CompTIA CySA+ Certification Training
The CompTIA CySA+ Certification Course is ideal for IT and cybersecurity professionals seeking to
enhance their skills in threat detection, incident response, and vulnerability management.
REASONS TO CHOOSE
✔ Expert-Led Training Sessions by Experienced Instructors
✔ CompTIA CySA+ Boot Camp Attendance Certification
✔ Digital Delegate Pack
✔ Hands-On Labs:
CompTIA CySA+ Certification Training Course Details
.png)
CompTIA CySA+ Certification Course Outline
Module 1: Understanding Security Controls and Threat Intelligence
-
Identify Various Security Control Types
-
Recognize the Importance of Threat Data and Intelligence
Module 2: Leveraging Threat Intelligence
-
Classify Different Threats and Threat Actors
-
Utilize Attack Frameworks and Indicators
-
Implement Threat Modeling and Hunting Strategies
Module 3: Analyzing Security Monitoring Data
-
Assess Network Monitoring Outputs
-
Examine Appliance and Endpoint Monitoring Results
-
Analyze Email Security Logs
Module 4: Collecting and Querying Security Logs
-
Configure Log Review and SIEM Tools
-
Interpret and Analyze Log and SIEM Data
Module 5: Using Digital Forensics and Indicator Analysis
-
Apply Digital Forensics Techniques
-
Investigate Network, Host, and Application-based Indicators of Compromise (IoCs)
-
Identify Lateral Movement and Pivoting Techniques
Module 6: Implementing Incident Response Procedures
-
Understand Incident Response Processes
-
Apply Detection and Containment Strategies
-
Execute Eradication, Recovery, and Post-Incident Actions
Module 7: Managing Risk and Security Frameworks
-
Conduct Risk Identification, Assessment, and Prioritization
-
Understand Security Frameworks, Policies, and Compliance Procedures
Module 8: Conducting Vulnerability Management
-
Utilize Enumeration Tools and Analyze Outputs
-
Configure and Run Infrastructure Vulnerability Scans
-
Interpret and Mitigate Identified Vulnerabilities
Module 9: Securing IT Infrastructure
-
Implement Identity and Access Management Controls
-
Apply Network Architecture and Segmentation Security Measures
-
Recognize Hardware Security Best Practices
-
Address Risks Associated with Specialized Technologies
Module 10: Data Privacy and Protection Strategies
-
Identify Technical and Non-Technical Data Privacy Controls
Module 11: Enhancing Software Security
-
Mitigate Software and Web Application Vulnerabilities
-
Analyze Application Security Assessments
Module 12: Securing Cloud and Automated Environments
-
Identify Risks in Cloud Deployment Models
-
Understand Service-Oriented Architectures
-
Analyze Cloud Security Assessment Results
-
Compare Automation Tools and Technologies