This course will prepare students for the CompTIA CySA+ exam. In this course, students will get an understanding of how to manage threats & vulnerabilities, address attacks & software vulnerability mitigation, infrastructure management, hardware & software assurance and more.
This first chapter introduces the instructor, the course, and the course objectives. Chapter 1 then begins with cybersecurity and its elements starting with defining threats and vulnerabilities, then discusses how the rest of this chapter and course address identifying, mitigating and handling the risks. This chapter focuses on the knowledge of the first domain of the cyber security analyst + objectives. Chapter 1 content starts with threat data and intelligence, and how to gather and share that within the analyst community and how to use threat intelligence. This chapter then explores vulnerability management of vulnerabilities, and how to use assessment tools.
Chapter 2 looks at threats and vulnerabilities associated with more specialized technologies including cloud environments (especially enterprise level), wireless and mobile clients, and other electronic components. This chapter looks at the technologies, as well as the associated vulnerabilities, using appropriate assessment
tools for the technologies.
Chapter 3 looks at attacks, attack types, and explores ways to deal with these attacks and strategies to identify and handle software vulnerabilities. This chapter discusses the reality and scale of cyber-attacks, evolving vulnerabilities, opportunism of attackers, trends, and tools used by both attackers and cyber analysts, and proposes offensive rather than defensive reactionary approaches to protect clients, brands and
operations.
Chapter 4 shifts the focus towards infrastructure management including the architectural systems attackers target (and we conversely defend). This chapter stresses the importance of infrastructure awareness (including perimeters, limitations, and common architectures), security implications, and network security solutions. Chapter 4 also introduces technologies and policies used to identify, authenticate, and authorize users, as well as additional technologies you can use to secure your infrastructure.
Chapter 5 continues the conversation about infrastructure management expanding to discussions of hardware and software assurance best practices and mitigating the risks associated with these devices and programs. This includes strategies for securing physical devices in case of theft or compromise and additionally protecting processes and software from threats.
Chapter 6 looks at monitoring security options in diverse (and large) modern corporate environments. This is a challenge due to the amount, size, and diversity of data used and produced. Security monitoring processes and stations can collect and understand enterprise-level information. Using security data analytics, endpoint and network analysis, and email analysis cyber analysts can secure and approve this information.
Chapter 7 explores a number of things related to security changes including organizational structures that need modification in an ongoing basis to match and counter current security threats based on monitoring and information collected. The sections look at how to implement changes consistently across the enterprise; ways to “hunt” and seek out threats including the life cycle and steps; and automating security to ensure consistency and efficiency.
Chapter 8 introduces incident response and the idea that even though security teams minimize risks, mitigation plans are necessary. This chapter shares steps that need to be taken to address incidents when they occur (aka Incident Response Process/ Procedures). The sections discuss the importance if incident response; creating, documenting, and communicating Incident Response Procedures; and analyzing the
Indicators of Compromise (IOC) including the tools used for it (digital forensic techniques).
Chapter 9 covers compliance and assessment focusing on importance of privacy, data privacy, access issues (within an organization) and protection of enterprise and personal information. This chapter discusses risks of data and privacy violations, and some of the key requirements around privacy for this certification as well as positions in cyber security. The sections define the differences between privacy and security; identifies common data types; describes the laws that govern security and privacy protection; explores technical and non-technical approaches for protecting data; and additionally addresses risk management and organizational policies and procedures
CompTIA Cybersecurity Analyst (CySA+) is an IT workforce certification that applies behavioral analytics to networks and devices to prevent, detect and combat cybersecurity threats through continuous security monitoring.
The BLS projected a growth of 31% for Information Security Analysts between 2019 and 2029. This growth rate is much faster than the average for all occupations, indicating a strong job outlook for professionals in this field.
The BLS reported that the median annual wage for Information Security Analysts was $103,590 in May 2020. The lowest 10% earned less than $59,450, and the highest 10% earned more than $163,300.
Online On-Demand lectures by top instructors who are industry subject matter experts. Learn from your computer, tablet as well as mobile devices.
You will be assigned an academic coach to guide you through the coursework when you enroll. Your academic coach is available via Zoom live, Text and Emails during both weekdays and weekends.
Meeting with our instructors and subject matter experts one on one during both weekdays and weekends via flex schedules of live Zoom mentoring sessions.
Flexible online coaching and live mentoring combined with on-demand training gives you ultimate control of your learning experience.
Our simulation software is used by students to develop practical skills and knowledge relative to program they are taking.
Our award-winning test prep engine provides you with the most relevant test questions to fully prepare you for the cert exam
Flexible online coaching and live mentoring combined with on-demand training gives you ultimate control of your learning experience.
Reinforce your knowledge by accessing REAL equipment online with no restrictions and full administrator privileges, live in real time.
Our award-winning test prep engine provides you with the most relevant test questions to fully prepare you for the cert exam
Flexible online coaching and live mentoring combined with on-demand training gives you ultimate control of your learning experience.
With our Programs and Courses you have the ability to earn Contact Hours or PDU’s that are applicable to your industry.
Our award-winning test prep engine provides you with the most relevant test questions to fully prepare you for the cert exam
Flexible online coaching and live mentoring combined with on-demand training gives you ultimate control of your learning experience.
You will have up to 12 month access to your course to help you further prepare for your certification after completion.
Our award-winning test prep engine provides you with the most relevant test questions to fully prepare you for the cert exam
From the moment you reach out to Career Academy, our education consultants will work with you to find scholarship opportunities and the best funding options available.
Start Here to request your training catalogs & Credentialing Assistance Funding information
Career Academy offers online programs for IT, Project Management, Certified Logistics and Healthcare careers. Our online training includes on-demand lectures, real hands-on labs and flexible mentoring sessions where you interact online live with certified subject matter experts.
CareerAcademy.com Inc. © All Rights Reserved. Copyright 2023.
PMI, Project Management Institute, Project Management Professional (PMP), PMP, Certified Associate in Project Management (CAPM), CAPM, PMBOK, PgMP, PULSE OF THE PROFESSION, THE PMI TALENT TRIANGLE and The PMI REP Logo are registered marks of the Project Management Institute, Inc.
The Department of Defense and the Department of the Army are neither affiliated with nor endorses this organization.
About Career Academy
Enjoy a learning environment that allows for live interaction as you are progressing through your training and hands-on labs.
Flexible live online class schedule combined with on-demand training gives you ultimate control of your learning experience.
Our live instructors guide you through the training and assist you with your hands-on labs during the virtual classroom sessions.
Project Management
Lean Six Sigma
Logistics
Medical & Healthcare
Nutrition