CompTIA CySA+ Cybersecurity Analyst
- Référence GK5867
- Durée d’accès 365 jour(s)
- Version CS0-003
Modalité pédagogique
Aller à:
Modalité pédagogique
La formation est disponible dans les formats suivants:
-
Classe inter à distance
Depuis n'importe quelle salle équipée d'une connexion internet, rejoignez la classe de formation délivrée en inter-entreprises.
-
E-Learning
Pour cette formation, il existe aussi un produit d’auto-formation en ligne. Nous consulter.
-
Classe inter en présentiel
Formation délivrée en inter-entreprises. Cette méthode d'apprentissage permet l'interactivité entre le formateur et les participants en classe.
-
Intra-entreprise
Cette formation est délivrable en groupe privé, et adaptable selon les besoins de l’entreprise. Nous consulter.
Demander cette formation dans un format différent
Résumé
Haut de pageCertMaster Learn is a comprehensive eLearning experience that helps learners gain the knowledge and practical skills necessary to be successful on CompTIA certification exams, and in their IT career. A Learning Plan helps learners stay on track with your studies, while robust analytics bring awareness of strengths and weaknesses.
CertMaster Labs make it easy for learners to practice and apply their skills in real workplace scenarios in preparation for the certification exam. All lab activities use real equipment and software, offer feedback and hints, and provide a score based on learner inputs, ultimately guiding learners to the most correct and efficient path through job tasks.
In the integrated experience, CertMaster Labs are integrated as Study Tasks within the CertMaster Learn Learning Plan, accessible through a single login and seamless workflow.
CompTIA CertMaster Practice is an online knowledge assessment and training companion tool to help you prepare for your CompTIA certification exam. Featuring an adaptive question-first design, CertMaster Practice quickly assesses what you already know and what you still need to learn. For those topics where you need more support, CertMaster Practice provides personalized remediation and feedback. Once you’re ready, you can demonstrate your knowledge on a timed practice test complete with performance-based questions.
Lessons cover all exam objectives with integrated videos
Hundreds of practice questions test your knowledge
Performance-based questions apply what you’ve learned in a scenario
Assisted Labs guide you step-by-step through tasks
Applied Labs present goal-oriented scenarios and require critical thinking and analysis
Flashcards ensure you know the terminology and acronyms required for the exam
The Learning Plan keeps you on track with your studies
Public
Haut de pageObjectifs de la formation
Haut de pageAfter completing this course, you should be able to:
- Proactively Monitor and Detect. Demonstrate your skills in detecting and analyzing indicators of malicious activity using the most up-to-date methods and tools, such as threat intelligence, security information and event management (SIEM), endpoint detection and response (EDR) and extended detection and response (XDR).
- Respond to Threats, Attacks and Vulnerabilities. Prove your knowledge of incident response and vulnerability management processes and highlight the communication skills critical to security analysis and compliance.
- Demonstrate Competency of Current Trends. Valuable team members can show knowledge of current trends that affect the daily work of security analysts, such as cloud and hybrid environments.
Programme détaillé
Haut de pageLesson 1: Understanding Vulnerability Response, Handling, and Management
Lesson 2: Exploring Threat Intelligence and Threat Hunting Concepts
Lesson 3: Explaining Important System and Network Architecture Concepts
Lesson 4: Understanding Process Improvement in Security Operations
Lesson 5: Implementing Vulnerability Scanning Methods
Lesson 6: Performing Vulnerability Analysis
Lesson 7: Communicating Vulnerability Information
Lesson 8: Explaining Incident Response Activities
Lesson 9: Demonstrating Incident Response Communication
Lesson 10: Applying Tools to Identify Malicious Activity
Lesson 11: Analyzing Potentially Malicious Activity
Lesson 12: Understanding Application Vulnerability Assessment
Lesson 13: Exploring Scripting Tools and Analysis Concepts
Lesson 14: Understanding Application Security and Attack Mitigation Best Practices
Labs;
- Assisted Lab: Exploring the Lab Environment
- Assisted Lab: Configuring Controls
- Assisted Lab: Reviewing IoC and Threat Intelligence Sources
- Assisted Lab: Performing Threat Hunting
- Assisted Lab: Configuring Centralized Logging
- APPLIED LAB: Performing System Hardening
- Assisted Lab: Assess Time Synch Errors
- Assisted Lab: Configuring Automation
- Assisted Lab: Performing Asset Discovery
- Assisted Lab: Performing Vulnerability Scanning
- Assisted Lab: Performing Passive Scanning
- Assisted Lab: Establishing Context Awareness
- Assisted Lab: Analyzing Vulnerability Reports
- Assisted Lab: Detecting Legacy Systems
- APPLIED LAB: Performing Post-Incident Forensic Analysis
- APPLIED LAB: Performing IoC Detection and Analysis
- ADAPTIVE LAB: Performing Playbook Incident Response
- APPLIED LAB: Collecting Forensic Evidence
- Assisted Lab: Performing Root Cause Analysis
- APPLIED LAB: Using Network Sniffers
- APPLIED LAB: Researching DNS and IP Reputation
- Assisted Lab: Using File Analysis Techniques
- Assisted Lab: Analyzing Potentially Malicious Files
- Assisted Lab: Using Nontraditional Vulnerability Scanning Tools
- APPLIED LAB: Performing Web Vulnerability Scanning
- Assisted Lab: Exploiting Weak Cryptography
- Assisted Lab: Performing and Detecting Directory Traversal and Command Injection
- Assisted Lab: Performing and Detecting Privilege Escalation
- Assisted Lab: Performing and Detecting XSS
- Assisted Lab: Performing and Detecting LFI/RFI
- Assisted Lab: Performing and Detecting SQLi
- Assisted Lab: Performing and Detecting CSRF
- APPLIED LAB: Detecting and Exploiting Security Misconfiguration
Pré-requis
Haut de pageAttendees should meet the following pre-requisites:
- Network+, Security+ or equivalent knowledge.
- Minimum of 4 years of hands-on experience as an incident response analyst or security operations center (SOC) analyst, or equivalent experience.
Certification
Haut de pageRecommended preparation for exam(s):
- CS0-003
The CompTIA Cybersecurity Analyst (CySA+) certification verifies that successful candidates have the knowledge and skills required to detect and analyze indicators of malicious activity, understand threat intelligence and threat management, respond to attacks and vulnerabilities, perform incident response, and report and communicate related activity.
- Number of Questions: Maximum of 85 questions
- Type of Questions: Multiple choice and performance-based
- Legth of Test: 165 minutes
- Passing Score: 750 (on a scale of 100-900)
- #000000