the specific skills employers seek, dedication to excellence and the capacity to perform at the highest levels.

pmp delivers benefits

The median salary for project professionals in North America is 25% higher than those without it.

PMP proves you work smarter

It shows you have the skills to drive business results and increase your organization’s impact in the office and around the world.
Course
CySA+
Exam
[CS0-002]
Hours to Complete
14.5
Formats Offered
[Live-online] [On-demand]
Vendor
CompTIA

Skills Learned

After completing this online training course, students will be able to:
  • Assess information security risk in computing and network environments.
  • Analyze reconnaissance threats to computing and network environments.
  • Analyze attacks on computing and network environments.
  • Analyze post-attack techniques on computing and network environments.
  • Implement a vulnerability management program.
  • Collect cybersecurity intelligence.
  • Analyze data collected from security and event logs.
  • Perform active analysis on assets and networks.
  • Respond to cybersecurity incidents.
  • Investigate cybersecurity incidents.
  • Address security issues with the organization's technology architecture.

Who should attend?

This course is appropriate for computer technicians, IT support staff, and help desk professionals with 6 to 12 months of hands-on experience. It will also help prepare professionals seeking CompTIA CySA+ certification.

Prerequisites

None but we recommend that students have their Network+ and Security+ certifications or equivalent knowledge.

Course Outline

01. Introduction
  • Introduction to CySA+

02. Threat and Vulnerability Management
  • Threat Intelligence
  • Classifying Threat Actors
  • Threat Modelling and Research
  • Attack Frameworks
  • Vulnerability Management
  • Specialized Technology
  • Cloud Threats and Vulnerabilities
  • Memory Handling Bugs and Attacks
  • Improper Input Handling and Injection Attacks
  • Password Spraying and Credential Stuffing

03. Software and Systems Security
  • Infrastructure Management
  • Identity and Access Management
  • Software Development Concepts
  • Secure Coding Best Practices
  • Service Oriented Architecture
  • Hardware Security

04. Security Operations and Monitoring
  • Endpoint Security Monitoring
  • Network Security Monitoring
  • Log Review
  • Email Analysis
  • Further Security Monitoring Concepts
  • Security Configurations

05. Incident Response
  • Incident Response Considerations
  • Incident Response Procedures
  • Incident Response – Network IOCs
  • Incident Response – Host IOCs
  • Incident Response – Application IOCs
  • Basic Forensic Techniques

06. Compliance and Assessment
  • Data Privacy and Protection
  • Organizational Risk Mitigation
  • Frameworks, Policies, and Procedures

07. Demos
  • Security Lab Setup
  • Expanding the Security Lab with pfSense
  • Injection in DVWA
  • Stored XSS in DVWA
  • Reflected XSS in DVWA
  • nmap
  • hping
  • Wireshark
  • Cat, Head, and Tail
  • grep
  • SSH honeypot
  • Scoutsuite, Prowler, and Pacu
  • Making and Verifying Forensic Copies with dd and sha256sum
  • Common Linux Log Files
  • Windows Event Viewer

We're one of the leading IT certification
training and boot camp providers.

50,000+

certified students

250+

corporate partners

25

years of experience

Have a question?

Send us a message below and we will be more than happy to provide you with any information you need.
Name
Email
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.