CompTIA Cybersecurity Analyst Course in Johannesburg

CompTIA Cybersecurity Analyst (CySA+) Course

The CompTIA Cybersecurity Analyst (CSA+) certification is a vendor-neutral credential. The CompTIA CSA+ exam is an internationally targeted validation of intermediate-level security skills and knowledge. While there is no required prerequisite, the CompTIA CSA+ certification is intended to follow CompTIA Security+ or equivalent experience and has a technical, “handson” focus on IT security analytics.
  • The course will certify that the successful candidate has the knowledge and skills required to configure and use threat detection tools, perform data analysis, and interpret the results to identify vulnerabilities, threats, and risks to an organization with the end goal of securing and protecting applications and systems within an organization.
Duration: 5 days   |   Location : Online
Course Prerequisites:
3-4 years of hands-on information security or related experience Network+, Security+, or equivalent knowle... Show More
Request A Quote View CompTIA Roadmap

Virtual Interactive Lecturer-led Teaching (VILT)

Virtual instruction environments are designed to simulate the traditional classroom or learning experience. Instructor-led training is still the number one delivery method of choice because it allows you to interact and discuss the training material, either individually or in a group setting, and you gain access to expert knowledge from certified instructors. This form of guided learning is impactful and produces positive learning outcomes. Day, evening and Saturday classes are offered.

Test your skills

Complete our assessment and test your skill level!

Course Content

1.0 Threat Management

Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes.

  • Procedures/common tasks
  • Variables
  • Tools

See fewer details

Given a scenario, analyze the results of a network reconnaissance.

  • Point-in-time data analysis
  • Data correlation and analytics
  • Data output
  • Tools

+ See more details

Given a network-based threat, implement or recommend the appropriate response and countermeasure.

  • Network segmentation
  • Honeypot
  • Endpoint security
  • Group policies
  • ACLs
  • Hardening
  • Network Access Control (NAC)

+ See more details

Explain the purpose of practices used to secure a corporate environment.

  • Penetration testing
  • Reverse engineering
  • Training and exercises
  • Risk evaluation

+ See more details

2.0 Vulnerability Management

Given a scenario, implement an information security vulnerability management process.

  • Identification of requirements
  • Establish scanning frequency
  • Configure tools to perform scans according to specification
  • Execute scanning
  • Generate reports
  • Remediation
  • Ongoing scanning and continuous monitoring

+ See more details

Given a scenario, analyze the output resulting from a vulnerability scan.

  • Analyze reports from a vulnerability Scan
  • Validate results and correlate other data points

+ See more details

Compare and contrast common vulnerabilities found in the following targets within an organization.

  • Servers
  • Endpoints
  • Network infrastructure
  • Network appliances
  • Virtual infrastructure
  • Mobile devices
  • Interconnected networks
  • Virtual private networsk (VPNs)
  • Industrial Control Systems (ICSs)
  • SCADA devices

+ See more details

3.0 Cyber Incident Response

Given a scenario, distinguish threat data or behavior to determine the impact of an incident.

  • Threat classification
  • Factors contributing to incident severity and prioritization

+ See more details

Given a scenario, prepare a toolkit and use appropriate forensics tools during an investigation.

  • Forensics kit
  • Forensic investigation suite

+ See more details

Explain the importance of communication during the incident response process.

  • Stakeholders
  • Purpose of communication processes
  • Role-based responsibilities

+ See more details

Given a scenario, analyze common symptoms to select the best course of action to support incident response.

  • Common network-related symptoms
  • Common host-related symptoms
  • Common application-related symptoms

+ See more details

Summarize the incident recovery and post-incident response process.

  • Containment techniques
  • Eradication techniques
  • Validation
  • Corrective actions
  • Incident summary report

+ See more details

4.0 Security Architecture and Tool Sets

Explain the relationship between frameworks, common policies, controls, and procedures.

  • Regulatory compliance
  • Frameworks
  • Policies controls
  • Procedures
  • Verifications and quality control

+ See more details

Given a scenario, use data to recommend remediation of security issues related to identity and access management.

  • Security issues associated with context-based authentication
  • Security issues associated with identities
  • Security issues associated with identity repositories
  • Security issues associated with federation and single sign-on
  • Exploits

+ See more details

Given a scenario, review security architecture and make recommendations to implement compensating controls.

  • Security data analytics
  • Manual review
  • Defense in depth
  • Technologies
  • Other security concepts

+ See more details

Given a scenario, use application security best practices while participating in the Software Development Life Cycle (SDLC).

  • Best practices during software development
  • Secure coding best practices

+ See more details

Compare and contrast the general purpose and reasons for using various cybersecurity tools and technologies.

  • Preventative
  • Collective
  • Analytical
  • Exploit
  • Forensics

+ See more details

CTU Training Solutions , Updated: September 13th, 2021

Request A Quote

The course information above is subject to change without notification due to market trends in the industry, legislation and/or programme version updates. Terms and Conditions

Open chat
Need Help?
How can we assist you today?