0345 4506120

CompTIA CySA+ Cybersecurity Analyst (CySA+)

Course Details

Name CompTIA CySA+ Cybersecurity Analyst (CySA+)
Description
URL
Location:
Virtual Classroom
Start Date:
Working Days:
Price:
£2078.00 +vat
Availability:
Exam:
Residential:
Course ID:
467183

Overview

Target Audience

The CompTIA Cybersecurity Analyst (CySA+) examination is designed for IT security analysts, vulnerability analysts, or threat intelligence analysts. The exam will certify that the successful candidate has the knowledge and skills required to configure and use threat detection tools, perform data analysis, and interpret the results to identify vulnerabilities, threats, and risks to an organization with the end goal of securing and protecting applications and systems within an organization.

Learning Objectives

The CompTIA CySA+ certification is a vendor-neutral credential. The CompTIA CySA+ exam (Exam CS0-001) is an internationally targeted validation of intermediate-level security skills and knowledge. The course has a technical, “hands-on” focus on IT security analytics.

The CompTIA CySA+ exam is based on these objectives:

  • Threat Management Vulnerability Management
  • Cyber Incident Response
  • Security Architecture and Tool Sets

Pre-Requisites

While there is no required prerequisite, the CompTIA CySA+ certification is intended to follow CompTIA Security+ or equivalent experience. It is recommended for CompTIA CySA+ certification candidates to have the following:

  • 3-4 years of hands-on information security or related experience
  • Network+, Security+, or equivalent knowledge

Course Content

1. Threat Management

  • Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes

Procedures/common tasks: 

  • Topology discovery 
  • OS fingerprinting 
  • Service discovery 
  • Packet capture 
  • Log review 
  • Router/firewall ACLs review 
  • Email harvesting 
  • Social media profiling 
  • Social engineering 
  • DNS harvesting 
  • Phishing

Variables: 

  • Wireless vs. wired 
  • Virtual vs. physical 
  • Internal vs. external 
  •  On-premises vs. cloud

Tools:

  •  NMAP 
  •  Host scanning 
  •  Network mapping 
  •  NETSTAT 
  •  Packet analyzer 
  •  IDS/IPS 
  •  HIDS/NIDS 
  •  Firewall rule-based and logs 
  •  Syslog 
  •  Vulnerability scanner
  • Given a scenario, analyze the results of a network reconnaissance

Point-in-time data analysis: 

  • Packet analysis 
  • Protocol analysis 
  • Traffic analysis 
  • Netflow analysis 
  • Wireless analysis

Data correlation and analytics: 

  • Anomaly analysis 
  • Trend analysis 
  • Availability analysis 
  • Heuristic analysis 
  • Behavioral analysis

Data output: 

  • Firewall logs 
  • Packet captures 
  • NMAP scan results 
  • Event logs 
  • Syslogs 
  • IDS report

Tools: 

  • SIEM 
  • Packet analyzer 
  • IDS 
  • Resource monitoring tool 
  • Netflow analyzer
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure

Network segmentation: 

  • System isolation 
  • Jump box
  • Honeypot
  • Endpoint security

Group policies

ACLs: 

  • Sinkhole

Hardening: 

  • Mandatory Access Control (MAC) 
  • Compensating controls 
  • Blocking unused ports/services 
  • Patching

Network Access Control (NAC): 

  • Time-based 
  • Rule-based 
  • Role-based
  • Location-based
  • Explain the purpose of practices used to secure a corporate environment

Penetration testing: 

  • Rules of engagement

Reverse engineering: 

  • Isolation/sandboxing 
  • Hardware 
  • Software/malware

Training and exercises: 

  • Red team 
  • Blue team 
  • White team

Risk evaluation: 

  • Technical control review 
  • Operational control review 
  • Technical impact and likelihood

2. Vulnerability Management

  • Given a scenario, implement an information security vulnerability management process

Identification of requirements: 

