CompTIA Cybersecurity Analyst+

Similar documents
Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

CompTIA CSA+ Cybersecurity Analyst

Security+ SY0-501 Study Guide Table of Contents

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Course overview. CompTIA A+ Certification (Exam ) Official Study Guide (G186eng v036)

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

CompTIA IT Fundamentals

CompTIA A+ Accelerated course for & exams

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)

Course overview. CompTIA Network+ Certification (Exam N10-007) Study Guide (G525eng v038)

6 MILLION AVERAGE PAY. CYBER Security. How many cyber security professionals will be added in 2019? for popular indursty positions are

CompTIA Mobility+ Certification

CND Exam Blueprint v2.0

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

CompTIA CASP (Advanced Security Practitioner)

Course overview. CompTIA A+ Certification (Exam ) Official Study Guide (G186eng v036)

CompTIA Security+ Study Guide (SY0-501)

Administering System Center Configuration Manager

Administering System Center Configuration Manager and Intune

Administering System Center Configuration Manager

COMPUTER AND NETWORK SUPPORT TECHNICIAN PROGRAM

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

A guide to CompTIA training and certification DDLS Australia Pty Ltd

Training on CREST Practitioner Security Analyst (CPSA)

IT Foundations Networking Specialist Certification with Exam

IT Technician Pathways Course Guide

A: Administering System Center Configuration Manager

Comptia.Certkey.SY0-401.v by.SANFORD.362q. Exam Code: SY Exam Name: CompTIA Security+ Certification Exam

CompTIA Network+ (Exam N10-006)

CompTIA A+ Certification ( ) Study Guide Table of Contents

Descriptions for CIS Classes (Fall 2017)

Learn about the Fundamental building blocks that go into building a Windows Server infrastructure with Windows Server 2012.

System Center Course Administering System Center Configuration Manager. Length. Audience. 5 days

CompTIA IT Fundamentals:

Course overview CompTIA A Official Study Guide

CCNA Cybersecurity Operations. Program Overview

ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER

EC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

CompTIA Cybersecurity Analyst+ (CySA+) Course Outline. CompTIA Cybersecurity Analyst+ (CySA+) 17 Sep 2018

DIABLO VALLEY COLLEGE CATALOG

"Charting the Course... MOC A: Administering System Center Configuration Manager. Course Summary

Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010

SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH

Pearson CISSP Cert Guide with Labs. Course Outline. Pearson CISSP Cert Guide with Labs. 17 Oct

Course A: Administering System Center Configuration Manager

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY

A: Administering System Center Configuration Manager

The GenCyber Program. By Chris Ralph

May 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations

Advanced Security Tester Course Outline

A+ Certification. Course Description. Course Objectives. 9300; 5 Days, Instructor-led

Network Engineering/Cyber Security I & II

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Configuring BIG-IP ASM v12.1 Application Security Manager

Chapter 5: Vulnerability Analysis

External Supplier Control Obligations. Cyber Security

Required Textbook and Materials. Course Objectives. Course Outline

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

Cybersecurity Training

K12 Cybersecurity Roadmap

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS

A Measurement Companion to the CIS Critical Security Controls (Version 6) October

C T I A CERTIFIED THREAT INTELLIGENCE ANALYST. EC-Council PROGRAM BROCHURE. Certified Threat Intelligence Analyst 1. Certified

Certified Ethical Hacker V9

Ethical Hacking and Prevention

IoT & SCADA Cyber Security Services

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

Administering System Center 2012 Configuration Manager

Administering System Center Configuration Manager ( A)

: 20696C: Administering System Center Configuration Manager and Intune

CCNA Cybersecurity Operations 1.1 Scope and Sequence

ISSMP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

Certified Cyber Security Specialist

TestBraindump. Latest test braindump, braindump actual test

EC-Council - EC-Council Certified Security Analyst (ECSA) v8

CompTIA Network+ Study Guide Table of Contents

Certified Ethical Hacker (CEH)

CISA Training.

CompTIA A+ Certification Support Skills (2012 Objectives)

Implementing an Advanced Server Infrastructure

Strategic Infrastructure Security

Forensics and Active Protection

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

4/13/2018. Certified Analyst Program Infosheet

Microsoft Administering System Center Configuration Manager

Certified information Systems Security Professional(CISSP) Bootcamp

Training for the cyber professionals of tomorrow

Networking Fundamentals Training

Department of Management Services REQUEST FOR INFORMATION

Administering System Center 2012 Configuration Manager

Duration Level Technology Delivery Method Training Credits. System Center Configuration Manager

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

IC32E - Pre-Instructional Survey

ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER

Transcription:

