Pembrokeshire College, Merlins Bridge, Haverfordwest, Pembrokeshire, SA61 1SZ

Blog

CompTIA Cybersecurity Analyst (CySA+)

CompTIA Cybersecurity Analyst (CySA+)

CompTIA Cybersecurity Analyst (CySA+)

CompTIA CySA+

CompTIA Cybersecurity Analyst (CySA+) certification is an intermediate-level certification designed to demonstrate the knowledge and competencies of a security analyst or specialist with four years’ experience in the field.

£3,114.00

Out of stock

Is this course right for me?

CompTIA is a not-for-profit trade association with the purpose of advancing the interests of IT professionals and IT channel organizations, and its industry-leading IT certifications are an important part of that mission. CompTIA Cybersecurity Analyst (CySA+) certification is an intermediate-level certification designed to demonstrate the knowledge and competencies of a security analyst or specialist with four years’ experience in the field.

This course covers the duties of cybersecurity analysts who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization’s security, collect and Analyse cybersecurity intelligence, and handle incidents as they occur. The course will also prepare you for the CompTIA CySA+ (Exam CS0-002) certification examination.

After you complete this course, you will be able to:

  • Assess and respond to security threats and operate a system and network security analysis platform.
  • Collect and use cybersecurity intelligence and threat data.
  • Identify modern cybersecurity threat factors types and tactics, techniques and procedures.
  • Analyse data collected from security and event logs and network packet captures.
  • Respond to and investigate cybersecurity incidents using forensic analysis techniques.
  • Assess information security risk in computing and network environments.
  • Implement a vulnerability management program.
  • Address security issues with an organization ‘s network architecture.
  • Understand the importance of data governance controls.
  • Address security issues with an organization ‘s software development life cycle.
  • Address security issues with an organization ‘s use of cloud and service-oriented architecture.
  • No formal entry requirements

Lesson 1: Explaining the Importance of Security Controls and Security Intelligence

  • Topic 1A: Identify Security Control Types
  • Topic 1B: Explain the Importance of Threat Data and Intelligence

Lesson 2: Utilizing Threat Data and Intelligence

  • Topic 2A: Classify Threats and Threat Actor Types
  • Topic 2B: Utilize Attack Frameworks and Indicator Management
  • Topic 2C: Utilize Threat Modelling and Hunting Methodologies

Lesson 3: Analysing Security Monitoring Data

  • Topic 3A: Analyse Network Monitoring Output
  • Topic 3B: Analyse Appliance Monitoring Output
  • Topic 3C: Analyse Endpoint Monitoring Output
  • Topic 3D: Analyse Email Monitoring Output

Lesson 4: Collecting and Querying Security Monitoring Data

  • Topic 4A: Configure Log Review and SIEM Tools
  • Topic 4B: Analyse and Query Logs and SIEM Data

Lesson 5: Utilizing Digital Forensics and Indicator Analysis Techniques

  • Topic 5A: Identify Digital Forensics Techniques
  • Topic 5B: Analyse Network-related IoCs
  • Topic 5C: Analyse Host-related IoCs
  • Topic 5D: Analyse Application-Related IoCs
  • Topic 5E: Analyse Lateral Movement and Pivot IoCs

Lesson 6: Applying Incident Response Procedures

  • Topic 6A: Explain Incident Response Processes
  • Topic 6B: Apply Detection and Containment Processes
  • Topic 6C: Apply Eradication, Recovery, and Post‑Incident Processes

Lesson 7: Applying Risk Mitigation and Security Frameworks

  • Topic 7A: Apply Risk Identification, Calculation, and Prioritization Processes
  • Topic 7B: Explain Frameworks, Policies, and Procedures

Lesson 8: Performing Vulnerability Management

  • Topic 8A: Analyse Output from Enumeration Tools
  • Topic 8B: Configure Infrastructure Vulnerability Scanning Parameters
  • Topic 8C: Analyse Output from Infrastructure Vulnerability Scanners
  • Topic 8D: Mitigate Vulnerability Issues

Lesson 9 Applying Security Solutions for Infrastructure Management

  • Topic 9A: Apply Identity and Access Management Security Solutions
  • Topic 9B: Apply Network Architecture and Segmentation Security Solutions
  • Topic 9C: Explain Hardware Assurance Best Practices
  • Topic 9D: Explain Vulnerabilities Associated with Specialized Technology

Lesson 10: Understanding Data Privacy and Protection

  • Topic 10A: Identify Non-Technical Data and Privacy Controls
  • Topic 10B: Identify Technical Data and Privacy Controls

Lesson 11: Applying Security Solutions for Software Assurance

  • Topic 11A: Mitigate Software Vulnerabilities and Attacks
  • Topic 11B: Mitigate Web Application Vulnerabilities and Attacks
  • Topic 11C: Analyse Output from Application Assessments

Lesson 12: Applying Security Solutions for Cloud and Automation

  • Topic 12A: Identify Cloud Service and Deployment Model Vulnerabilities
  • Topic 12B: Explain Service-Oriented Architecture
  • Topic 12C: Analyse Output from Cloud Infrastructure Assessment Tools
  • Topic 12D: Compare Automation Concepts and Technologies

Learners are able to complete either the full qualification or certain units or elements through the medium of Welsh/bilingually. Visit our Welsh Language in the College page to find out what else is available to you.

  • Written examination
  • You will need to bring your own device/laptop for this course, click here to find out more

Any costs above are approximate and may change. For information on refunds and course cancellations please see the fee policy.

  • No additional costs
  • Personal Learning Account (PLA) funding may be available for this course (subject to eligibility). Click here for more information or contact central@pembrokeshire.ac.uk

Any costs above are approximate and may change. For information on refunds and course cancellations please see the fee policy.

Disclaimer:
The College takes all reasonable steps to provide the educational services and courses as described above. Details are correct at the time of editing but may be subject to change without prior notice. Courses will not run if student numbers are insufficient. The College has the right to refuse individuals entry to courses in certain circumstances. Prospective students may be advised of more suitable alternatives, if appropriate. The entry requirements stated are those that are normally required to undertake the programme of study.
Shopping cart close