  • Regulatory environments 
  • Corporate policy 
  • Data classification 
  • Asset inventory

Establish scanning frequency: 

  • Risk appetite 
  • Regulatory requirements 
  • Technical constraints 
  • Workflow

Configure tools to perform scans according to specification: 

  • Determine scanning criteria 
  • Tool updates/plug-ins 
  • Permissions and access
  • Execute scanning

Generate reports: 

  • Automated vs. manual distribution

Remediation:

  • Prioritizing
  • Communication/change control
  • Sandboxing/testing
  • Inhibitors to remediation
  • Ongoing scanning and continuous monitoring
  • Given a scenario, analyze the output resulting from a vulnerability scan

Analyze reports from a vulnerability scan: 

  • Review and interpret scan results
  • Validate results and correlate other data points 
  • Compare to best practices or compliance 
  • Reconcile results 
  • Review related logs and/or other data sources 
  • Determine trends
  • Compare and contrast common vulnerabilities found in the following targets within an organization
  • Servers
  • Endpoints
  • Network infrastructure
  • Network appliances

Virtual infrastructure:

  • Virtual hosts
  • Virtual networks
  • Management interface
  • Mobile devices
  • Interconnected networks
  • Virtual private networks (VPNs)
  • Industrial Control Systems (ICSs)
  • SCADA devices

3. Cyber Incident Response

  • Given a scenario, distinguish threat data or behavior to determine the impact of an incident

Threat classification: 

  • Known threats vs. unknown threats 
  • Zero day 
  • Advanced persistent threat
  • Factors contributing to incident severity and prioritization: 
  • Scope of impact
  • Types of data
  • Given a scenario, prepare a toolkit and use appropriate forensics tools during an investigation

Forensics kit: 

  • Digital forensics workstation 
  • Write blockers 
  • Cables 
  • Drive adapters 
  • Wiped removable media 
  • Cameras 
  • Crime tape 
  • Tamper-proof seals 
  • Documentation/forms

Forensic investigation suite:

  • Imaging utilities 
  • Analysis utilities 
  • Chain of custody 
  • Hashing utilities 
  • OS and process analysis 
  • Mobile device forensics 
  • Password crackers 
  • Cryptography tools 
  • Log viewers
  • Explain the importance of communication during the incident response process

Stakeholders:

  • HR
  • Legal
  • Marketing
  • Management

Purpose of communication processes:

  • Limit communication to trusted parties
  • Disclosure based on regulatory/legislative requirements
  • Prevent inadvertent release of information
  • Secure method of communication

Role-based responsibilities:

  • Technical 
  • Management 
  • Law enforcement 
  • Retain incident response provider
  • Given a scenario, analyze common symptoms to select the best course of action to support incident response

Common network-related symptoms:

  • Bandwidth consumption
  • Beaconing
  • Irregular peer-to-peer communication
  • Rogue devices on the network
  • Scan sweeps
  • Unusual traffic spikes

Common host-related symptoms:

  • Processor consumption
  • Memory consumption
  • Drive capacity consumption
  • Unauthorized software
  • Malicious processes
  • Unauthorized changes
  • Unauthorized privileges
  • Data exfiltration

Common application-related symptoms:

  • Anomalous activity 
  • Introduction of new accounts 
  • Unexpected output 
  • Unexpected outbound communication 
  • Service interruption 
  • Memory overflows
  • Summarize the incident recovery and post-incident response process

Containment techniques:

  • Segmentation
  • Isolation
  • Removal
  • Reverse engineering

Eradication techniques:

  • Sanitization 
  • Reconstruction/reimage 
  • Secure disposal

Validation:

  • Patching
  • Permissions
  • Scanning
  • Verify logging/communication to security monitoring

Corrective actions:

  • Lessons learned report
  • Change control process
  • Update incident response plan
  • Incident summary report

4. Security Architecture and Tool Sets

  • Explain the relationship between frameworks, common policies, controls, and procedures
  • Regulatory compliance

Frameworks:

