CompTIA Cybersecurity Analyst (CySA+)

(CySA-plus) / ISBN : 978-1-61691-025-9
This course includes
Interactive Lessons
Gamified TestPrep
Hands-On Labs
183 Reviews
Get A Free Trial

About This Course

We have an updated version of this course, please check out the latest CompTIA Cybersecurity Analyst (CySA+) course!

Kick start your prep for the CySA+ exam with the CompTIA Cybersecurity Analyst (CySA+) course and lab. The lab simulates real-world, hardware, software, and command-line interface environments and can be mapped to any text-book, course, or training. The CySA+ study guide provides complete coverage of the CS0-001 exam objectives and includes topics such as policy and compliance; forensic analysis, vulnerability scans, identity and access management security; and many more. This CySA+ training is for IT security analysts, vulnerability analysts, or threat intelligence analysts.

Skills You’ll Get

The CompTIA Cybersecurity Analyst (CySA+) is an international, vendor-neutral credential that applies behavioral analytics to improve the overall state of IT security. CompTIA CySA+ certification exam validates the critical knowledge and skills that are required to prevent, detect, and combat cybersecurity threats. The CySA+ exam validates the expertise of professionals to configure and use threat detection tools; perform data analysis, interpret the results to identify vulnerabilities, and much more.

1

Introduction

  • What Does This Book Cover?
  • Setting Up a Kali and Metasploitable Learning Environment
  • Setting Up Your Environment
  • Objectives Map for CompTIA Cybersecurity Analyst (CySA+) Exam CS0-001
2

Defending Against Cybersecurity Threats

  • Cybersecurity Objectives
  • Evaluating Security Risks
  • Building a Secure Network
  • Secure Endpoint Management
  • Penetration Testing
  • Reverse Engineering
  • Summary
  • Exam Essentials
  • Lab Exercises
3

Reconnaissance and Intelligence Gathering

  • Footprinting
  • Passive Footprinting
  • Gathering Organizational Intelligence
  • Detecting, Preventing, and Responding to Reconnaissance
  • Summary
  • Exam Essentials
  • Lab Exercises
4

Designing a Vulnerability Management Program

  • Identifying Vulnerability Management Requirements
  • Configuring and Executing Vulnerability Scans
  • Developing a Remediation Workflow
  • Overcoming Barriers to Vulnerability Scanning
  • Summary
  • Exam Essentials
  • Lab Exercises
5

Analyzing Vulnerability Scans

  • Reviewing and Interpreting Scan Reports
  • Validating Scan Results
  • Common Vulnerabilities
  • Summary
  • Exam Essentials
  • Lab Exercises
6

Building an Incident Response Program

  • Security Incidents
  • Phases of Incident Response
  • Building the Foundation for Incident Response
  • Creating an Incident Response Team
  • Coordination and Information Sharing
  • Classifying Incidents
  • Summary
  • Exam Essentials
  • Lab Exercises
7

Analyzing Symptoms for Incident Response

  • Analyzing Network Events
  • Handling Network Probes and Attacks
  • Investigating Host Issues
  • Investigating Service and Application Issues
  • Summary
  • Exam Essentials
  • Lab Exercises
8

Performing Forensic Analysis

  • Building a Forensics Capability
  • Understanding Forensic Software
  • Conducting a Forensic Investigation
  • Forensic Investigation: An Example
  • Summary
  • Exam Essentials
  • Lab Exercises
9

Recovery and Post-Incident Response

  • Containing the Damage
  • Incident Eradication and Recovery
  • Wrapping Up the Response
  • Summary
  • Exam Essentials
  • Lab Exercises
10

Policy and Compliance

  • Understanding Policy Documents
  • Complying with Laws and Regulations
  • Adopting a Standard Framework
  • Implementing Policy-Based Controls
  • Security Control Verification and Quality Control
  • Summary
  • Exam Essentials
  • Lab Exercises
11

Defense-in-Depth Security Architectures

  • Understanding Defense in Depth
  • Implementing Defense in Depth
  • Analyzing Security Architecture
  • Summary
  • Exam Essentials
  • Lab Exercises
12

