Improve your experience. We are very sorry but this website does not support Internet Explorer. We recommend using a different browser that is supported such as Google Chrome or Mozilla Firefox.
This course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur.
CompTIA Cybersecurity Analyst (CySA+) is a certification for cyber professionals tasked with incident detection, prevention and response through continuous security monitoring.
Identify the Importance of Risk Management
Assess Risk
Mitigate Risk
Integrate Documentation into Risk Management
Assess the Impact of Reconnaissance Incidents
Assess the Impact of Social Engineering
Assess the Impact of System Hacking Attacks
Assess the Impact of Web-Based Attacks
Assess the Impact of Malware
Assess the Impact of Hijacking and Impersonation Attacks
Assess the Impact of DoS Incidents
Assess the Impact of Threats to Mobile Security
Assess the Impact of Threats to Cloud Security
Assess Command and Control Techniques
Assess Persistence Techniques
Assess Lateral Movement and Pivoting Techniques
Assess Data Exfiltration Techniques
Assess Anti-Forensics Techniques
Implement a Vulnerability Management Plan
Assess Common Vulnerabilities
Conduct Vulnerability Scans
Conduct Penetration Tests on Network Assets
Deploy a Security Intelligence Collection and Analysis Platform
Collect Data from Network-Based Intelligence Sources
Collect Data from Host-Based Intelligence Sources
Use Common Tools to Analyze Logs
Use SIEM Tools for Analysis
Analyze Incidents with Windows-Based Tools
Analyze Incidents with Linux-Based Tools
Analyze Malware
Analyze Indicators of Compromise
Deploy an Incident Handling and Response Architecture
Mitigate Incidents
Prepare for Forensic Investigation as a CSIRT
Apply a Forensic Investigation Plan
Securely Collect and Analyze Electronic Evidence
Follow Up on the Results of an Investigation
Remediate Identity and Access Management Issues
Implement Security During the SDLC