Course features
- Duration
- Skill level
- Language
- Student Enrolled
- 5 Days
- Intermediate
- English
- 25
Program Description
CompTIA CySA+ Certification Training provided by MGT is a cybersecurity analyst certification that enables you to use analytics in the network to discover cybersecurity vulnerabilities in the environment. The behavioural analytical capabilities identify and detect malware, as well as safeguard and defend an organization’s applications and systems. MGT training makes learners very efficient in getting knowledge on advanced persistent threats as well as setting and using threat-detection technologies.
To earn your CompTIA Cybersecurity Analyst certification (CySA+), you’ll need to pass one certification exam:
EXAM CODES CS0-002
Program Outcome
In this course, you will assess and respond to security risks, as well as administer a platform for system and network security analysis. You will be able to:
- Assess information security risk in computing and network environments.
- Analyze reconnaissance threats to computing and network environments.
- Analyze attacks on computing and network environments.
- Analyze post-attack techniques on computing and network environments.
- Implement a vulnerability management program.
- Collect cybersecurity intelligence.
- Analyze data collected from security and event logs.
- Perform active analysis on assets and networks.
- Respond to cybersecurity incidents.
- Investigate cybersecurity incidents.
- Address security issues with the organization’s technology architecture.
SECTION 1.0: INTRODUCTION
1.1 Introduction to CyberDefense Pro
SECTION 2.0: THREAT INTELLIGENCE
2.1 Penetration Testing and Threat Hunting
2.2 Organizational Security
2.3 Security Controls
SECTION 3.0: RISK MITIGATION
3.1 Risk Identification Process
3.2 RiskCalculation
3.3 Risk Communication and Training
SECTION 4.0: SOCIAL AND PHYSICAL SECURITY
4.1 Social Engineering
4.2 Physical Security
4.3 Countermeasures and Prevention
SECTION 5.0: RECONNAISSANCE
5.1 Reconnaissance Overview
5.2 Reconnaissance Countermeasures
5.3 Scanning
SECTION 6.0: ENUMERATION
6.1 Enumeration Overview
6.2 Enumeration Countermeasures
SECTION 7.0: VULNERABILITY MANAGEMENT
7.1 Vulnerability Assessment
7.2 Vulnerability Management Life Cycle
7.3 Vulnerability Scoring Systems
7.4 Vulnerability Analysis
SECTION 8.0: IDENTITY AND ACCESS MANAGEMENT SECURITY (IAM)
8.1 Identity and Access Management Threats
8.2 Certificate Management
8.3 Privilege Escalation
8.4 Identity and Access Management Security
SECTION 9.0: CYBERSECURITY THREATS
9.1 Malware
9.2 Combat Malware
9.3 Sniffing
9.4 Session Hijacking
9.5 Denial of Service
9.6 SQL Injections
SECTION 10.0: INFRASTRUCTURE SECURITY
10.1 Intrusion Detection Systems
10.2 Firewalls
10.3 Honeypots and DNS Sinkholes
10.4 Web Servers
10.5 Network Access
10.6 Web Applications
10.7 Specialized Technology
SECTION 11.0: WIRELESS AND IOT SECURITY
11.1 Wireless Security
11.2 Bluetooth Security
11.3 Cloud Security
11.4 Mobile Device Security
11.5 Internet of Things Security
SECTION 12.0: INFRASTRUCTURE ANALYSIS
12.1 Log Review
12.2 Security Information and Event Management (SIEM)
12.3 Hardware Analysis
12.4 Asset and Change Management
12.5 Virtualization Management
SECTION 13.0: SOFTWARE ASSURANCE
13.1 Software Development Overview
13.2 Automation
SECTION 14.0: DATA ANALYSIS
14.1 Data Analysis and Protection
14.2 Hashing
14.3 Digital Forensics
14.4 Email Analysis