CompTIA CySA+ (CS0-002)

Paths

CompTIA CySA+ (CS0-002)

Author: Dale Meredith

This series provides the knowledge and skills required to prevent, detect, and mitigate information/cyber security threats and vulnerabilities through continuous security... Read more

What you will learn

  • The importance of proactive threat hunting
  • The importance of data privacy and protection
  • The importance of security concepts in support of organizational risk mitigation
  • The importance of frameworks, policies, procedures, and controls
  • How threat intelligence can be used to support organizational security
  • How to perform vulnerability management activities
  • How to identify threats and vulnerabilities associated with specialized technology
  • How to apply controls to mitigate attacks and software vulnerabilities
  • How to apply security solutions for infrastructure management
  • The best practices for hardware assurance
  • The best practices for software assurance
  • How to identify threats and vulnerabilities associated with operating in the cloud
  • The concepts and technologies associated with automation
  • The importance of threat data and intelligence
  • How to analyze the output from common vulnerability assessment tools
  • How to analyze data as part of security monitoring activities
  • How to implement configuration changes to existing controls to improve security
  • The importance of the incident response process
  • How to apply the appropriate incident response procedure
  • How to analyze potential indicators of compromise
  • How to utilize basic digital forensics techniques

Pre-requisites

CompTIA recommends CySA+ candidates have 4 years of hands-on information/cyber security job role experience. This path does recommend Security+ and Network+, or equivalent knowledge and experience, prior to viewing.

CompTIA CySA+ (CS0-002)

In this series, you’ll learn how to perform data analysis, interpret the results to identify vulnerabilities, threats, and risks to an organization, and proactively defend the information security of an organization. These courses will also help you prepare for the CompTIA CySA+ (Cybersecurity Analyst, CSO-002) certification exam.

Security Analysis for CompTIA CySA+

by Dale Meredith

Aug 14, 2020 / 2h 35m

2h 35m

Start Course
Description

The security market is changing rapidly, in fact most enterprises believe that security management has become significantly more difficult. Why? Most companies are reactive instead of proactive when it comes to securing their networks, resources and data.

In this course, Security Analysis for CompTIA CySA+, you’ll learn the foundational skills required as a CySA+ professional. First, you’ll explore the importance of treating data and intelligence that every industry should consider. Next, you’ll discover how to evaluate the risk mitigation of any organization, including chain-supply assessment. Finally, you’ll learn how to proactively hunt for threats, understand your nemesis, and protect your data. When you’re finished with this course, you’ll have the skills and knowledge of a cybersecurity analyst needed to monitor and protect your organization.

Table of contents
  1. Course Overview
  2. The Importance of Threat Data and Intelligence
  3. Understanding Data Privacy and Protection
  4. Applying Risk Mitigation
  5. Utilizing Threat Modeling and Hunting Procedures

Compliance and Assessment for CompTIA CySA+

by Dale Meredith

Aug 25, 2020 / 1h 22m

1h 22m

Start Course
Description

Many companies think they’ve covered their resources without making sure they’ve covered their bases. What checklist is there to help you make the right decisions? In this course, Compliance and Assessment for CompTIA CySA+, you’ll learn to how to assess your company’s security profile while making sure you’re in full compliance of any regulations that might apply to your industry.

First, you’ll explore how to utilize your threat intel to support your organization’s security which helps to better protect your resources.

Next, you’ll discover how to apply different security solutions to help you protect and monitor your internal infrastructure.

Finally, you’ll learn how to use industry standard security frameworks, polices, procedures, and control to protect your organization, customers, and employees.

When you’re finished with this course, you’ll have the skills and knowledge of cybersecurity analyst needed to assess and then tackle your organization required compliance.

Table of contents
  1. Course Overview
  2. Establishing Frameworks, Policies, Procedures, and Controls
  3. Utilize Attack Frameworks and Indicator Management
  4. Security Solutions for Infrastructure Management

Threat and Vulnerability Management for CompTIA CySA+

by Dale Meredith

Sep 24, 2020 / 3h 13m

3h 13m

Start Course
Description

Networks aren’t what they used to be. They’re more complex than ever. Systems today are so interconnected and buried within those systems are thousands of undetected security vulnerabilities waiting to be used against you. Vulnerability management systems are designed to recognize, rank, and remediate these vulnerabilities before an attacker gets ahold of them and exploits them to destabilize the privacy, integrity, or availability of your digital assets.

In this course, Threat and Vulnerability Management for CompTIA CySA+, you’ll learn how to better defend your organization from threats by using, tweaking, and understanding a vulnerability management solution.

First, you’ll explore how to design a vulnerability management program, execute vulnerability scans, and report and analyze the results from a scan.

Next, you’ll discover how you can remediate some of the vulnerabilities that you detect.

Finally, you’ll learn how to look at specialty systems including IoT, embedded and mobile devices for issues that might pop up on you.

