MCSEClasses Certification Training Boot Camp MCSE MCSD MCDBA Cisco CIW Linux Oracle Java Security Military Discounts Testimonials About Us Linux/Unix Certification MCSD Certification Home MCSE Certification MCDBA Certification Cisco Certification Security Certification Java Certification Oracle® Certification CIW Certification Jobs Boot Camp Financing Boot Camp Pricing Boot Camp Technical Schedule Contact Us


CompTIA Security+ / CySA+

Course Length: 10 days
Certifications: CompTIA Security+
CompTIA Cybersecurity Analyst (CySA+)
Number of Exams: 2

Class Schedule
Call for Class Schedule
  • Certified Instructor
  • Includes all course materials
  • The CompTIA Security+ exam will certify that the successful candidate has the knowledge and skills required to identify risk, to participate in risk mitigation activities, and to provide infrastructure, application, information, and operational security.

    CompTIA Cybersecurity Analyst (CySA+) is an international, vendor-neutral cybersecurity certification that applies behavioral analytics to improve the overall state of IT security. CySA+ validates critical knowledge and skills that are required to prevent, detect and combat cybersecurity threats.


    CompTIA Security+

    CompTIA Security+ (SY0-701) is a global certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career.

    Open the Door to Your Cybersecurity Career

    Launch a successful cybersecurity career

    Develop a core foundation of essential skills, paving the way for a fulfilling career. More job roles use Security+ for baseline cybersecurity skills than any other certification in the industry.

    Assess on-the-job skills

    Security+ is the most widely adopted ISO/ANSI-accredited early career cybersecurity certification on the market with hands-on, performance-based questions on the certification exam. These practical questions assess your ability to effectively problem solve in real-life situations and demonstrate your expertise to potential employers immediately.

    Embrace the latest trends

    Understand and use the most recent advancements in cybersecurity technology, terms, techniques, and tools. By acquiring early career skills in the latest trends such as automation, zero trust, risk analysis, operational technology, and IoT, you will be well-equipped to excel in the ever-evolving cybersecurity landscape.

    Exam SY0-701

    The new CompTIA Security+ represents the latest and greatest in cybersecurity, covering the most in-demand skills related to current threats, automation, zero trust, IoT, risk - and more. Once certified, you'll understand the core skills needed to succeed on the job - and employers will notice too. The Security+ exam verifies you have the knowledge and skills required to:

    • Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions.
    • Monitor and secure hybrid environments, including cloud, mobile, Internet of Things (IoT), and operational technology.
    • Operate with an awareness of applicable regulations and policies, including principles of governance, risk, and compliance.
    • Identify, analyze, and respond to security events and incidents.

    CompTIA Security+ is compliant with ISO 17024 standards and approved by the U.S. DoD to meet directive 8140/8570.01-M requirements. Regulators and government rely on ANSI accreditation because it provides confidence and trust in the outputs of an accredited program. Over 2.3 million CompTIA ISO/ANSI-accredited exams have been delivered since January 1, 2011.

    What Skills Will You Learn?

    General Security Concepts

    Includes key cybersecurity terminology and concepts up front to provide a foundation for security controls discussed throughout the exam.

    Threats, Vulnerabilities & Mitigations

    Focuses on responding to common threats, cyberattacks, vulnerabilities, and security incidents and appropriate mitigation techniques to monitor and secure hybrid environments.

    Security Architecture

    Includes security implications of different architecture models, principles of securing enterprise infrastructure, and strategies to protect data.

    Security Operations

    Includes applying and enhancing security and vulnerability management techniques, as well as security implications of proper hardware, software, and data management.

    Security Program Management & Oversight

    Updated to better reflect the reporting and communication skills required for Security+ job roles relating to governance, risk management, compliance, assessment, and security awareness.

    Jobs You Can Land With CompTIA Security+

    • Cloud Penetration Tester
    • Network Security Operations
    • Penetration Tester
    • Network Security Analyst
    • Web App Penetration Tester
    • Security Architect

