CS0-003 CompTIA Cybersecurity Analyst

Information and Technology

Register:
Anytime

Duration:
29 Hours

Price:
R2,070.00

This course will provide you with the necessary platform to gain hands on skills in fundamental computer technologies.

Description

Welcome to the Cyber Security Analyst (CySA+) Practice lab. After completion of this title, you will have gained hands-on experience in Cyber Security defense and Cyber Analytic techniques. By completing the modules, you will improve your practical skills in configuring and using threat detection tools, data analysis, identifying vulnerabilities, identifying threats, risks, securing and protecting applications and systems within an organization, as well as learning industry impact on security and technological risks. These same modules will help you understand the objectives and competencies required by the CompTIA CySA+ certification exam (CS0-002). CompTIA Cybersecurity Analyst (CySA+) is an intermediate certificate aimed at IT security analysts, vulnerability analysts, threat intelligence analysts, or IT professionals seeking to advance into the industry. This Practice Lab focuses on the practical aspects of the exam objectives, although it also contains theory content not based in the lab environment. No prior hands-on experience is required to use or complete this Practice Lab, however we assume that you know how to use a computer and that you are familiar with basic networking technologies and information security concepts.

Certification

Once you feel confident to take the CompTIA certification exam, you will need to follow the process below to register and pay for your exam. Online testing offers you the ease and convenience to test for your certification from any quiet, distraction-free and secure location at anytime.

  • Choose online testing if you want:
    • A secure and easy way to test from home, a closed-door office or any place that has a private area available to you
    • The flexibility to schedule your exam at any hour convenient to you
    • Technical support if something goes wrong during your exam session
  • For online testing, you’ll need a:
    • Quiet, enclosed, private location
    • Reliable device that meets system requirements and has a webcam
    • Strong, consistent internet connection with a minimum speed of 1 Mbps down/up
  • Exams are taken through PearsonVue, you will need to perform a systems test prior to writing your exam
  • Link the links to Create an account
  • Buy an exam voucher online and book your exam
  • Read the exam policies

Structure

  • MODULE 1 | Vulnerabilities
  • MODULE 2 | Attack Types
  • MODULE 3 | Information Gathering and Sharing
  • MODULE 4 | Supporting Organizational Security
  • MODULE 5 | Scripting
  • MODULE 6 | Threat Data
  • MODULE 7 | Types of Scanning
  • MODULE 8 | Types of Scanning
  • MODULE 9 | Web Application Scanners
  • MODULE 10 | Infrastructure Vulnerability Scanners
  • MODULE 11 | Enumeration
  • MODULE 12 | Wireless and Cloud Assessment Tools
  • MODULE 13 | Vulnerabilities in Specialized Technology
  • MODULE 14 | Log Monitoring and Review
  • MODULE 15 | Security Monitoring Activities
  • MODULE 16 | Data and Application Controls
  • MODULE 17 | Improving Network Security
  • MODULE 18 | Infrastructure Security
  • MODULE 19 | Identity and Access Management
  • MODULE 20 | Infrastructure Solutions
  • MODULE 21 | Automation Concepts
  • MODULE 22 | Importance of Incident Response
  • MODULE 23 | Initial Phases of Incident Response
  • MODULE 24 | Later Phases of Incident Response
  • MODULE 25 | Host Related Incident Compromise Indicators
  • MODULE 26 | Network and Application Related Incident Compromise Indicators
  • MODULE 27 | Digital Forensics Techniques
  • MODULE 28 | Certificate Management
  • MODULE 29 | Applying Security Concepts to Mitigate Risk
  • MODULE 30 | Frameworks, Controls, Policies and Procedures


Payment options available to you

Need more information about this course?

Complete the fields below to receive the course information pack.






    By providing us with your contact details, you agree to the use of your data as described in our terms and conditions to receive communications. You may opt out of receiving communications at any time.