CompTIA Cybersecurity Analyst (CySA+)

(CySA-plus) / ISBN : 978-1-61691-025-9
This course includes
Interactive Lessons
Gamified TestPrep
Hands-On Labs
183 Reviews
Get A Free Trial

About This Course

We have an updated version of this course, please check out the latest CompTIA Cybersecurity Analyst (CySA+) course!

Kick start your prep for the CySA+ exam with the CompTIA Cybersecurity Analyst (CySA+) course and lab. The lab simulates real-world, hardware, software, and command-line interface environments and can be mapped to any text-book, course, or training. The CySA+ study guide provides complete coverage of the CS0-001 exam objectives and includes topics such as policy and compliance; forensic analysis, vulnerability scans, identity and access management security; and many more. This CySA+ training is for IT security analysts, vulnerability analysts, or threat intelligence analysts.

Skills You’ll Get

The CompTIA Cybersecurity Analyst (CySA+) is an international, vendor-neutral credential that applies behavioral analytics to improve the overall state of IT security. CompTIA CySA+ certification exam validates the critical knowledge and skills that are required to prevent, detect, and combat cybersecurity threats. The CySA+ exam validates the expertise of professionals to configure and use threat detection tools; perform data analysis, interpret the results to identify vulnerabilities, and much more.

1

Introduction

  • What Does This Book Cover?
  • Setting Up a Kali and Metasploitable Learning Environment
  • Setting Up Your Environment
  • Objectives Map for CompTIA Cybersecurity Analyst (CySA+) Exam CS0-001
2

Defending Against Cybersecurity Threats

  • Cybersecurity Objectives
  • Evaluating Security Risks
  • Building a Secure Network
  • Secure Endpoint Management
  • Penetration Testing
  • Reverse Engineering
  • Summary
  • Exam Essentials
  • Lab Exercises
3

Reconnaissance and Intelligence Gathering

  • Footprinting
  • Passive Footprinting
  • Gathering Organizational Intelligence
  • Detecting, Preventing, and Responding to Reconnaissance
  • Summary
  • Exam Essentials
  • Lab Exercises
4

Designing a Vulnerability Management Program

  • Identifying Vulnerability Management Requirements
  • Configuring and Executing Vulnerability Scans
  • Developing a Remediation Workflow
  • Overcoming Barriers to Vulnerability Scanning
  • Summary
  • Exam Essentials
  • Lab Exercises
5

Analyzing Vulnerability Scans

  • Reviewing and Interpreting Scan Reports
  • Validating Scan Results
  • Common Vulnerabilities
  • Summary
  • Exam Essentials
  • Lab Exercises
6

Building an Incident Response Program

  • Security Incidents
  • Phases of Incident Response
  • Building the Foundation for Incident Response
  • Creating an Incident Response Team
  • Coordination and Information Sharing
  • Classifying Incidents
  • Summary
  • Exam Essentials
  • Lab Exercises
7

Analyzing Symptoms for Incident Response

  • Analyzing Network Events
  • Handling Network Probes and Attacks
  • Investigating Host Issues
  • Investigating Service and Application Issues
  • Summary
  • Exam Essentials
  • Lab Exercises
8

Performing Forensic Analysis

  • Building a Forensics Capability
  • Understanding Forensic Software
  • Conducting a Forensic Investigation
  • Forensic Investigation: An Example
  • Summary
  • Exam Essentials
  • Lab Exercises
9

Recovery and Post-Incident Response

  • Containing the Damage
  • Incident Eradication and Recovery
  • Wrapping Up the Response
  • Summary
  • Exam Essentials
  • Lab Exercises
10

Policy and Compliance

  • Understanding Policy Documents
  • Complying with Laws and Regulations
  • Adopting a Standard Framework
  • Implementing Policy-Based Controls
  • Security Control Verification and Quality Control
  • Summary
  • Exam Essentials
  • Lab Exercises
11

Defense-in-Depth Security Architectures

  • Understanding Defense in Depth
  • Implementing Defense in Depth
  • Analyzing Security Architecture
  • Summary
  • Exam Essentials
  • Lab Exercises
12

Identity and Access Management Security

  • Understanding Identity
  • Threats to Identity and Access
  • Identity as a Security Layer
  • Understanding Federated Identity and Single Sign-On
  • Summary
  • Exam Essentials
  • Lab Exercises
13

