Course description
CompTIA Official CySA+ CS0-002 Hands-on | Instructor-Led
Fortray’s CompTIA CySA+ is a vendor-neutral network certification for IT Security professionals. According to CompTIA, the exam “proves the Advanced knowledge and skills. CySA+ focuses on the latest trends and techniques in risk management, risk mitigation, threat management, and intrusion detection.
The CompTIA CySA+ certification CompTIA CySA+ is the Intermediate level security certification IT professionals should earn. It establishes the advance knowledge required of any cybersecurity role and provides a authentication to intermediate-level cybersecurity jobs. CySA+ incorporates best practices in hands-on troubleshooting to ensure security professionals have practical security problem-solving skills. Cybersecurity professionals with CySA+ know how to address security incidents.
This course is designed for penetration testers, IT Security analysts, vulnerability analysts and testers, network security operations personnel, or anyone who is trying to get a better understanding of the concepts involved in conducting a penetration test and its associated toolsets.
Fortray CySA+ will ensure that the learner gains extensive hands-on experience on the Real & Licensed hardware along with an industry-experienced trainer with only one vision in mind.
Upcoming start dates
Suitability - Who should attend?
Pre-Requisites
There is no official prerequisite for this course. But we highly recommend participants should have basic computer knowledge. Ideally, they should have network+ and Security+ Level knowledge.
Outcome / Qualification etc.
What skills will you learn?
- Threats, Attacks & Vulnerabilities
- Technologies & Tools
- Architecture & Design
- Security Architechture and Tool Set
- Identity & Access Management
- Risk Management
- Cryptography & Pki
- Cyber Incident Response
- Vulnerability Management
- Threat Management
Training Course Content
Identify Security Control Types
- Lecture1.1 Identify Security Control Types (Introduction)
- Lecture1.2 Cyber security Roles and Responsibilities
- Lecture1.3 Security Operations Center (SOC)
- Lecture1.4 Security Control Categories
- Lecture1.5 Selecting Security Controls
Threat Intelligence
- Lecture2.1 Threat Intelligence Sharing (Introduction)
- Lecture2.2 Security and Threat Intelligence
- Lecture2.3 Intelligence Cycle
- Lecture2.4 Intelligence Sources
- Lecture2.5 Information Sharing and Analysis Centers
- Lecture2.6 Threat Intelligence Sharing
Classifying Threats
- Lecture3.1 Classifying Threats (Introduction)
- Lecture3.2 Threat Classification
- Lecture3.3 Threat Actors
- Lecture3.4 Malware
- Lecture3.5 Threat Research
- Lecture3.6 Attack Frameworks
- Lecture3.7 Indicator Management
Threat Hunting
- Lecture4.1 Threat Hunting (Introduction)
- Lecture4.2 Threat Modeling
- Lecture4.3 Threat Hunting
- Lecture4.4 Open-source Intelligence
- Lecture4.5 Google Hacking
- Lecture4.6 Profiling Techniques
- Lecture4.7 Harvesting Techniques
Network Forensics
- Lecture5.1 Network Forensics (Introduction)
- Lecture5.2 Network Forensic Tools
- Lecture5.3 tcpdump
- Lecture5.4 Wireshark
- Lecture5.5 Flow Analysis
- Lecture5.6 IP and DNS Analysis
- Lecture5.7 URL Analysis
- Lecture5.8 Conduct Packet Analysis
Appliance Monitoring
- Lecture6.1 Appliance Monitoring (Introduction)
- Lecture6.2 Firewall Logs
- Lecture6.3 Firewall Configurations
- Lecture6.4 Proxy Logs
- Lecture6.5 Web Application Firewall Logs
- Lecture6.6 IDS and IPS Configuration
- Lecture6.7 IDS and IPS Logs
- Lecture6.8 Port Security Configuration
- Lecture6.9 NAC Configuration
- Lecture6.10 Analysis of Security Appliances
Endpoint Monitoring
- Lecture7.1 Endpoint Monitoring (Introduction)
- Lecture7.2 Endpoint Analysis
- Lecture7.3 Sandboxing
- Lecture7.4 Reverse Engineering
- Lecture7.5 Malware Exploitation
- Lecture7.6 Behavior Analysis
- Lecture7.7 Malware Analysis
- Lecture7.8 EDR Configuration
- Lecture7.9 Blacklisting and Whitelisting
Email Monitoring
- Lecture8.1 Email Monitoring (Introduction)
- Lecture8.2 Email IOCs
- Lecture8.3 Email Header Analysis
- Lecture8.4 Email Content Analysis
- Lecture8.5 Email Server Security
- Lecture8.6 SMTP Log Analysis
- Lecture8.7 Email Message Security
- Lecture8.8 Analyzing Email Headers
Configure Your Siem
- Lecture9.1 Configuring Your SIEM (Introduction)
- Lecture9.2 SIEM
- Lecture9.3 Security Data Collection
- Lecture9.4 Data Normalization
- Lecture9.5 Event Log
- Lecture9.6 Syslog
- Lecture9.7 Configuring a SIEM Agent
Course delivery details
- Virtual Instructor-Led with Remote LAB access 24/7
- On-site
- Classroom Instructor-Led
Expenses
Price: £800.00
Request info
Fortray Global Services
Fortray Global Services LTD experience in delivering IT and Cyber Security Solution & Services | Training Including Job placement programs in every sector of IT | Technical Recruitment | Digital Marketing & SEO and much more. As authorized partners of...