  • NIST
  • ISO
  • COBIT
  • SABSA
  • TOGAF
  • ITIL

Policies:

  • Password policy
  • Acceptable use policy
  • Data ownership policy
  • Data retention policy
  • Account management policy
  • Data classification policy

Controls:

  • Control selection based on criteria
  • Organizationally defined parameters
  • Physical controls
  • Logical controls
  • Administrative controls

Procedures: 

  • Continuous monitoring 
  • Evidence production 
  • Patching 
  • Compensating control development 
  • Control testing procedures 
  • Manage exceptions 
  • Remediation plans

Verifications and quality control: 

  • Audits 
  • Evaluations
  • Assessments
  • Maturity model
  • Certification
  • Given a scenario, use data to recommend remediation of security issues related to identity and access management

Security issues associated with context-based authentication:

  • Time
  • Location
  • Frequency
  • Behavioral

Security issues associated with identities:

  • Personnel
  • Endpoints
  • Servers
  • Services
  • Roles
  • Applications

Security issues associated with identity repositories:

  • Directory services
  • TACACS+
  • RADIUS

Security issues associated with federation and single sign-on:

  • Manual vs. automatic provisioning/deprovisioning
  • Self-service password reset

Exploits:

  • Impersonation
  • Man-in-the-middle
  • Session hijack
  • Cross-site scripting
  • Privilege escalation
  • Rootkit
  • Given ascenario, review security architecture and make recommendations to implement compensating controls

Security data analytics:

  • Data aggregation and correlation
  • Trend analysis
  • Historical analysis

Manual review: 

  • Firewall log 
  • Syslogs 
  • Authentication logs 
  • Event logs

Defense in depth:

  • Personnel
  • Processes
  • Technologies
  • Other security concepts
  • Given a scenario, use application security best practices while participating in the Software Development Life Cycle (SDLC)

Best practices during software development:

  • Security requirements definition
  • Security testing phases
  • Manual peer reviews
  • User acceptance testing
  • Stress test application
  • Security regression testing
  • Input validation
  • Secure coding best practices:
  • OWASP
  • SANS
  • Center for Internet Security
  • Compare and contrast the general purpose and reasons for using various cybersecurity tools and technologies

Preventative:

  • IPS
  • HIPS
  • Firewall
  • Antivirus
  • Anti-malware
  • EMET
  • Web proxy
  • Web Application Firewall (WAF)

Collective:

  • SIEM
  • Network scanning
  • Vulnerability scanning
  • Packet capture
  • Command line/IP utilities
  • IDS/HIDS

Analytical:

  • Vulnerability scanning
  • Monitoring tools
  • Interception proxy

Exploit:

  • Interception proxy
  • Exploit framework
  • Fuzzers

Forensics:

  • Forensic suites
  • Hashing
  • Password cracking
  • Imaging

 

Virtual

Description:

Online AnyWare™ immerses you in a dynamic online training environment where you access and participate in an actual classroom. You interact with both your instructor and your peers—just as if you were together with them in the classroom—as you master the essential knowledge and skills in today's most important IT and management topics.

With AnyWare Online Training, you can...

  • Access your course from any Internet-accessible location
  • Gain scheduling flexibility—choosing from a wide selection of course dates
  • Immerse yourself in an actual classroom experience
  • Benefit from AnyWare's unique real-time interactivity
  • Achieve the same results that you expect from an instructor-led classroom course

Frequently Asked Questions

What are the technological requirements for participating in a live, online course delivered via Online AnyWare?