    Course Content

    1.0 General Security Concepts
    Compare and contrast various types of security controls.
    • Categories
    • Control types
    Summarize fundamental security concepts.
    • Confidentiality, Integrity, and Availability (CIA)
    • Non-repudiation
    • Authentication, Authorization, and Accounting (AAA)
    • Gap analysis
    • Zero Trust
    • Physical security
    • Deception and disruption technology
    Explain the importance of change management processes and the impact to security.
    • Business processes impacting security operation
    • Technical implications
    • Documentation
    • Version control
    Explain the importance of using appropriate cryptographic solutions.
    • Public key infrastructure (PKI)
    • Encryption
    • Tools
    • Obfuscation
    • Steganography
    • Tokenization
    • Data masking
    • Hashing
    • Salting
    • Digital signatures
    • Key stretching
    • Blockchain
    • Open public ledger
    • Certificates
    2.0 Threats, Vulnerabilities, and Mitigations
    Compare and contrast common threat actors and motivations.
    • Threat actors
    • Attributes of actors
    • Motivations
    Explain common threat vectors and attack surfaces.
    • Message-based
    • Email
    • Short Message Service (SMS)
    • Instant messaging (IM)
    • Image-based
    • File-based
    • Voice call
    • Removable device
    • Vulnerable software
    • Unsupported systems and applications
    • Unsecure networks
    • Open service ports
    • Default credentials
    • Supply chain
    • Human vectors/social engineering
    Explain various types of vulnerabilities.
    • Application
    • Operating system (OS)-based
    • Web-based
    • Hardware
    • Virtualization
    • Cloud-specific
    • Supply chain
    • Cryptographic
    • Misconfiguration
    • Mobile device
    • Zero-day
    Given a scenario, analyze indicators of malicious activity.
    • Malware attacks
    • Physical attacks
    • Network attacks
    • Application attacks
    • Cryptographic attacks
    • Password attacks
    • Indicators
    Explain the purpose of mitigation techniques used to secure the enterprise.
    • Segmentation
    • Access control
    • Application allow list
    • Isolation
    • Patching
    • Encryption
    • Monitoring
    • Least privilege
    • Configuration enforcement
    • Decommissioning
    • Hardening techniques
    3.0 Security Architecture
    Compare and contrast security implications of different architecture models.
    • Architecture and infrastructure concepts
    • Considerations
    Given a scenario, apply security principles to secure enterprise infrastructure.
    • Infrastructure considerations
    • Secure communication/access
    • Selection of effective controls
    Compare and contrast concepts and strategies to protect data.
    • Data types
    • Data classifications
    • General data considerations
    • Methods to secure data
    Explain the importance of resilience and recovery in security architecture.
    • High availability
    • Site considerations
    • Platform diversity
    • Multi-cloud systems
    • Continuity of operations
    • Capacity planning
    • Testing
    • Backups
    • Power
    4.0 Security Operations
    Given a scenario, apply common security techniques to computing resources.
    • Secure baselines
    • Hardening targets
    • Wireless devices
    • Mobile solutions
    • Wireless security settings
    • Application security
    • Sandboxing
    • Monitoring
    Explain the security implications of proper hardware, software, and data asset management.
    • Acquisition/procurement process
    • Assignment/accounting
    • Monitoring/asset tracking
    • Disposal/decommissioning
    Explain various activities associated with vulnerability management.
    • Identification methods
    • Analysis
    • Vulnerability response and remediation
    • Validation of remediation
    • Reporting
    Explain security alerting and monitoring concepts and tools.
    • Monitoring computing resources
    • Activities
    • Tools
    Given a scenario, modify enterprise capabilities to enhance security.
    • Firewall
    • IDS/IPS
    • Web filter
    • Operating system security
    • Implementation of secure protocols
    • DNS filtering
    • Email security
    • File integrity monitoring
    • DLP
    • Network access control (NAC)
    • Endpoint detection and response (EDR)/extended detection and response (XDR)
    • User behavior analytics
    Given a scenario, implement and maintain identity and access management.
    • Provisioning/de-provisioning user accounts
    • Permission assignments and implications
    • Identity proofing
    • Federation
    • Single sign-on (SSO)
    • Interoperability
    • Attestation
    • Access controls
    • Multifactor authentication
    • Password concepts
    • Privileged access management tools
    Explain the importance of automation and orchestration related to secure operations.
    • Use cases of automation and scripting
    • Benefits
    • Other considerations
    Explain appropriate incident response activities.
    • Process
    • Training
    • Testing
    • Root cause analysis
    • Threat hunting
    • Digital forensics
    Given a scenario, use data sources to support an investigation.
    • Log data
    • Data sources
    5.0 Security Program Management and Oversight
    Summarize elements of effective security governance.
    • Guidelines
    • Policies
    • Standards
    • Procedures
    • External considerations
    • Monitoring and revision
    • Types of governance structures
    • Roles and responsibilities for systems and data
    Explain elements of the risk management process.
    • Risk identification
    • Risk assessment
    • Risk analysis
    • Risk register
    • Risk tolerance
    • Risk appetite
    • Risk management strategies
    • Risk reporting
    • Business impact analysis
    Explain the processes associated with third-party risk assessment and management.
    • Vendor assessment
    • Vendor selection
    • Agreement types
    • Vendor monitoring
    • Questionnaires
    • Rules of engagement
    Summarize elements of effective security compliance.
    • Compliance reporting
    • Consequences of non-compliance
    • Compliance monitoring
    • Privacy
    Explain types and purposes of audits and assessments.
    • Attestation
    • Internal
    • External
    • Penetration testing
    Given a scenario, implement security awareness practices.
    • Phishing
    • Anomalous behavior recognition
    • User guidance and training
    • Reporting and monitoring
    • Development
    • Execution