When you’re finished with this course, you’ll have the skills and knowledge of security analysis needed to detect and mitigate vulnerabilities in your environment.

Table of contents
  1. Course Overview
  2. Implementing a Vulnerability Management Program
  3. Configuring and Implementing Vulnerability Scans
  4. Analyzing Vulnerability Scan Results
  5. Remediating Vulnerabilities
  6. Analyzing Access Control Permissions and Vulnerabilities
  7. Detecting and Preventing Application Security Attacks
  8. Emulating Adversaries to Identify Common Vulnerabilities
  9. Identifying the Threats of Specialized Technologies

Security Solutions for Infrastructure Management for CompTIA CySA+

by Dale Meredith

Oct 15, 2020 / 1h 20m

1h 20m

Start Course
Description

Weaknesses in an infrastructure’s authentication and hardware can make or break your security profile.

In this course, Security Solutions for Infrastructure Management for CompTIA CySA+, you’ll learn to evaluate your infrastructure for any flaws that attackers might leverage against you.

First, you’ll explore the concept of identities and how they’re used throughout your organization.

Next, you’ll discover how to manage your certificates to ensure that traffic and data is secure at rest and while in motion.

Finally, you’ll learn how to utilize some of the industries best practices when it comes to hardware assurance.

When you’re finished with this course, you’ll have the skills and knowledge of security analysis needed to detect and mitigate any weaknesses in your infrastructure.

Table of contents
  1. Course Overview
  2. Establishing Identity and Access Management (IAM) Security Solutions
  3. Managing Digital Identities
  4. Examining Certificate Management
  5. Implementing Best Practices for Hardware Assurance

Software and Systems Security for CompTIA CySA+

by Dale Meredith

Oct 8, 2020 / 2h 23m

2h 23m

Start Course
Description

Most companies have a well-oiled machine with the sole purpose to create, release, and maintain functional software. Still, the growing concerns and risks related with insecure software have brought increased attention to the need to mix security into the development process.

In this course, Software and Systems Security for CompTIA CySA+, you’ll learn to evaluate and integrate security within both software and hardware used by your organization.

First, you’ll explore the Software Development Life Cycle (SDLC) and its security implications to make sure that the software your organization uses is well written and secure all throughout its lifespan.

Next, you’ll discover some best practices as you develop applications to make sure security is not overlooked.

Finally, you’ll learn how to make sure any cloud services that you might inject into your environment are secured to be used to support your apps and systems.

When you’re finished with this course, you’ll have the skills and knowledge of security analysis needed to integrate and evaluate your organization’s software and system security profile.

Table of contents
  1. Course Overview
  2. Examining the Software Development Lifecycle (SDLC)
  3. Implementing Code Reviews
  4. Applying Best Practices of Secure Coding
  5. Utilizing Cloud Computing

Coming Soon

Cloud and Automation for CompTIA CySA+

Coming Soon

by Dale Meredith

Security Operations and Monitoring for CompTIA CySA+

by Dale Meredith

Nov 10, 2020 / 2h 5m

2h 5m

Start Course
Description

How do you create a security profile for your company to stay ahead of attackers? In this course, Security Operations and Monitoring for CompTIA CySA+, you’ll learn to configure your resources to better protect them as well as what Indicators of Compromise (IoC) you should be monitoring. First, you’ll explore the basics of security monitoring. Next, you’ll discover how to setup and monitor the different types of nodes/system on your network. Finally, you’ll learn how to configure various security technologies to help harden your system, devices, and applications from attackers. When you’re finished with this course, you’ll have the skills and knowledge of a security analysist needed to configure your resources to better protect them as well as what Indicators of Compromise (IoC) you should be monitoring.

Table of contents
  1. Course Overview
  2. Implementing Security Monitoring
  3. Handling System Component Monitoring
  4. Examining Network Security Methods
  5. Implementing Endpoint Security
  6. Leveraging Email Analysis

Incident Response and Recovery for CompTIA CySA+

by Dale Meredith

Nov 24, 2020 / 3h 35m

3h 35m

Start Course
Description

When an incident happens, which it will, knowing what to do as well how to recover is imperative. In this course, Incident Response and Recovery for CompTIA CySA+, you’ll learn to the skills needed to communicate and coordinate response efforts, and how to recover systems that were affected.

First, you’ll explore how to prepare for incidents as well as any legal aspects that you might have to take into consideration for your organization.

Next, you’ll discover how to create effective communications during an incident and the steps you should follow to make sure you’re covering your bases.

Finally, you’ll learn how to recover systems, applications, and devices that were affected during the incident.

When you’re finished with this course, you’ll have the skills and knowledge of a security analysis needed to communicate response efforts and recover affected systems.

Table of contents
  1. Course Overview
  2. Preparing and Planning for Incidents
  3. Examining the Incident Response Process
  4. Analyzing Host Related IoCs
  5. Investigating Network and Application Incidents
  6. Examining the Post-incident Workflow