To participate fully in a virtual AnyWare course, you will need the following:

  • An audio-enabled computer
  • A minimum screen resolution of 1024 x 768
  • An Intel Pentium® 4 computer, or equivalent, with a 2.5 GHz or faster processor; or an Intel Mac
  • A minimum of 1 GB of RAM
  • A reliable high-speed Internet connection, either via cable modem, DSL or corporate LAN (a wired Internet connection is strongly recommended)
  • Internet Explorer 7 or higher; or Mozilla Firefox 2 or higher
  • Support for Java and ActiveX within your browser with the latest version of Java installed
  • Adobe Flash version 8 or higher
  • Access to www.logmein.com
  • Ability to install the LogMeIn ActiveX control, which may require local administrative privileges
  • Learning Tree AnyWare will support a dual-monitor setup, which allows concurrent access to the classroom and the computer used for the hands-on exercises. This setup may enhance your training experience; however, it is not a requirement for full participation in any of our courses.

Do I need to install any special software?

None! All you need is a high-speed, flash-enabled Internet browser—Internet Explorer 7 or higher, Mozilla Firefox 2 or higher, or Safari.

Can I participate in a course via Online AnyWare using any type of operating system?

You can participate in a class on a PC or Mac. However, the hands-on exercise material in Course 2320 and Course 984 is not compatible with the Mac operating system at this time. Please contact our AnyWare support team if you are planning to participate in either of these courses using a Mac operating system.

Do I need my own microphone, earphones and/or headset?

Prior to the course, we will provide a microphone-enabled headset for you to use during the course. The headset is yours to keep after the course.

Is the virtual classroom experience really the same quality when it's delivered over the Internet?

Absolutely! Online AnyWare is designed to provide you with the same experience you would receive in the classroom. You connect to an actual classroom where you participate online in live, instructor-led training that is facilitated either at one of our Education Centres or on site at a client's location. As an online participant, you engage with the instructor and interact with your classmates just as if you were in the actual classroom. And you perform all of the same hands-on exercises, so the knowledge you learn and the skills you gain are no different than if you were taking the course as an in-class participant.

Why is Online AnyWare so much more effective than off-the-shelf, self-paced e-learning programmes?

The most important benefit of live, instructor-led training is the ability to interact with your instructor and fellow classmates. It is through such interaction that real learning takes place. Courses taken via AnyWare offer the same benefits. In fact, over half the time spent in courses is dedicated to interactive activities—where real learning happens! You'll have your specific questions answered on the spot, receive immediate clarification of anything that is confusing, perform hands-on exercises by remotely accessing an in-class PC, and share your experiences in real time with your fellow classmates. Most importantly, you'll receive expert advice on how best to apply what you learn to your own projects.

How is the classroom experience actually delivered?

Adobe Connect is the foundation technology for our AnyWare training delivery solution used to deliver our IT and management courses. You'll acquire new skills in a safe environment—your computer's files and applications are never engaged, so there is no risk of damage. A hard copy of the course materials and a microphone-enabled headset will be shipped to you prior to the course.

Using your Internet browser, you remotely access a dedicated in-class PC so that you can participate in hands-on exercises and develop new skills just as if you were in the actual classroom where your instructor is coaching in real time.

How do I connect to the classroom?

One week prior to the class start date, you will receive a "Getting Ready" e-mail with a URL and your login credentials. We'll ask you to complete a three-step validation process prior to the class start date to test your system, two-way audio connection, and Internet connection to the classroom and to your dedicated, in-class PC on which you'll be performing your hands-on exercises.

A few days before your class starts, you'll also receive a call from one of our customer service representatives who will answer any questions you may have. When it's time for the course to begin, just log in—from anywhere—and join your classmates, live in the classroom. During your course, our AnyWare support technicians are available to assist you as needed. It's that easy!

What are the course hours?

Start and end times vary for each individual course. Please confirm the start and end times during registration, as your course may be delivered from a different time zone than your own. On the first day of class, plan to log in to your classroom 30 minutes prior to the start of the class.

Exam Information:

  • Course tuition includes an exam voucher. The exam is offered through Pearson Vue.

Certification Information:

  • To earn this certification, you must take and pass CompTIA exam CS0-001 
  • You must earn 60 CompTIA CEUs over a three-year period to maintain CySA+ certification 
  • This is a CompTIA certification prep course.

Our Customers Include