CompTIA Cybersecurity Analyst (CySA+) CS0-001

50 Hours / Access Length: 12 Months / Delivery: Online, Self-Paced

Course Overview:

CySA+ is the only intermediate high-stakes cybersecurity analyst certification with performance-based questions covering security analytics, intrusion detection and response. High-stakes exams are proctored at a Pearson VUE testing center in a highly secure environment. CySA+ is the most up-to-date security analyst certification that covers advanced persistent threats in a post-2014 cybersecurity environment.

This course includes FREE access for 12 months to a cloud based lab platform to assist students develop the practical information technology (IT) skills necessary to succeed in high in demand IT jobs.  This cloud based lab solution uses real equipment that enables our students to execute each practical task in a safe environment that is accessible from anywhere without needing to buy their own hardware or risk damage to their own system.

Along with providing the necessary hardware in a virtual environment, students gain access to high quality practical exercises that cover many of the exam topics they will encounter on their certifying exams.

This course prepares students to take the CompTIA Cybersecurity Analyst (CySA+) CS0-001 certification exam.

Course Outline:

Chapter 1: Introduction
  • Goals and Methods
  • Who Should Read This Book?
  • Strategies for Exam Preparation
Chapter 2: Applying Environmental Reconnaissance Techniques
  • Procedures/Common Tasks
  • Variables
  • Tools
  • Review All Key Topics
Chapter 3: Analyzing the Results of Network Reconnaissance
  • Point-in-Time Data Analysis
  • Data Correlation and Analytics
  • Data Output
  • Tools
  • Review All Key Topics
Chapter 4: Recommending and Implementing the Appropriate Response and Countermeasure
  • Network Segmentation
  • Honeypot
  • Endpoint Security
  • Group Policies
  • ACLs
  • Hardening
  • Network Access Control
  • Review All Key Topics
Chapter 5: Practices Used to Secure a Corporate Environment
  • Penetration Testing
  • Reverse Engineering
  • Training and Exercises
  • Risk Evaluation
  • Review All Key Topics
Chapter 6: Implementing an Information Security Vulnerability Management Process
  • Identification of Requirements
  • Establish Scanning Frequency
  • Configure Tools to Perform Scans According to Specification
  • Execute Scanning
  • Generate Reports
  • Remediation
  • Ongoing Scanning and Continuous Monitoring
  • Review All Key Topics
Chapter 7: Analyzing Scan Output and Identifying Common Vulnerabilities
  • Analyzing Output Resulting from a Vulnerability Scan
  • Common Vulnerabilities Found in Targets Within an Organization
  • Review All Key Topics
Chapter 8: Identifying Incident Impact and Assembling a Forensic Toolkit
  • Threat Classification
  • Factors Contributing to Incident Severity and Prioritization
  • Forensics Kit
  • Forensic Investigation Suite
  • Review All Key Topics
Chapter 9: The Incident Response Process
  • Stakeholders
  • Purpose of Communication Processes
  • Role-Based Responsibilities
  • Using Common Symptoms to Select the Best Course of Action to Support Incident Response
  • Review All Key Topics
Chapter 10: Incident Recovery and Post-Incident Response
  • Containment Techniques
  • Eradication Techniques
  • Validation
  • Corrective Actions
  • Incident Summary Report
  • Review All Key Topics
Chapter 11: Frameworks, Policies, Controls, and Procedures
  • Regulatory Compliance
  • Frameworks
  • Policies
  • Controls
  • Procedures
  • Verifications and Quality Control
  • Review All Key Topics
Chapter 12: Remediating Security Issues Related to Identity and Access Management
  • Security Issues Associated with Context-Based Authentication
  • Security Issues Associated with Identities
  • Security Issues Associated with Identity Repositories
  • Security Issues Associated with Federation and Single Sign-on
  • Exploits
  • Review All Key Topics
Chapter 13: Security Architecture and Implementing Compensating Controls
  • Security Data Analytics
  • Manual Review
  • Defense in Depth
  • Review All Key Topics
Chapter 14: Application Security Best Practices
  • Best Practices During Software Development
  • Secure Coding Best Practices
  • Review All Key Topics
Chapter 15: Using Cybersecurity Tools and Technologies
  • Preventative Tools
  • Collective Tools
  • Analytical Tools
  • Exploit Tools
  • Forensics Tools
  • Review All Key Topics
Chapter 16: Module 1: Threat Management
  • Lesson 1: Reconnaissance Techniques
  • Lesson 2: Network Reconnaissance
  • Lesson 3: Response and Counter Measures
  • Lesson 4: Securing Corporate Environments
Chapter 17: Module 2: Vulnerability Management
  • Lesson 5: Implementing the Information Security Vulnerability Management Process
  • Lesson 6: Analyze Output of Vulnerability Scan
  • Lesson 7: Compare and Contrast Common Vulnerabilities
Chapter 18: Module 3: Cyber Incident Response
  • Lesson 8: Determine Impact of an Incident
  • Lesson 9: Forensics Tools and Investigation
  • Lesson 10: Incident Reporting and Communications
  • Lesson 11: Analyzing Incident Response Symptoms and Recovery Techniques
  • Lesson 12: Post-Incident Response Process
Chapter 19: Module 4: Security Architectures and Tool Sets
  • Lesson 13: Frameworks, Common Policies, Controls, and Procedures
  • Lesson 14: Access Control and Access Management Remediation
  • Lesson 15: Reviewing Security Architectures
  • Lesson 16: Software Development Lifecycle (SDLC) Best Practices
  • Lesson 17: Cybersecurity Tools and Technologies
CompTIA Cybersecurity Analyst (CySA+) Live Labs

All necessary course materials are included.


This course prepares students to take the CompTIA Cybersecurity Analyst (CySA+) CS0-001 certification exam.

System Requirements:

Internet Connectivity Requirements:
  • Cable and DSL internet connections are recommended.
Hardware Requirements:
  • Minimum Pentium 400 Mhz CPU or G3 Macintosh. 1 GHz or greater CPU recommended.
  • 256MB RAM minimum. 1 GB RAM recommended.
  • 800x600 video resolution minimum. 1025x768 recommended.
  • Speakers/Headphones to listen to Dialogue steaming audio sessions.
  • A microphone to speak in Dialogue streaming audio sessions.
Operating System Requirements:
  • Windows Vista, 7, 8, 8.1, 9, 10
  • Mac OSX 10 or higher.
  • OpenSUSE Linux 9.2 or higher.
Web Browser Requirements:
  • Google Chrome is recommended.
  • Firefox 13.x or greater.
  • Internet Explorer 6.x or greater.
  • Safari 3.2.2 or greater.
Software Requirements:
  • Adobe Flash Player 6 or greater.
  • Oracle Java 7 or greater.
  • Adobe Reader 7 or greater.
Web Browser Settings:
  • Accept Cookies
  • Disable Pop-up Blocker.

** Outlines are subject to change, as courses and materials are updated. Software is not included with the purchase of the course, unless otherwise specified. Students are responsible for the purchase and installation of the necessary course software. **