Course Details
Course Outline
1 - Assessing Information Security Risk
Identify the Importance of Risk ManagementAssess RiskMitigate RiskIntegrate Documentation into Risk Management
2 - Analyzing Reconnaissance Threats to Computing and Network Environments
Assess the Impact of Reconnaissance IncidentsAssess the Impact of Social Engineering
3 - Analyzing Attacks on Computing and Network Environments
Assess the Impact of System Hacking AttacksAssess the Impact of Web-Based AttacksAssess the Impact of MalwareAssess the Impact of Hijacking and Impersonation AttacksAssess the Impact of DoS IncidentsAssess the Impact of Threats to Mobile SecurityAssess the Impact of Threats to Cloud Security
4 - Analyzing Post-Attack Techniques
Assess Command and Control TechniquesAssess Persistence TechniquesAssess Lateral Movement and Pivoting TechniquesAssess Data Exfiltration TechniquesAssess Anti-Forensics Techniques
5 - Managing Vulnerabilities in the Organization
Implement a Vulnerability Management PlanAssess Common VulnerabilitiesConduct Vulnerability ScansConduct Penetration Tests on Network Assets
6 - Collecting Cybersecurity Intelligence
Deploy a Security Intelligence Collection and Analysis PlatformCollect Data from Network-Based Intelligence SourcesCollect Data from Host-Based Intelligence Sources
7 - Analyzing Log Data
Use Common Tools to Analyze LogsUse SIEM Tools for Analysis
8 - Performing Active Asset and Network Analysis
Analyze Incidents with Windows-Based ToolsAnalyze Incidents with Linux-Based ToolsAnalyze MalwareAnalyze Indicators of Compromise
9 - Responding to Cybersecurity Incidents
Deploy an Incident Handling and Response ArchitectureMitigate IncidentsPrepare for Forensic Investigation as a CSIRT
10 - Investigating Cybersecurity Incidents
Apply a Forensic Investigation PlanSecurely Collect and Analyze Electronic EvidenceFollow Up on the Results of an Investigation
11 - Addressing Security Architecture Issues
Remediate Identity and Access Management IssuesImplement Security During the SDLC
Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Who is it For?
Target Audience
This course is designed primarily for cybersecurity practitioners who perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. In addition, the course ensures that all members of an IT team—everyone from help desk staff to the Chief Information Officer—understand their role in these security processes.
Prerequisites
Other Prerequisites
Network+, Security+ or equivalent knowledge. Minimum of 3-4 years of hands-on information security or related experience. While there is no required prerequisite, CySA+ is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus.
Network+, Security+ or equivalent knowledge. Minimum of 3-4 years of hands-on information security or related experience. While there is no required prerequisite, CySA+ is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus.