Improve your experience. We are very sorry but this website does not support Internet Explorer. We recommend using a different browser that is supported such as Google Chrome or Mozilla Firefox.

CompTIA Cybersecurity Analyst (CySA+) Certification (Exam CS0-002 & CS0-003)

This course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur.

Description

CompTIA Cybersecurity Analyst (CySA+) is a certification for cyber professionals tasked with incident detection, prevention and response through continuous security monitoring. 

Course Content

1 - Assessing Information Security Risk

  • Identify the Importance of Risk Management

  • Assess Risk

  • Mitigate Risk

  • Integrate Documentation into Risk Management

2 - Analyzing Reconnaissance Threats to Computing and Network Environments

  • Assess the Impact of Reconnaissance Incidents

  • Assess the Impact of Social Engineering

3 - Analyzing Attacks on Computing and Network Environments

  • Assess the Impact of System Hacking Attacks

  • Assess the Impact of Web-Based Attacks

  • Assess the Impact of Malware

  • Assess the Impact of Hijacking and Impersonation Attacks

  • Assess the Impact of DoS Incidents

  • Assess the Impact of Threats to Mobile Security

  • Assess the Impact of Threats to Cloud Security

4 - Analyzing Post-Attack Techniques

  • Assess Command and Control Techniques

  • Assess Persistence Techniques

  • Assess Lateral Movement and Pivoting Techniques

  • Assess Data Exfiltration Techniques

  • Assess Anti-Forensics Techniques

5 - Managing Vulnerabilities in the Organization

  • Implement a Vulnerability Management Plan

  • Assess Common Vulnerabilities

  • Conduct Vulnerability Scans

  • Conduct Penetration Tests on Network Assets

6 - Collecting Cybersecurity Intelligence

  • Deploy a Security Intelligence Collection and Analysis Platform

  • Collect Data from Network-Based Intelligence Sources

  • Collect Data from Host-Based Intelligence Sources

7 - Analyzing Log Data

  • Use Common Tools to Analyze Logs

  • Use SIEM Tools for Analysis

8 - Performing Active Asset and Network Analysis

  • Analyze Incidents with Windows-Based Tools

  • Analyze Incidents with Linux-Based Tools

  • Analyze Malware

  • Analyze Indicators of Compromise

9 - Responding to Cybersecurity Incidents

  • Deploy an Incident Handling and Response Architecture

  • Mitigate Incidents

  • Prepare for Forensic Investigation as a CSIRT

10 - Investigating Cybersecurity Incidents

  • Apply a Forensic Investigation Plan

  • Securely Collect and Analyze Electronic Evidence

  • Follow Up on the Results of an Investigation

11 - Addressing Security Architecture Issues

  • Remediate Identity and Access Management Issues

  • Implement Security During the SDLC

Similar courses

Introduction to DAX for Power BI

Using Data Analysis Expressions to solve common business problems in Power BI

More Information
EC-Council Certified Ethical Hacker (CEH) v12

This course was built to incorporate a unique, in-depth, and interactive hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential.

More Information
PL-400T00: Microsoft Power Platform Developer

The Microsoft Power Platform helps organizations optimize their operations by simplifying, automating and transforming business tasks and processes.

More Information
Cisco® Solutions: Implementation and Administration (CCNA 200-301)

In this course, you will implement and administer networks by using Cisco solutions.

More Information
CompTIA A+ Part 1 Certification (Exam 220-1101)

Install and configure mobile devices; Compare and contrast networking hardware; Configure internet connections and wireless networking,; Troubleshoot hardware and networks; Install motherboards, RAM, storage devices, CPUs and add-on cards; Deploy and configure connected devices; Summarize cloud-computing concepts and virtualization

More Information
Oracle PL/SQL

This course is designed to create PL/SQL blocks both anonymous and named. This course will cover PL/SQL objects and data types. It will also cover packages and how to debug and improve performance within PL/SQL. It will address deploying PL/SQL objects and using Oracle pre-define packages, procedures, and functions.

More Information
CompTIA Network+ Certification (Exam N10-008)

CompTIA Network+ validates the technical skills needed to securely establish, maintain and troubleshoot the essential networks that businesses rely on. CompTIA Network+ is the only certification that covers the specific skills that network professionals need.

More Information
EC-Council Certified Chief Information Security Officer (C|CISO)

The CCISO program is a first-of-its-kind training and certification course that aims to produce cybersecurity executives of the highest caliber and ethics.

More Information
Agile Fundamentals Workshop

In this course, you will understand and use Agile core terms, explain key Agile concepts and their importance in achieving agility, identify, engage, and leverage key stakeholders in an Agile environment, apply common Agile tools and techniques, embrace and advocate for an Agile mindset to benefit from an Agile approach, select the best practices for a project and apply them appropriately to benefit the project and organization.

More Information
Advanced Java 9

Students who attend this course will leave armed with new skills to leverage modules, scale applications into multi-core environments, and improve the performance of Java 9 applications. This course will teach students everything they need to successfully master and implement the latest features and benefits of Java 9 and become a more effective Java 9 developer.

More Information
55339: Programming in C#

In this course, students will review the basics of C# program structure, language syntax, and implementation details, and then consolidate their knowledge throughout the week as they build an application that incorporates several features of .NET. The course aims to follow the spirit of the Microsoft Official Curriculum course 20483, while bringing it completely up-to-date with the latest features of C#, .NET 6.0 and Visual Studio 2022.

More Information
55337: Introduction to Programming

In this course you will, explain core programming fundamentals such as computer storage and processing, create and use variables and constants in programs, discuss how to create and use functions in a program, use decisions structures in a computer program, create and use repetition (loops) in a computer program, explain pseudocode and its role in programming, implement object-oriented programming concepts, and identify application errors and explain how to debug an application and handle errors.

More Information
AngularJS Training: AngularJS Programming

In this course, you will create single page web applications using the MVC pattern of AngularJS, understand the programming model provided by the AngularJS framework, define Angular controllers and directives, and control Angular data bindings.

More Information
Comprehensive Angular 12 Programming

In this course, you will develop single page Angular applications using Typescript, set up a complete Angular development environment, create components, directives, services, pipes, forms and custom validators, handle advanced network data retrieval tasks using observables, consume data from REST web services using the Angular HTTP Client, handle push-data connections using the WebSockets protocol, work with Angular Pipes to format data, and use advanced Angular Component Router features.

More Information
Introduction to Programming with Python®

This course is designed for people who want to learn the Python programming language in preparation for using Python to develop software for a wide range of applications, such as data science, machine learning, artificial intelligence, and web development.

More Information
Data Wrangling with Python

This course teaches concepts by deep-dive on-hand exercises. Throughout the course, you will learn data wrangling with hands-on exercises and activities. You’ll find checklists, best practices, and critical points mentioned throughout the lessons, making things more interesting.

More Information
Developing Advanced Automation with Red Hat Ansible Automation Platform (DO374)

In this course, you will apply recommended practices for effective and efficient automation with Ansible, perform automation operations as rolling updates, use advanced features of Red Hat Ansible Automation Platform to work with data, including filters and plugins, create automation execution environments to contain and scale Red Hat Ansible Automation, and leverage capabilities of the automation content navigator to develop Ansible Playbooks.

More Information
Building Data Analytics Solutions using Amazon Redshift

In this course, you will build a data analytics solution using Amazon Redshift, a cloud data warehouse service.

More Information
Data Warehousing on AWS

In this course, you will learn new concepts, strategies, and best practices for designing a cloud-based data warehousing solution using Amazon Redshift, the petabyte-scale data warehouse in AWS.

More Information
Building Data Lakes on AWS

In this course, you will apply data lake methodologies in planning and designing a data lake, articulate the components and services required for building an AWS data lake, secure a data lake with appropriate permission, ingest, store, and transform data in a data lake and query, analyze, and visualize data within a data lake.

More Information
Building Batch Data Analytics Solutions on AWS

In this course, you will learn to build batch data analytics solutions using Amazon EMR, an enterprise-grade Apache Spark and Apache Hadoop managed service.

More Information
Developing on AWS

In this course, you will learn how to use the AWS SDK to develop secure and scalable cloud applications using multiple AWS services such as Amazon DynamoDB, Amazon Simple Storage Service, and AWS Lambda. You explore how to interact with AWS using code and learn about key concepts, best practices, and troubleshooting tips.

More Information
Cloud Operations on AWS

In this course, you will learn how to manage and operate automatable and repeatable deployments of networks and systems on AWS.