    [ back to top ]

    CompTIA Cybersecurity Analyst (CySA+)

    CompTIA Cybersecurity Analyst (CySA+) is an international, vendor-neutral cybersecurity certification that applies behavioral analytics to improve the overall state of IT security. CySA+ validates critical knowledge and skills that are required to prevent, detect and combat cybersecurity threats.

    Overview

    As attackers have learned to evade traditional signature-based solutions such as firewalls, an analytics-based approach within the IT security industry is increasingly important for most organizations. The behavioral analytics skills covered by CySA+ identify and combat malware, and advanced persistent threats (APTs), resulting in enhanced threat visibility across a broad attack surface. CompTIA CySA+ is for IT professionals looking to gain the following security analyst skills:

    • Configure and use threat detection tools.
    • Perform data analysis.
    • Interpret the results to identify vulnerabilities, threats and risks to an organization.
    CySA+ certified skills are in-demand

    Properly trained IT security staff who can analyze, monitor and protect cybersecurity resources are in high demand. The U.S. Bureau of Labor Statistics (BLS) predicts that information security analysts will be the fastest growing overall job category, with 37 percent overall growth between 2012 and 2022.

    CySA+ is globally recognized

    CompTIA CySA+ is ISO/ANSI 17024 accredited and is awaiting approval by the U.S. Department of Defense (DoD) for directive 8140/8570.01-M requirements.

    CySA+ provides substantial earnings potential

    A career in information security analysis ranked seventh on U.S. News and World Report's list of the 100 best technology jobs for 2017. According to the Bureau of Labor Statistics, the median pay for an information security analyst is $90,120 per year.

    Target Student

    The CompTIA CySA+ examination is designed for IT security analysts, vulnerability analysts or threat intelligence analysts. The exam will certify that the successful candidate has the knowledge and skills required to configure and use threat detection tools, perform data analysis and interpret the results to identify vulnerabilities, threats and risks to an organization with the end goal of securing and protecting applications and systems within an organization.

    Prerequisite

    The CompTIA CySA+ exam is an internationally targeted validation of intermediate-level security skills and knowledge. While there is no required prerequisite, the CompTIA CySA+ certification is intended to follow CompTIA Security+ or equivalent experience and has a technical, "hands-on" focus on IT security analytics.

    It is recommended for CompTIA CySA+ certification candidates to have the following:

    • 3-4 years of hands-on information security or related experience
    • Network+, Security+ or equivalent knowledge

    Course Content

    Threat Management
    • Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes.
    • Given a scenario, analyze the results of a network reconnaissance.
    • Given a network-based threat, implement or recommend the appropriate response and countermeasure.
    • Explain the purpose of practices used to secure a corporate environment.
    Vulnerability Management
    • Given a scenario, implement an information security vulnerability management process.
    • Given a scenario, analyze the output resulting from a vulnerability scan.
    • Compare and contrast common vulnerabilities found in the following targets within an organization.
    Cyber Incident Response
    • Given a scenario, distinguish threat data or behavior to determine the impact of an incident.
    • Given a scenario, prepare a toolkit and use appropriate forensics tools during an investigation.
    • Explain the importance of communication during the incident response process.
    • Given a scenario, analyze common symptoms to select the best course of action to support incident response.
    • Summarize the incident recovery and post-incident response process.
    Security Architecture and Tool Sets
    • Explain the relationship between frameworks, common policies, controls, and procedures.
    • Given a scenario, use data to recommend remediation of security issues related to identity and access management.
    • Given a scenario, review security architecture and make recommendations to implement compensating controls.
    • Given a scenario, use application security best practices while participating in the Software Development Life Cycle (SDLC).
    • Compare and contrast the general purpose and reasons for using various cybersecurity tools and technologies.

