• CATALOG
  • MILITARY
  • FINANCIAL ASSISTANCE
  • LOGIN
      Forget your password?
  • Open Search Dialog
Home > Training Programs > Cybersecurity > CompTIA CySA+ Training Boot Camp

CompTIA CySA+ Training Boot Camp

Learn how to use behavioral analytics to prevent, detect and combat cyber threats! This boot camp provides the most comprehensive approach to earning CompTIA's intermediate-level Cybersecurity Analyst (CySA+) certification.

Infosec-CompTIA-CySA-Plus-Training-Boot-Camp
$2,999.00 (USD)

Have a question?We're here to help

Overview

Objective

Outline

  1. Day 1 - Threat and Vulnerability Management
    1. Explain the importance of threat data and intelligence
      1. Intelligence sources
      2. Confidence levels
      3. Indicator management
      4. Threat classification
      5. Threat actors
      6. Intelligence cycle
      7. Commodity malware
      8. Information sharing and analysis communities
    2. Given a scenario, utilize threat intelligence to support organizational security
      1. Attack frameworks
      2. Threat research
      3. Threat modeling methodologies
      4. Threat intelligence sharing with supported functions
    3. Given a scenario, perform vulnerability management activities
      1. Vulnerability identification
      2. Validation
      3. Remediation/Mitigation
      4. Scanning parameters and criteria
    4. Given a scenario, analyze the output from common vulnerability assessment tools
      1. Web application scanner
      2. Infrastructure vulnerability scanner
      3. Software assessment tools and techniques
      4. Enumeration
      5. Wireless assessment tools
      6. Cloud infrastructure assessment tools
    5. Explain the threats and vulnerabilities associated with specialized technology
      1. Mobile
      2. Internet of Things (IoT)
      3. Embedded
      4. Real-time operating system (RTOS)
      5. System-on-Chip (SoC)
      6. Field programmable gate array (FPGA)
      7. Physical access control
      8. Building automation systems
      9. Vehicles and drones
      10. Workflow and process automation systems
      11. Industrial control system
      12. Supervisory control and data acquisition (SCADA)
    6. Explain the threats and vulnerabilities associated with operating in the cloud
      1. Cloud service models
      2. Cloud deployment models
      3. Function as a Service (FaaS)/serverless architecture
      4. Infrastructure as code (IaC)
      5. Insecure application programming interface (API)
      6. Improper key management
      7. Unprotected storage
      8. Logging and monitoring
    7. Given a scenario, implement controls to mitigate attacks and software vulnerabilities
      1. Attack types
      2. Vulnerabilities
  2. Day 2 - Software and Systems Security
    1. Given a scenario, apply security solutions for infrastructure management
      1. Cloud vs. on-premises
      2. Asset management
      3. Segmentation
      4. Network architecture
      5. Change management
      6. Virtualization
      7. Containerization
      8. Identity and access management
      9. Cloud access security broker (CASB)
      10. Honeypot
      11. Monitoring and logging
      12. Encryption
      13. Certificate management
      14. Active defense
    2. Explain software assurance best practices
      1. Platforms
      2. Software development life cycle (SDLC) integration
      3. DevSecOps
      4. Software assessment methods
      5. Secure coding best practices
      6. Static analysis tools
      7. Dynamic analysis tools
      8. Formal methods for verification of critical software
      9. Service-oriented architecture
      10. Markup Language (SAML)
    3. Explain hardware assurance best practices
      1. Hardware root of trust
      2. Unified Extensible Firmware Interface (UEFI)
      3. Trusted foundry
      4. Secure processing
      5. Anti-tamper
      6. Self-encrypting drive
      7. Trusted firmware updates
      8. Measured boot and attestation
      9. Bus encryption
  3. Day 3 - Security Operations and Monitoring
    1. Given a scenario, analyze data as part of security monitoring activities
      1. Heuristics
      2. Trend analysis
      3. Endpoint
      4. Network
      5. Log review
      6. Impact analysis
      7. Security information and event management (SIEM) review
      8. Query writing
      9. Email analysis
    2. Given a scenario, implement configuration changes to existing controls to improve security
      1. Permissions
      2. Allowlisting
      3. Denylisting
      4. Firewall
      5. Intrusion prevention system (IPS) rules
      6. Data loss prevention (DLP)
      7. Endpoint detection and response (EDR)
      8. Network access control (NAC)
      9. Sinkholing
      10. Malware signatures
      11. Sandboxing
      12. Port security
    3. Explain the importance of proactive threat hunting
      1. Establishing a hypothesis
      2. Profiling threat actors and activities
      3. Threat hunting tactics
      4. Reducing the attack surface area
      5. Bundling critical assets
      6. Attack vectors
      7. Integrated intelligence
      8. Improving detection capabilities
    4. Compare and contrast automation concepts and technologies
      1. Workflow orchestration
      2. Scripting
      3. Application programming interface (API) integration
      4. Automated malware signature creation
      5. Data enrichment
      6. Threat feed combination
      7. Machine learning
      8. Use of automation protocols and standards
      9. Continuous integration
      10. Continuous deployment/delivery
  4. Day 4 - Incident Response
    1. Explain the importance of the incident response process
      1. Communication plan
      2. Response coordination with relevant entities
      3. Factors contributing to data criticality
    2. Given a scenario, apply the appropriate incident response procedure
      1. Preparation
      2. Detection and analysis
      3. Containment
      4. Eradication and recovery
      5. Post-incident activities
    3. Given an incident, analyze potential indicators of compromisee
      1. Network-related
      2. Host-related
      3. Application-related
    4. Given a scenario, utilize basic digital forensics techniques
      1. Network
      2. Endpoint
      3. Mobile
      4. Cloud
      5. Virtualization
      6. Legal hold
      7. Procedures
      8. Hashing
      9. Carving
      10. Data acquisition
  5. Day 5 - Compliance and Assessment
    1. Understand the importance of data privacy and protection
      1. Privacy vs. security
      2. Non-technical controls
      3. Technical controls
    2. Given a scenario, apply security concepts in support of organizational risk mitigation
      1. Business impact analysis
      2. Risk identification process
      3. Risk calculation
      4. Communication of risk factors
      5. Risk prioritization
      6. Systems assessment
      7. Documented compensating controls
      8. Training and exercises
      9. Supply chain assessment
    3. Explain the importance of frameworks, policies, procedures and controls
      1. Frameworks
      2. Policies and procedures
      3. Category
      4. Control type
      5. Audits and assessments

Requirements

Prerequisites

You've got questions.
We're here to help.

Our highly knowledgeable Enrollment Specialists will answer any questions you might have about the course and payment options.

REQUEST INFO

Instructor

FAQs

Reviews

You've got questions.
We're here to help.

Our highly knowledgeable Enrollment Specialists will answer any questions you might have about the course and payment options.

REQUEST INFO
California State University - San Marcos

Extended Learning Department
333 S. Twin Oaks Valley Road
San Marcos, CA 92096 US
MAIN CONTENT

Copyright © Education To Go. All rights reserved. The material on this site cannot be reproduced or redistributed unless you have obtained prior written permission from Education To Go. Education To Go and ed2go are registered trademarks of Education To Go, a part of Cengage Learning. Privacy Policy