MIS Global Technologies

Course Price:

$ 4,250.00

CompTIA CySA+

Course features

Program Description


CompTIA CySA+ Certification Training provided by MGT is a cybersecurity analyst certification that enables you to use analytics in the network to discover cybersecurity vulnerabilities in the environment. The behavioural analytical capabilities identify and detect malware, as well as safeguard and defend an organization’s applications and systems. MGT training makes learners very efficient in getting knowledge on advanced persistent threats as well as setting and using threat-detection technologies.

To earn your CompTIA Cybersecurity Analyst certification (CySA+), you’ll need to pass one certification exam:

  • EXAM CODES CS0-002 

Program Outcome

In this course, you will assess and respond to security risks, as well as administer a platform for system and network security analysis. You will be able to:

  • Assess information security risk in computing and network environments.
  • Analyze reconnaissance threats to computing and network environments.
  • Analyze attacks on computing and network environments.
  • Analyze post-attack techniques on computing and network environments.
  • Implement a vulnerability management program.
  • Collect cybersecurity intelligence.
  • Analyze data collected from security and event logs.
  • Perform active analysis on assets and networks.
  • Respond to cybersecurity incidents.
  • Investigate cybersecurity incidents.
  • Address security issues with the organization’s technology architecture.

SECTION 1.0: INTRODUCTION

1.1  Introduction to CyberDefense Pro

SECTION 2.0: THREAT INTELLIGENCE

2.1  Penetration Testing and Threat Hunting
2.2  Organizational Security
2.3  Security Controls

SECTION 3.0: RISK MITIGATION

3.1  Risk Identification Process
3.2  RiskCalculation
3.3  Risk Communication and Training

SECTION 4.0: SOCIAL AND PHYSICAL SECURITY

4.1  Social Engineering
4.2  Physical Security
4.3  Countermeasures and Prevention

SECTION 5.0: RECONNAISSANCE

5.1  Reconnaissance Overview
5.2  Reconnaissance Countermeasures
5.3  Scanning

SECTION 6.0: ENUMERATION

6.1  Enumeration Overview
6.2  Enumeration Countermeasures

SECTION 7.0: VULNERABILITY MANAGEMENT

7.1  Vulnerability Assessment
7.2  Vulnerability Management Life Cycle
7.3  Vulnerability Scoring Systems
7.4  Vulnerability Analysis

SECTION 8.0: IDENTITY AND ACCESS MANAGEMENT SECURITY (IAM)

8.1  Identity and Access Management Threats
8.2  Certificate Management
8.3  Privilege Escalation
8.4  Identity and Access Management Security

SECTION 9.0: CYBERSECURITY THREATS

9.1  Malware
9.2  Combat Malware
9.3  Sniffing
9.4  Session Hijacking
9.5  Denial of Service
9.6  SQL Injections

SECTION 10.0: INFRASTRUCTURE SECURITY

10.1  Intrusion Detection Systems
10.2  Firewalls
10.3  Honeypots and DNS Sinkholes
10.4  Web Servers
10.5  Network Access
10.6  Web Applications
10.7  Specialized Technology

SECTION 11.0: WIRELESS AND IOT SECURITY

11.1  Wireless Security
11.2  Bluetooth Security
11.3  Cloud Security
11.4  Mobile Device Security
11.5  Internet of Things Security

SECTION 12.0: INFRASTRUCTURE ANALYSIS

12.1  Log Review
12.2 Security Information and Event Management (SIEM)
12.3  Hardware Analysis
12.4  Asset and Change Management
12.5  Virtualization Management

SECTION 13.0: SOFTWARE ASSURANCE

13.1  Software Development Overview
13.2  Automation
 

SECTION 14.0: DATA ANALYSIS

14.1  Data Analysis and Protection
14.2  Hashing
14.3  Digital Forensics
14.4  Email Analysis

Share:

Login

Email US

We are glad that you preferred to contact us. Please fill our short form and one of our friendly team members will contact you back.

    X
    CONTACT US