    [ back to top ]


    MCSEClasses.com is your best choice for CompTIA Security+ CySA+, CompTIA Security+ CySA+ training, CompTIA Security+ CySA+ certification, CompTIA Security+ CySA+ certification boot camp, CompTIA Security+ CySA+ boot camp, CompTIA Security+ CySA+ certification training, CompTIA Security+ CySA+ boot camp training, CompTIA Security+ CySA+ boot camp certification, CompTIA Security+ CySA+ certification course, CompTIA Security+ CySA+ course, training CompTIA Security+ CySA+, certification CompTIA Security+ CySA+, boot camp CompTIA Security+ CySA+, certification CompTIA Security+ CySA+ boot camp, certification CompTIA Security+ CySA+ training, boot camp CompTIA Security+ CySA+ training, certification CompTIA Security+ CySA+ course.



    mcseclasses home | technical schedule | application schedule | class outlines | mcse, mcdba, mcsd training | microsoft .net | cisco certification | security training | ced solutions oracle® certification training | linux, unix, aix | comptia certification | webmaster training | pricing | locations | financing | instructors needed | e-mail us





    Search classes by keyword:


    Search classes by category:

    Copyright © 2024 CED Solutions. CED Solutions Refund Policy. All Rights Reserved.

    MCSE certification boot camps and courses are offered in these select cities: Albany MCSE, Albuquerque MCSE, Alexandria MCSE, Anchorage MCSE, Atlanta MCSE, Austin MCSE, Billings MCSE, Birmingham MCSE, Bismarck MCSE, Boise MCSE, Boston MCSE, Charleston MCSE, Charlotte MCSE, Cheyenne MCSE, Chicago MCSE, Cincinnati MCSE, Cleveland MCSE, Columbia MCSE, Columbus MCSE, Dallas MCSE, Denver MCSE, Des Moines MCSE, Detroit MCSE, Hartford MCSE, Honolulu MCSE, Houston MCSE, Indianapolis MCSE, Jackson MCSE, Kansas City MCSE, Las Cruces MCSE, Lincoln MCSE, Little Rock MCSE, Los Angeles MCSE, Louisville MCSE, Madison MCSE, Milwaukee MCSE, Minneapolis MCSE, Montpelier MCSE, New Orleans MCSE, New York City MCSE, Norfolk MCSE, Oklahoma City MCSE, Omaha MCSE, Philadelphia MCSE, Phoenix MCSE, Pierre MCSE, Pittsburgh MCSE, Portland MCSE, Princeton MCSE, Providence MCSE, Raleigh MCSE, Richmond MCSE, Sacramento MCSE, Salt Lake City MCSE, San Antonio MCSE, San Diego MCSE, San Francisco MCSE, San Jose MCSE, Seattle MCSE, Stamford MCSE, Tulsa MCSE, Washington MCSE, Wilmington MCSE.

    MCSE Canada Boot Camps : mcse Calgary, mcse Edmonton, mcse Halifax, mcse Hamilton, mcse Kitchener, mcse London, mcse Montreal, mcse Ottawa, mcse Quebec City, mcse Toronto, mcse Vancouver, mcse Winnipeg.

    CED Solutions offers MCSE certification boot camps and courses in the United States: MCSE Alabama, MCSE Alaska, MCSE Arizona, MCSE Arkansas, MCSE California, MCSE Colorado, MCSE Connecticut, MCSE District of Columbia, MCSE Delaware, MCSE Georgia, MCSE Hawaii, MCSE Idaho, MCSE Illinois, MCSE Indiana, MCSE Iowa, MCSE Kansas, MCSE Kentucky, MCSE Louisiana, MCSE Maine, MCSE Massachusetts, MCSE Michigan, MCSE Minnesota, MCSE Mississippi, MCSE Missouri, MCSE Montana, MCSE Nebraska, MCSE New Jersey, MCSE New Mexico, MCSE New York, MCSE North Carolina, MCSE North Dakota, MCSE Ohio, MCSE Oklahoma, MCSE Oregon, MCSE Pennsylvania, MCSE Rhode Island, MCSE South Carolina, MCSE South Dakota, MCSE Texas, MCSE Utah, MCSE Vermont, MCSE Virginia, MCSE Washington, MCSE West Virginia, MCSE Wisconsin, MCSE Wyoming.

    MCSE Canada Boot Camps : Alberta mcse, British Columbia mcse, Manitoba mcse, New Brunswick mcse, Newfoundland mcse, Nova Scotia mcse, Ontario mcse, Saskatchewan mcse. Quebec mcse.