COMPTIA Cysa+ ELEARNING SELF PACED
On-line course: Comptia Cybersecurity Analyst (CS0-003)
This official Comptia provides a completely online and pre-recorded training, in English, for the preparation independently at Cysa+.
Comptia Cybersecurity Analyst (Cysa+) is an international certification for IT professionals who apply behavioral analysis to networks and devices to prevent, detect and combat threats to IT security through continuous safety monitoring.
Comptia Cybersecurity Analyst (Cysa+) is an international certification for IT professionals who apply behavioral analysis to networks and devices to prevent, detect and combat threats to IT security through continuous safety monitoring.

Objectives of the course
Cysa+ focuses on the ability of candidates not only to acquire, monitor and respond proactively to the results of network traffic, but also underlines the safety of software and applications, automation, hunting for threats and compliance with IT regulations, which affect the daily work of safety analysts.
Cysa+ covers the most updated basic skills of the security analyst and imminent work skills used by threats intelligence analysts, applications safety analysts, conformity analysts, response/managers of accidents and threat hunters, introducing new techniques to combat threats inside and outside the security operational center (SOC).
Cysa+ covers the most updated basic skills of the security analyst and imminent work skills used by threats intelligence analysts, applications safety analysts, conformity analysts, response/managers of accidents and threat hunters, introducing new techniques to combat threats inside and outside the security operational center (SOC).
Content
elearning self paced course includes:
- Course Slides Comptia
guide in digital format in English
- Online DB with the official Exhibition Practice Comptia
- Access for 12 months to the set of official online workshops on the Comptia functional to the practical application of the concepts and the preparation of the exam.
The course program includes:
Parts I: Threat Management
- Cybersecurity Analysts
- Cybersecurity Roles and Responsibility
- Frameworks and Security Controls
- Risk Evaluation
- Penetration Testing Processes
- Reconnaissance Techniques
- The Kill Chain
- Open Source Intelligence
- Social Engology - Topology
- Topology - Topology Discovery
- Service Discovery
- OS FingerPrinting
Parts II: Threat Management
- Security Appliances
- Configuring Firewalls
- Intrusion Detection and Prevention
- Configuring IDS
- Malware Threats
- Confouring Anti -Virus Software
- Sysinternals
- Enhanced Mitigction Experience Toolkit
- Logging and Analysis
- Packet Capture
- Packet Capture and Monitoring Tools
- Log Review and Siem
- Siem Data Outputs
- SIEM Data Analysis
- Point -in -time Data Analysis
Parts III: Vulnerability Management
- Managing Vulnerability
- Vulnerability Management Requirements
- Asset Inventory
- Data Ranking
- Vulnerability Management Processes
- Vulnerability Scanners
- Microsoft Baseline Security Analyser
- Vulnerability Feeds and Scap
- Configuring Vulnerability Scans
- Vulnerability Scanning Criteria
- Exploit Frameworks
- Remodiating Vulnerability
- Analysing Vulnerability Scanns
- Remediation and Change Control
- Remediating Host Vulnerabilities
- Remediating Network Vulnerability
- Remediating virtual infrastructure Vulnerability
- Secure Software Development
- Software Development Life Cycle
- Vulnerability software
- Software Security Testing
- Intercept Proxies
- Web Application Firewalls
-Source Authenticity
- Reverse Engineering
Parts IV: Cyber Incident Response
- Incident Response
- Incident Response Processes
- Threat classification
- Incident Severity and Priorisation
- Types of Data
- Forensics Tools
- Digital Forensics Investigations
- Documentation and Forms
- Digital Forensics Crime Scenes
- Digital Forensics Kits
- Image Acquisition
- Password Cracking
- Analysis Utilities
- Incident Analysis and Recovery
- Analysis and Recovery Frameworks
- Analysing Network Sympoms
- Analysing Host Sympoms
- Analysing Data Exfiltration
- Analysing Application Sympoms
- Using Sysinternals
- Containment, Eradication, and Validation Techniques
- Corrective Actions
Parts V: Security Architecture
- Secure Network Design
- Network Segmentation
- Blackholes, Sinkholes, and Honeypots
- System Hardening
- Group Policies and Mac
- Endpoint Security
- Network Access Control
- Identity identity - Identity Management
- Identity Security Issues
- Identity Repositories
- Context -Based Authentication
- Single Sign -on and Federation
- Exploiting Identity
- Exploiting Web Browsers and Applications
- Security Frameworks and Polycies
- Frameworks and Compliance
- Reviewing Security Architecture
- Proceeding and Complimating Controls Controls
- Verifications and Quality Control
- Security Polycies and Procedures
- Personnel Polycies and Training
- Course Slides Comptia
guide in digital format in English
- Online DB with the official Exhibition Practice Comptia
- Access for 12 months to the set of official online workshops on the Comptia functional to the practical application of the concepts and the preparation of the exam.
