CompTIA Cybersecurity Analyst (CySA )
About This Course
Skills You’ll Get
Get the support you need. Enroll in our Instructor-Led Course.
Interactive Lessons
17+ Interactive Lessons | 320+ Quizzes | 160+ Flashcards | 160+ Glossary of terms
Gamified TestPrep
85+ Pre Assessment Questions | 2+ Full Length Tests | 85+ Post Assessment Questions | 170+ Practice Test Questions
Hands-On Labs
30+ LiveLab | 29+ Video tutorials | 03:21+ Hours
Video Lessons
36+ Videos | 08:43+ Hours
Introduction
- What Does This Course Cover?
- Objectives Map for CompTIA Cybersecurity Analyst (CySA+) Exam CS0-002
Today’s Cybersecurity Analyst
- Cybersecurity Objectives
- Privacy vs. Security
- Evaluating Security Risks
- Building a Secure Network
- Secure Endpoint Management
- Penetration Testing
- Reverse Engineering
- The Future of Cybersecurity Analytics
- Summary
- Exam Essentials
Using Threat Intelligence
- Threat Data and Intelligence
- Threat Classification
- Attack Frameworks
- Applying Threat Intelligence Organizationwide
- Summary
- Exam Essentials
Reconnaissance and Intelligence Gathering
- Mapping and Enumeration
- Passive Footprinting
- Gathering Organizational Intelligence
- Detecting, Preventing, and Responding to Reconnaissance
- Summary
- Exam Essentials
Designing a Vulnerability Management Program
- Identifying Vulnerability Management Requirements
- Configuring and Executing Vulnerability Scans
- Developing a Remediation Workflow
- Overcoming Risks of Vulnerability Scanning
- Vulnerability Scanning Tools
- Summary
- Exam Essentials
Analyzing Vulnerability Scans
- Reviewing and Interpreting Scan Reports
- Validating Scan Results
- Common Vulnerabilities
- Summary
- Exam Essentials
Cloud Security
- Understanding Cloud Environments
- Operating in the Cloud
- Cloud Infrastructure Security
- Summary
- Exam Essentials
Infrastructure Security and Controls
- Understanding Defense-in-Depth
- Improving Security by Improving Controls
- Analyzing Security Architecture
- Summary
- Exam Essentials
Identity and Access Management Security
- Understanding Identity
- Threats to Identity and Access
- Identity as a Security Layer
- Federation and Single Sign-On
- Summary
- Exam Essentials
Software and Hardware Development Security
- Software Assurance Best Practices
- Designing and Coding for Security
- Software Security Testing
- Hardware Assurance Best Practices
- Summary
- Exam Essentials
Security Operations and Monitoring
- Security Monitoring
- Summary
- Exam Essentials
Building an Incident Response Program
- Security Incidents
- Phases of Incident Response
- Building the Foundation for Incident Response
- Creating an Incident Response Team
- Coordination and Information Sharing
- Classifying Incidents
- Summary
- Exam Essentials
Analyzing Indicators of Compromise
- Analyzing Network Events
- Investigating Host-Related Issues
- Investigating Service and Application-Related Issues
- Summary
- Exam Essentials
Performing Forensic Analysis and Techniques
- Building a Forensics Capability
- Understanding Forensic Software
- Conducting Endpoint Forensics
- Network Forensics
- Cloud, Virtual, and Container Forensics
- Conducting a Forensic Investigation
- Forensic Investigation: An Example
- Summary
- Exam Essentials
Containment, Eradication, and Recovery
- Containing the Damage
- Incident Eradication and Recovery
- Wrapping Up the Response
- Summary
- Exam Essentials
Risk Management
- Analyzing Risk
- Managing Risk
- Security Controls
- Summary
- Exam Essentials
Policy and Compliance
- Understanding Policy Documents
- Complying with Laws and Regulations
- Adopting a Standard Framework
- Implementing Policy-Based Controls
- Security Control Verification and Quality Control
- Summary
- Exam Essentials
Today’s Cybersecurity Analyst
- Setting up a Honeypot on Kali Linux
- Using the iptables Command to Create a Personal Firewall in Linux
Reconnaissance and Intelligence Gathering
- Using the hping Program
- Scanning the Local Network
- Performing Reconnaissance on a Network
- Identifying Search Options in Metasploit
- Making Syslog Entries Readable
- Using nslookup for Passive Reconnaissance
Designing a Vulnerability Management Program
- Conducting Vulnerability Scanning Using Nessus
- Using OWASP ZAP
- Inspecting the Vulnerability in the Echo Server's Source Code
- Performing Session Hijacking Using Burp Suite
- Using Nikto
- Performing Vulnerability Scanning Using OpenVAS
Analyzing Vulnerability Scans
- Attacking a Website Using XSS Injection
- Exploiting a Website Using SQL Injection
- Performing a MITM Attack
- Detecting Rootkits
Software and Hardware Development Security
- Encrypting and Decrypting Messages Using Kleopatra
- Encrypting and Decrypting a File Using AES Crypt
Security Operations and Monitoring
- Downloading and Installing Wireshark
Analyzing Indicators of Compromise
- Configuring Snort
- Simulating the DDoS Attack
- Confirming the Spoofing Attack in Wireshark
- Capturing a Packet Using Wireshark
- Performing a Memory-Based Attack
- Examining Audited Events
- Enabling Logging for Audited Objects
Performing Forensic Analysis and Techniques
- Using the MD5 Hash Algorithm
- Using Apktool to Decode and Analyze the apk file