Identity and Access Management Security

  • Understanding Identity
  • Threats to Identity and Access
  • Identity as a Security Layer
  • Understanding Federated Identity and Single Sign-On
  • Summary
  • Exam Essentials
  • Lab Exercises
13

Software Development Security

  • Understanding the Software Development Life Cycle
  • Designing and Coding for Security
  • Software Security Testing
  • Summary
  • Exam Essentials
  • Lab Exercises
14

Cybersecurity Toolkit

  • Host Security Tools
  • Monitoring and Analysis Tools
  • Scanning and Testing Tools
  • Network Security Tools
  • Web Application Security Tools
  • Forensics Tools
  • Summary

1

Reconnaissance and Intelligence Gathering

  • Performing Reconnaissance on a Network
  • Identifying Search Options in Metasploit
  • Performing the Initial Scan
  • Initiating an SSH Session from your Windows 10 Client to your Windows Server
2

Designing a Vulnerability Management Program

  • Conducting Vulnerability Scans
3

Analyzing Vulnerability Scans

  • Consulting a Vulnerability Database
4

Analyzing Symptoms for Incident Response

  • Examining the DDOS_Attack.pcap File
  • Retrieving a Real-Time List of Running Processes
  • Examining the Audited Events
5

Policy and Compliance

  • Adding Revision to the Revision History
  • Viewing and Downloading the Policy Templates
  • Opening the Policy Template and Setting the Company Name
  • Reviewing and Modifying the Policy Items
6

Software Development Security

  • Inspecting the Vulnerability in the echo Server's Source Code
7

Cybersecurity Toolkit

  • Using the Process Explorer to View Specific Details About Running Processes on the System
  • Making Syslog Entries Readable
  • Installing Splunk on the Server
  • Scanning the Rootkit
  • Working with Wireshark's Interface
  • Analyzing the Capture File to Find the Attack(s)
  • Generating Network Traffic and Using Filters
  • Confirming the Spoofing Attack in Wireshark
  • Starting a Live Packet Capture

Why Do Learners Love This Course?

I can say with confident and honesty that it is the best study resource for the CompTIA CysA+ I have seen to present. It has the most information to pass the CysA+ exam. uCertify provides study contents, practice test, flash cards, quizzes, and hands-on performance labs that mirrors the real exam. Thanks uCertify for affording me the opportunity to review your CompTIA CysA+ course and it really beat my expectations. For this reason, I am going to recommend this course to all that are seeking to pass the CompTIA CysA+ exam on first try and aspiring blue teamers.

Emmett Blapooh
Cyber Security Analyst

I have been reviewing the CompTIA Cybersecurity Analyst+ Certification training offered by uCertify, and it has truly been a very enlightening and engaging one. I would totally recommend the Training Course to newcomers to cybersecurity, as well as experts looking to actively expand their skillset.

Emmanuel C. OGU
Editor in chief

uCertify offers the lessons, labs, and practice tests to make your dream of becoming a Hacker a reality. Once you understand the concepts this course teaches, and you can demonstrate the skills the labs show you will be ready to certify as a Cyber Security Analyst. uCertify has interactive books, hands-on labs with virtual machines, and tons of practice tests to ensure your success on your CompTIA Cyber Security Analyst (CySA+) exam.

Lori Collier
Cyber Security Specialist

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

  • Network+, Security+ or equivalent knowledge
  • Minimum of 3-4 years of hands-on information security or related experience.
  • While there is no required prerequisite, CySA+ is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus.

USD 359

Pricing and taxes may vary from country to country.

Multiple-choice and performance-based

The exam contains 85 questions.

165 minutes

750

(on a scale of 100-900)

Here are the retake policies:

  • If a candidate has passed an exam (or multiple exams) and achieved a certification, he/she cannot take the exam again, using the same exam code, without prior consent from CompTIA.
  • CompTIA beta examinations may only be taken one (1) time by each candidate.
  • A test found to be in violation of the retake policy will be invalidated and the candidate may be subject to a suspension period. Repeat violators will be permanently banned from participation in the CompTIA Certification Program.
  • Candidates must pay the exam price each time they attempt the exam. CompTIA does not offer any free re-tests or discounts on retakes.

CompTIA CySA+ CS0-001 exam is going to retire on October 21st, 2020.

Related Courses

All Course
scroll to top