ITC 108 – Cybersecurity Analyst (CySA+)


Get CompTIA CySA+ Certified

Computing Technology Industry Association (CompTIA) CySA+ (Cybersecurity Analyst)

Enroll For this course!

ITC 108 - Cybersecurity Analyst (CySA+)

What you will learn

As organisations rely ever more heavily on their computer systems in their day-to-day business activities, it becomes increasingly important to ensure that those systems are kept secure. Upon completion of this course, you will have gained the skills and knowledge needed to keep your company’s systems safe from online threats such as hackers who can do untold harm to virtually any organisation.

The CompTIA Cybersecurity Analyst (CySA+) course will teach security professionals to configure and use threat detection tools, perform data analysis and interpret the results in order to identify vulnerabilities, threats and risks to your organisation’s computer systems.

Cybersecurity Analyst (CySA+) Course Assessment

The Cybersecurity Analyst (CySA+) course deals with the behavioural analytics skills that are used to identify and combat malware and other advanced threats.

To gain the CompTIA Cybersecurity Analyst qualification the following exam must be passed:

  • (CS0-001): Cybersecurity Analyst

CompTIA Cybersecurity Analyst (CySA+) Requirements

Although there are no formal prerequisites, it is recommended that you earn your CompTIA Security+ qualification before studying the CompTIA Cybersecurity Analyst course.

Career Path Opportunities

The online CompTIA Cybersecurity Analyst (CySA+) course is suited for anyone looking to work in any of the following roles:

  • Cybersecurity Analyst
  • Security Engineer
  • Security Intelligence Analyst
  • Threat Intelligence Analyst
  • Cybersecurity Manager

Benefits available to you with this course

  • Recruitment Resource Pack
  • Dedicated Account Manager
  • Student Care Team
  • CV Review & Optimization
  • Completion Certificate
  • 24/7 Anytime Access
  • Practice Questions

QUESTION For how long will my CompTIA Cybersecurity Analyst (CySA+) certification be valid?

The CompTIA Security+ certification is valid for three (3) years from the date on which you become certified.

QUESTION Will I be able to study this course from home?

Yes, the CompTIA Cybersecurity Analyst course can be studied from your own home, giving you the chance to study at a pace that suits you best.

QUESTION What is the format of the CompTIA Cybersecurity Analyst (CySA+) exam?

The CompTIA Cybersecurity Analyst (CySA+) exam will consist of 85 multiple choice and performance-based questions. You will have 165 minutes to achieve a passing score of 750 (on a scale of 100-900).

ITC 108 – Cybersecurity Analyst (CySA+)

Assessing Information Security Risk
1.1 Identify the Importance of Risk Management
1.2 Assess Risk
1.3 Mitigate Risk
1.4 Integrate Documentation into Risk Management
Analysing the Threat Landscape
2.1 Classify Threats and Threat Profiles
2.2 Perform Ongoing Threat Research
Analysing Reconnaissance Threats to Computing and Network Environments
3.1 Implement Threat Modeling
3.2 Assess the Impact of Reconnaissance Incidents
3.3 Assess the Impact of Social Engineering
Analysing Attacks on Computing and Network Environments
4.1 Assess the Impact of System Hacking Attacks
4.2 Assess the Impact of Web-Based Attacks
4.3 Assess the Impact of Malware
4.4 Assess the Impact of Hijacking and Impersonation Attacks
4.5 Assess the Impact of DoS Incidents
4.6 Assess the Impact of Threats to Mobile Security
4.7 Assess the Impact of Threats to Cloud Security
Analysing Post-Attack Techniques
5.1 Assess Command and Control Techniques
5.2 Assess Persistence Techniques
5.3 Assess Lateral Movement and Pivoting Techniques
5.4 Assess Data Exfiltration Techniques
5.5 Assess Anti-Forensics Techniques
Managing Vulnerabilities in the Organisation
6.1 Implement a Vulnerability Management Plan
6.2 Assess Common Vulnerabilities
6.3 Conduct Vulnerability Scans
Implementing Penetration Testing to Evaluate Security
7.1 Conduct Penetration Tests on Network Assets
7.2 Follow Up on Penetration Testing
Collecting Cybersecurity Intelligence
8.1 Deploy a Security Intelligence Collection and Analysis Platform
8.2 Collect Data from Network-Based Intelligence Sources
8.3 Collect Data from Host-Based Intelligence Sources
Analysing Log Data
9.1 Use Common Tools to Analyse Logs
9.2 Use SIEM Tools for Analysis
9.3 Parse Log Files with Regular Expressions
Performing Active Asset and Network Analysis
10.1 Analyse Incidents with Windows-Based Tools
10.2 Analyse Incidents with Linux-Based Tools
10.3 Analyse Malware
10.4 Analyse Indicators of Compromise
Responding to Cybersecurity Incidents
11.1 Deploy an Incident Handling and Response Architecture
11.2 Mitigate Incidents
11.3 Prepare for Forensic Investigation as a CSIRT
Investigating Cybersecurity Incidents
12.1 Apply a Forensic Investigation Plan
12.2 Securely Collect and Analyse Electronic Evidence
12.3 Follow Up on the Results of an Investigation
Addressing Security Architecture Issues
12.1 Remediate Identity and Access Management Issues
12.2 Implement Security During the SDLC