Got a question? Call 1800 853 276   |   
Cyber Security Category

CompTIA Cybersecurity Analyst (CySA+)

  • Length 5 days
  • Price $4290 inc GST
  • Version CS0-002
Course overview
View dates &
book now
  • Register interest

Why study this course

CompTIA CySA+ applies behavioral analytics to networks to improve the overall state of security through identifying and combating malware and advanced persistent threats (APTs), resulting in an enhanced threat visibility across a broad attack surface.

CySA+ will validate an IT professional’s ability to proactively defend and continuously improve the security of an organisation. In response to a rapidly evolving cybersecurity environment, the updated CompTIA CySA+ (CS0-002) covers the most up-to-date core cybersecurity analyst skills while emphasising software and application security, automation, threat hunting, and IT regulatory

This five-day instructor-led training course is an Intermediate Level CompTIA security course. Attending this course will prepare you for the CompTIA Cybersecurity Analyst (CySA+) exam (CS0-002).

Aligns to certification

Request Course Information

By submitting an enquiry, you agree to our privacy policy and receiving email and other forms of communication from us. You can opt-out at any time.


What you’ll learn

On course completion, you will be able to:

  • Identify tools and techniques used to perform an environmental reconnaissance of a target network or security system

  • Collect, analyse and interpret security data from multiple log and monitoring sources

  • Use network host and web application vulnerability assessment tools and interpret the results to provide effective mitigation

  • Understand and remediate identity management, authentication and access control issues

  • Participate in a senior role within an incident response team and use forensic tools to identify the source of an attack

  • Understand the use of frameworks, policies and procedures and report on security architecture with recommendations for effective compensating controls


CompTIA at DDLS

CompTIA is the voice of the world’s information technology (IT) industry. A non-profit association, CompTIA offers IT professionals vendor neutral, industry-leading IT certifications. DDLS is proud to be a CompTIA Authorised Training Partner – offering A+, Security +, Linux+, Network+.


Stay ahead of the technology curve

Don’t let your tech outpace the skills of your people

Quality instructors and content

Expert instructors with real world experience and the latest vendor- approved in-depth course content.

Partner-Preferred Supplier

Chosen and awarded by the world’s leading vendors as preferred training partner.

Ahead of the technology curve

No matter your chosen technologies or platforms, we can help you stay one step ahead.

Who is the course for?

Security Analysts, Vulnerability Analysts, Security Engineer, Cybersecurity Specialist, Security Operations Centre (SOC) Analysts

We can also deliver and customise this training course for larger groups – saving your organisation time, money and resources. For more information, please contact us on 1800 853 276.


Course subjects

THREAT AND VULNERABILITY MANAGEMENT
Analyse and apply proactive threat intelligence to support organisational security and perform vulnerability management activities.

  • Explain the importance of threat data and intelligence

  • Given a scenario, utilise threat intelligence to support organisational security

  • Given a scenario, perform vulnerability management activities

  • Given a scenario, analyse the output from common vulnerability assessment tools

  • Explain the threats and vulnerabilities associated with specialised technology

  • Explain the threats and vulnerabilities associated with operating in the cloud

  • Given a scenario, implement controls to mitigate attacks and software vulnerabilities

SOFTWARE AND SYSTEMS SECURITY
Apply security solutions for infrastructure management and explain software & hardware assurance best practices.

  • Given a scenario, apply security solutions for infrastructure management

  • Explain software assurance best practices

  • Explain hardware assurance best practices

SECURITY OPERATIONS AND MONITORING
Analyse data as part of continuous security monitoring activities and implement configuration changes to existing controls to improve security.

  • Given a scenario, analyse data as part of security monitoring activities

  • Given a scenario, implement configuration changes to existing controls to improve security

  • Explain the importance of proactive threat hunting

  • Compare and contrast automation concepts and technologies

INCIDENT RESPONSE
Analyse and apply the appropriate incident response procedure, analyse potential indicators of compromise, and utilise basic digital forensics techniques.

  • Explain the importance of the incident response process

  • Given a scenario, apply the appropriate incident response procedure

  • Given an incident, analyse potential indicators of compromise

  • Given a scenario, utilise basic digital forensics techniques

COMPLIANCE AND ASSESSMENT
Apply security concepts in support of organisational risk mitigation and understand the importance of frameworks, policies, procedures, and controls.

  • Understand the importance of data privacy and protection

  • Given a scenario, apply security concepts in support of organisational risk mitigation

  • Explain the importance of frameworks, policies, procedures, and controls


Prerequisites

A+, Network+, Security+ (or equivalent knowledge/skills) are highly recommended.

As a minimum attendees must:

  • Know basic network terminology and functions (such as OSI Model, Topology, Ethernet, Wi-Fi, switches, routers)

  • Understand TCP/IP addressing, core protocols, and troubleshooting tools

  • Be able to identify network attack strategies and defenses

  • Know the technologies and uses of cryptographic standards and products

  • Be able to identify network- and host-based security technologies and practices

  • Be able to describe the standards and products used to enforce security on web and communications technologies


Terms & Conditions

The supply of this course by DDLS is governed by the booking terms and conditions. Please read the terms and conditions carefully before enrolling in this course, as enrolment in the course is conditional on acceptance of these terms and conditions.



Request Course Information

By submitting an enquiry, you agree to our privacy policy and receiving email and other forms of communication from us. You can opt-out at any time.



Offers

Microsoft & CompTIA Cyber Security Ops Analyst Bundle
Introducing the latest Cyber Security Ops Analyst offer. DDLS caters for all levels of your organisation - from front line staff to highly experienced senior cyber security professionals. We’ve partnered with the leading vendors to provide the most comprehensive cyber security training solution in the industry.