CompTIA Cybersecurity Analyst+ Course CT-04 Five days Instructor-Led, Hands-on Introduction This five-day, instructor-led course is intended for those wishing to qualify with CompTIA CSA+ Cybersecurity Analyst Certification. CompTIA's CSA+ Certification is an intermediate-level certificate for IT professionals with previous experience of working in the field of IT security. The CompTIA CSA+ examination is designed for IT security analysts, vulnerability analysts, or threat intelligence analysts. The exam will certify that the successful candidate has the knowledge and skills required to configure and use threat detection tools, perform data analysis, and interpret the results to identify vulnerabilities, threats, and risks to an organization with the end goal of securing and protecting applications and systems within an organization. This courseware bears the seal of CompTIA Approved Quality Content. This seal signifies this content covers 100% of the exam objectives and implements important instructional design principles. CompTIA recommends multiple learning tools to help increase coverage of the learning objectives. The contents of this training material were created for the CompTIA CSA+ Cybersecurity Analyst Certification CS0-001 exam covering the 2017 Edition certification exam objectives. CompTIA CSA+ certification is aimed at IT professionals with (or seeking) job roles such as IT Security Analyst, Security Operations Center (SOC) Analyst, Vulnerability Analyst, Cybersecurity Specialist, Threat Intelligence Analyst, and Security Engineer. At Course Completion This course will teach you the fundamental principles of using threat and vulnerability analysis tools plus digital forensics tools. It will prepare you to take the CompTIA Cybersecurity Analyst+ CS0-001 exam by providing 100% coverage of the objectives and content examples listed on the syllabus. Study of the course can also help to build the prerequisites to study more advanced IT security qualifications, Upon successful completion of this course, students will understand: Identify tools and techniques to use to perform an environmental reconnaissance of a target network or security system Collect, analyze and interpret security data from multiple log and monitoring sources Use network host and web application vulnerability assessment tools and interpret the results to provide effective mitigation Understand and remediate identity management, authentication and access control issues Participate in a senior role within an incident response team and use forensic tools to identify the source of an attack

Understand the use of frameworks, policies and procedures and report on security architecture with recommendations for effective compensating controls Prerequisites Ideally, you should have successfully completed CompTIA Network+ Certification AND Security+ Certification courses or have equivalent knowledge before attending this training. Specifically, it is recommended that you have the following skills and knowledge before starting this course: Know basic network terminology and functions (such as OSI Model, Topology, Ethernet, Wi-Fi, switches, routers). Understand TCP/IP addressing, core protocols, and troubleshooting tools. Identify network attack strategies and defenses. Know the technologies and uses of cryptographic standards and products. Identify network- and host-based security technologies and practices. Describe the standards and products used to enforce security on web and communications technologies. Course Materials The student kit includes a comprehensive workbook and other necessary materials for this class. Course Outline Module 1 Threat Management Cybersecurity Analysts Cybersecurity Roles and Responsibilities Frameworks and Security Controls Risk Evaluation Penetration Testing Processes Reconnaissance Techniques The Kill Chain Open Source Intelligence Social Engineering Topology Discovery Service Discovery OS Fingerprinting Module 2 Vulnerability Management Managing Vulnerabilities

Vulnerability Management Requirements Asset Inventory Data Classification Vulnerability Management Processes Vulnerability Scanners Microsoft Baseline Security Analyzer Vulnerability Feeds and SCAP Configuring Vulnerability Scans Vulnerability Scanning Criteria Exploit Frameworks Remediating Vulnerabilities Analyzing Vulnerability Scans Remediation and Change Control Remediating Host Vulnerabilities Remediating Network Vulnerabilities Remediating Virtual Infrastructure Vulnerabilities Secure Software Development Software Development Lifecycle Software Vulnerabilities Software Security Testing Interception Proxies Web Application Firewalls Source Authenticity Reverse Engineering Module 3: Vulnerability Management Managing Vulnerabilities Vulnerability Management Requirements Asset Inventory Data Classification Vulnerability Management Processes Vulnerability Scanners Microsoft Baseline Security Analyzer Vulnerability Feeds and SCAP Configuring Vulnerability Scans Vulnerability Scanning Criteria Exploit Frameworks Remediating Vulnerabilities Analyzing Vulnerability Scans Remediation and Change Control Remediating Host Vulnerabilities Remediating Network Vulnerabilities Remediating Virtual Infrastructure Vulnerabilities Secure Software Development Software Development Lifecycle Software Vulnerabilities Software Security Testing Interception Proxies Web Application Firewalls Source Authenticity

Reverse Engineering Module 4: Cyber Incident Response Incident Response Incident Response Processes Threat Classification Incident Severity and Prioritization Types of Data Forensics Tools Digital Forensics Investigations Documentation and Forms Digital Forensics Crime Scene Digital Forensics Kits Image Acquisition Password Cracking Analysis Utilities Incident Analysis and Recovery Analysis and Recovery Frameworks Analyzing Network Symptoms Analyzing Host Symptoms Analyzing Data Exfiltration Analyzing Application Symptoms Using Sysinternals Containment Techniques Eradication Techniques Validation Techniques Corrective Actions Module 5: Security Architecture Secure Network Design Network Segmentation Blackholes, Sinkholes, and Honeypots System Hardening Group Policies and MAC Endpoint Security Managing Identities and Access Network Access Control Identity Management Identity Security Issues Identity Repositories Context-based Authentication Single Sign On and Federations Exploiting Identities Exploiting Web Browsers and Applications Security Frameworks and Policies Frameworks and Compliance Reviewing Security Architecture Procedures and Compensating Controls

Verifications and Quality Control Security Policies and Procedures Personnel Policies and Training