The course program includes:
Parts I: Threat Management
- Cybersecurity Analysts
- Cybersecurity Roles and Responsibility
- Frameworks and Security Controls
- Risk Evaluation
- Penetration Testing Processes
- Reconnaissance Techniques
- The Kill Chain
- Open Source Intelligence
- Social Engology - Topology
- Topology - Topology Discovery
- Service Discovery
- OS FingerPrinting
Parts II: Threat Management
- Security Appliances
- Configuring Firewalls
- Intrusion Detection and Prevention
- Configuring IDS
- Malware Threats
- Confouring Anti -Virus Software
- Sysinternals
- Enhanced Mitigction Experience Toolkit
- Logging and Analysis
- Packet Capture
- Packet Capture and Monitoring Tools
- Log Review and Siem
- Siem Data Outputs
- SIEM Data Analysis
- Point -in -time Data Analysis
Parts III: Vulnerability Management
- Managing Vulnerability
- Vulnerability Management Requirements
- Asset Inventory
- Data Ranking
- Vulnerability Management Processes
- Vulnerability Scanners
- Microsoft Baseline Security Analyser
- Vulnerability Feeds and Scap
- Configuring Vulnerability Scans
- Vulnerability Scanning Criteria
- Exploit Frameworks
- Remodiating Vulnerability
- Analysing Vulnerability Scanns
- Remediation and Change Control
- Remediating Host Vulnerabilities
- Remediating Network Vulnerability
- Remediating virtual infrastructure Vulnerability
- Secure Software Development
- Software Development Life Cycle
- Vulnerability software
- Software Security Testing
- Intercept Proxies
- Web Application Firewalls
-Source Authenticity
- Reverse Engineering
Parts IV: Cyber Incident Response
- Incident Response
- Incident Response Processes
- Threat classification
- Incident Severity and Priorisation
- Types of Data
- Forensics Tools
- Digital Forensics Investigations
- Documentation and Forms
- Digital Forensics Crime Scenes
- Digital Forensics Kits
- Image Acquisition
- Password Cracking
- Analysis Utilities
- Incident Analysis and Recovery
- Analysis and Recovery Frameworks
- Analysing Network Sympoms
- Analysing Host Sympoms
- Analysing Data Exfiltration
- Analysing Application Sympoms
- Using Sysinternals
- Containment, Eradication, and Validation Techniques
- Corrective Actions
Parts V: Security Architecture
- Secure Network Design
- Network Segmentation
- Blackholes, Sinkholes, and Honeypots
- System Hardening
- Group Policies and Mac
- Endpoint Security
- Network Access Control
- Identity identity - Identity Management
- Identity Security Issues
- Identity Repositories
- Context -Based Authentication
- Single Sign -on and Federation
- Exploiting Identity
- Exploiting Web Browsers and Applications
- Security Frameworks and Polycies
- Frameworks and Compliance
- Reviewing Security Architecture
- Proceeding and Complimating Controls Controls
- Verifications and Quality Control
- Security Polycies and Procedures
- Personnel Polycies and Training
EXAMINATION:
The course prepares to take the Comptia + (CS0-003) ACCREDIZED ANSI.
The purchase of the exam includes the Pearson Vue voucher.
The option with Exam Retake can also be purchased
The purchase of the exam includes the Pearson Vue voucher.
The option with Exam Retake can also be purchased
PRICE:
490.00 € + VAT
Exam price:
390.00 € + VAT