Software Development Security

  • Understanding the Software Development Life Cycle
  • Designing and Coding for Security
  • Software Security Testing
  • Summary
  • Exam Essentials
  • Lab Exercises
14

Cybersecurity Toolkit

  • Host Security Tools
  • Monitoring and Analysis Tools
  • Scanning and Testing Tools
  • Network Security Tools
  • Web Application Security Tools
  • Forensics Tools
  • Summary

1

Reconnaissance and Intelligence Gathering

  • Performing Reconnaissance on a Network
  • Identifying Search Options in Metasploit
  • Performing the Initial Scan
  • Initiating an SSH Session from your Windows 10 Client to your Windows Server
2

Designing a Vulnerability Management Program

  • Conducting Vulnerability Scans
3

Analyzing Vulnerability Scans

  • Consulting a Vulnerability Database
4

Analyzing Symptoms for Incident Response

  • Examining the DDOS_Attack.pcap File
  • Retrieving a Real-Time List of Running Processes
  • Examining the Audited Events
5

Policy and Compliance

  • Adding Revision to the Revision History
  • Viewing and Downloading the Policy Templates
  • Opening the Policy Template and Setting the Company Name
  • Reviewing and Modifying the Policy Items
6

Software Development Security

  • Inspecting the Vulnerability in the echo Server's Source Code
7

Cybersecurity Toolkit

  • Using the Process Explorer to View Specific Details About Running Processes on the System
  • Making Syslog Entries Readable
  • Installing Splunk on the Server
  • Scanning the Rootkit
  • Working with Wireshark's Interface
  • Analyzing the Capture File to Find the Attack(s)
  • Generating Network Traffic and Using Filters
  • Confirming the Spoofing Attack in Wireshark
  • Starting a Live Packet Capture

Why Do Learners Love This Course?

I recently had the opportunity to take a look at the CompTIA Cybersecurity Analyst (CySA+) training course on uCertify and I am very impressed. In addition to the lessons, they have practice questions with detailed explanations and 40 hands on labs. Each lesson also has flash cards. Their mobile app makes it convenient to go over the lessons and take practice tests on the go. As an added bonus, they have a study planner with a readiness score based on what you've completed, and suggestions on what do to in order to get a better understanding of the material. The only thing I can think of that would enhance this course are more labs related to log analysis. Overall, I would recommend the uCertify CySA+ course to anyone studying for the exam.

Elan Wright
Incident Response Analyst

During the CySA+ course from uCertify, I have learned more about cyber-security than I have over the past years of real-world experience. I now have a clear understanding of how important IT security is to any organization. The learning environment was second to none. The exercises and in-depth study material was beneficial and the labs helped re-enforce the material covered. All of this will most definitely help me in my role as a network security professional. I now know where to look for anomalies in the network and take action to swiftly mitigate potential threats.

Ebrahim Shaikjee
Senior Network/Security Engineer

I just finished the CompTIA CySA+ training course from uCertify.com I really wish I would have had this when I was studying for the certification! Their labs are virtual machines that you spin up. You are given a task that aligns with the certification objectives that you will be tested on, spin up a VM and go to work! In the course, they have step by step guides on how to use different KaliLinux exploitation tools, Wireshark, and a lot of other popular, open-source programs that you will be tested on. They offer scenario-based questions and in-depth explanations of the certification objectives. If you are planning on taking the CySA+ certification, I highly recommend checking out uCertify.

Daniel Maciejewski
Data Systems Administrator

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

  • Network+, Security+ or equivalent knowledge
  • Minimum of 3-4 years of hands-on information security or related experience.
  • While there is no required prerequisite, CySA+ is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus.

USD 359

Pricing and taxes may vary from country to country.

Multiple-choice and performance-based

The exam contains 85 questions.

165 minutes

750

(on a scale of 100-900)

Here are the retake policies:

  • If a candidate has passed an exam (or multiple exams) and achieved a certification, he/she cannot take the exam again, using the same exam code, without prior consent from CompTIA.
  • CompTIA beta examinations may only be taken one (1) time by each candidate.
  • A test found to be in violation of the retake policy will be invalidated and the candidate may be subject to a suspension period. Repeat violators will be permanently banned from participation in the CompTIA Certification Program.
  • Candidates must pay the exam price each time they attempt the exam. CompTIA does not offer any free re-tests or discounts on retakes.

CompTIA CySA+ CS0-001 exam is going to retire on October 21st, 2020.

Related Courses

All Course
scroll to top