More Information
DevOps Engineering on AWS

In this course, you will learn how to use the combination of tools, practices, and cultural philosophy of DevOps to improve an organization’s ability to develop, deliver, and maintain applications and services at high velocity on AWS.

More Information
55315: Introduction to SQL Databases

In this course you will describe key database concepts in the context of SQL Server, characterize database languages used in SQL Server, describe data modeling techniques, discuss normalization and denormalization techniques, distinguish relationship types and effects in database design, describe the effects of database design on performance, and define commonly used database objects.

More Information
55366: Querying Data with Transact-SQL

In this course, you will create single table SELECT queries, create multiple table SELECT queries, insert, update, and delete data, query data using built-in functions, create queries that aggregate data, create subqueries, create queries that use table expressions, use UNION, INTERSECT, and EXCEPT on multiple sets of data, implement window functions in queries, use PIVOT and GROUPING SETS in queries, use stored procedures in queries, add error handling to queries, and use transactions in queries.

More Information
55321: SQL Server Integration Services

In this course you will, create sophisticated SSIS packages for extracting, transforming, and loading data, use containers to efficiently control repetitive tasks and transactions, configure packages to dynamically adapt to environment changes, use Data Quality Services to cleanse data, successfully troubleshoot packages, create and manage the SSIS Catalog, deploy, configure, and schedule packages, secure the SSIS Catalog.

More Information
55316: Administering a SQL Database

In this course you will authenticate and authorize users, assign server and database roles, authorize users to access resources, use encryption and auditing features to protect data, describe recovery models and backup strategies, backup and restore SQL Server databases, automate database management, configure security for the SQL Server agent, manage alerts and notifications, managing SQL Server using PowerShell, trace access to SQL Server, monitor a SQL Server infrastructure, and import and export data.

More Information
Building Modern Data Analytics Solutions on AWS

In this course, you will learn how to leverage AWS data Services to store, process, analyze, stream, and query data to make decisions with speed and agility at scale, how to modernize data solutions end to end, and obtain skills to put your data to work to make better, more informed decisions, respond faster to the unexpected, and uncover new opportunities.

More Information
Developing Serverless Solutions on AWS

In this course, you will practice and deploy serverless solutions on AWS.

More Information
Amazon SageMaker Studio for Data Scientists

In this course, you will learn to accelerate the process to prepare, build, train, deploy, and monitor ML solutions using Amazon SageMaker Studio.

More Information
CompTIA A+ Part 2 Certification (Exam 220-1102)

In this course, you will install, configure, optimize, troubleshoot, repair, upgrade, and perform preventive maintenance on personal computers, digital devices, and operating systems.

More Information
AZ-305T00: Designing Microsoft Azure Infrastructure Solutions

This course teaches Azure Solution Architects how to design infrastructure solutions.

More Information
SC-200T00: Microsoft Security Operations Analyst

This course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst.

More Information
ISACA CISM Training Boot Camp

Certified Information Security Manager (CISM) Boot Camp is a five-day training focused on preparing you for the ISACA CISM exam. You will leave with the knowledge and domain expertise needed to pass the CISM exam the first time you take it.

More Information
ISC2 CISSP® Training Boot Camp

Take your career to the next level by earning one of the most in-demand cybersecurity certifications. CISSP training provides a proven method for mastering the broad range of knowledge required to become a Certified Information Systems Security Professional.

More Information
ISACA CISA Training Boot Camp

Certified Information Systems Auditor (CISA) Boot Camp is a five-day training focused on preparing you for the ISACA CISA exam. You’ll leave with the knowledge and domain expertise needed to pass the CISA exam the first time you take it.

More Information
CompTIA Cloud+ Certification (Exam CV0-003)

CompTIA Cloud+ shows you have the expertise needed to deploy and automate secure cloud environments and protect mission-critical applications and data.

More Information
55348: Administering Microsoft Endpoint Configuration Manager

In this 5-day course, you will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize Endpoint Protection, manage compliance, and create management queries and reports. Although this course and the associated labs are written for Windows Server 2022, the skills taught will also be backwards compatible for Server 2016 and 2019.

More Information
CompTIA Security+ Certification (Exam SY0-701)

This course maps to the CompTIA Security+ certification exam (SY0-701) and establishes the core knowledge required of any cybersecurity role, as well as providing a springboard to intermediate-level cybersecurity jobs.

More Information

Press enter to see more results