CySA+

Description

Course Length: 5 days

Course Objectives:

Lesson 1: Assessing Information Security Risk
Topic A: Identify the Importance of Risk Management
Topic B: Assess Risk
Topic C: Mitigate Risk
Topic D: Integrate Documentation into Risk Management

Lesson 2: Analyzing Reconnaissance Threats to Computing and Network Environments
Topic A: Assess the Impact of Reconnaissance Incidents
Topic B: Assess the Impact of Social Engineering

Lesson 3: Analyzing Attacks on Computing and Network Environments
Topic A: Assess the Impact of System Hacking Attacks
Topic B: Assess the Impact of Web-Based Attacks
Topic C: Assess the Impact of Malware
Topic D: Assess the Impact of Hijacking and Impersonation Attacks
Topic E: Assess the Impact of DoS Incidents
Topic F: Assess the Impact of Threats to Mobile Security
Topic G: Assess the Impact of Threats to Cloud Security

Lesson 4: Analyzing Post-Attack Techniques
Topic A: Assess Command and Control Techniques
Topic B: Assess Persistence Techniques
Topic C: Assess Lateral Movement and Pivoting Techniques
Topic D: Assess Data Exfiltration Techniques
Topic E: Assess Anti-Forensics Techniques

Lesson 5: Managing Vulnerabilities in the Organization
Topic A: Implement a Vulnerability Management Plan
Topic B: Assess Common Vulnerabilities
Topic C: Conduct Vulnerability Scans
Topic D: Conduct Penetration Tests on Network Assets

Lesson 6: Collecting Cybersecurity Intelligence
Topic A: Deploy a Security Intelligence Collection and Analysis Platform
Topic B: Collect Data from Network-Based Intelligence Sources
Topic C: Collect Data from Host-Based Intelligence Sources

Lesson 7: Analyzing Log Data
Topic A: Use Common Tools to Analyze Logs
Topic B: Use SIEM Tools for Analysis

Lesson 8: Performing Active Asset and Network Analysis
Topic A: Analyze Incidents with Windows-Based Tools
Topic B: Analyze Incidents with Linux-Based Tools
Topic C: Analyze Malware
Topic D: Analyze Indicators of Compromise

Lesson 9: Responding to Cybersecurity Incidents
Topic A: Deploy an Incident Handling and Response Architecture
Topic B: Mitigate Incidents
Topic C: Prepare for Forensic Investigation as a CSIRT

Lesson 10: Investigating Cybersecurity Incidents
Topic A: Apply a Forensic Investigation Plan
Topic B: Securely Collect and Analyze Electronic Evidence
Topic C: Follow Up on the Results of an Investigation

Lesson 11: Addressing Security Architecture Issues
Topic A: Remediate Identity and Access Management Issues
Topic B: Implement Security During the SDLC





Classes

Add Location Instructor Dates Days Times Open
Register Now!
PST
Technical Classroom
TBD 7/23 - 7/27 Mo Tu We Th Fr 09:00 AM - 04:30 PM 14
Register Now!
PST
Technical Classroom
TBD 10/22 - 10/26 Mo Tu We Th Fr 09:00 AM - 04:30 PM 14