CompTIA Cybersecurity Analyst (CySA+) is an IT workforce certification that applies behavioral analytics to networks and devices to prevent, detect and combat cybersecurity threats through continuous security monitoring.
This course will prepare students for the CySA+ CS0-002 exam. Our documented 97% passing rate, has allowed us to train thousands of students to pass CompTIA exams on the first try. We use a large variety of labs and lectures to ensure students are ready for the exam.
Don't spend thousands of dollars more for the same or less quality CySA+ course. We are a CompTIA Authorized Gold Partner that uses only CompTIA authorized materials and instructors.
CySA+ EXAM
Students must pass the CS0-002 exam to become CompTIA CySA+ certified. The exam consist of a maximum of 90 questions, which must be answered in 165 minutes. This course covers all the required material for the CS0-002 exam.
This course uses a series lectures, and hands-on labs to get students ready for the exam.
Based on a monthly survey of our enrolled students, who were able to pass after attending our course.
You can retake the course as many times as needed completely free.
Reduced pricing & customized training available for companies and government agencies.
If you cannot pass the CompTIA CySA+ exam after 2 retakes we will issue you a full refund of the course tuition. All we ask is to take the exams within 6 months from your first class completion.
As a CompTIA authorize partner, they ensure you will receive the highest quality instructors, and authorized courseware.
The course will include our TIA proprietary study materials including, practice questions, customize presentations, and labs. Students will be given hundreds of practice questions to complete and an entire cram guide to the exam.
If you are not happy with our instructor or training environment, let us know on the first day of class and we will issue a full refund of the course tuition.
Our CompTIA certified and licensed instructors will ensure students only get the best in training. Our instructors have taught thousands of classes in the last 15 years.
Others | ||
---|---|---|
Gold CompTIA Authorized Partner | (Non Authorized training) | |
100% Money Back Guarantee. If you are not happy with the course after the first class. We are the only school that offers this guarantee. | (If you are not happy with the course, you will not get a refund) | |
If you take our course and cannot pass the CySA+ exam after 2 re-takes we will refund the full amount of the tuition, no questions asked. | (No money back guarantee if you cannot pass your exam.) | |
Better Business Bureau Accredited Business. | (Not an Accredited Business. No assurance if they are a real company) | |
Ultra Fast 4/6-Core Desktops with 19'-24' monitors | (old outdated computers) | |
All Classes are guaranteed to run or your money back. | (Many keeps postponing classes until they have sufficient students) | |
Payment Plan Available. | (No Payment Plan) | |
Small Class Size. | (Classes with 18+ students) | |
Flexible Schedule (Weekday, Evening, and Weekend). | (Just Weekday classes) | |
Instructor with real world Experience. | (Instructors with no real world Experience) | |
Live instructor-led training. | ||
Documented 95% passing rate. | (Most claim to have a high passing rate but can't prove it) | |
Great Location. A few blocks from Penn Station and Port Authority. | (Have to take additional trains and buses to get there) | |
Allows you to speak to the instructor before you start the class. | (You never meet the instructor until the class starts) | |
American owned and operated company. | (Non-American company) | |
New York State Licensed Regulated School. | (Non-licensed illegal school) | |
Unlimited free retakes of the course for up to one year. | (no retakes allowed) | |
Flat $ tuition. No registration or booking fee. | (Some providers charge a registration fee, booking fee, processing fee or a fee for using a credit card to pay) | |
Luxurious facilities. | (Poorly maintained spaces) |
All of our CompTIA courses are 28 hours.
Yes, our course is design to help students pass their exams on the first try. We have help thousands of students pass on their first try.
Our tuition is much lower than other training providers because we have optimized our business processes to ensure quality training at a reasonable price. As a smaller school with lower overhead we are able to provide a great class and better value to our students.
We only hire the best instructors. Our instructors for CompTIA must have a minimum of 15 years of experience in training and network/systems administrations. All instructors are CompTIA Certified Technical Trainers(CTT+).
Classes are normally held with no more than 15 students.
No, we never cancel a class. We will teach a class with 1 registered student if we have to. If unforeseen circumstances arise such as bad weather, instructor health or family problems and we have to cancel a class, we will offer all students a 100% refund or reschedule to another class.
Yes we offer the most flexible schedule of all training centers. If you miss one or more of your classes you can attend a weekend, evening, or weekday class to make up your class.
Yes we offer the most flexible schedule of all training centers. If you miss one or more of your classes you can attend a weekend, evening, or weekday class to make up your class.
Yes we accept Workfore1 Vouchers. You will need to visit us to get an acceptance letter. Please call us for more information about this.
Choosing a training provider can be tough choice. We all claim to offer the best value, in terms of price, passing rate, and guarantee. The Technical Institute of America offers the lowest price, one of the best passing rates, and an excellent guarantee. As a New York State licensed school and Better Business Bureau Accredited business we can honestly say what we offer is the truth and you can verify it. It’s the reason why we offer a money back guarantee.
Lesson 1: Defending Against Cybersecurity Threats
Security influences and risk
Cybersecurity Objectives
Evaluating Security Risks
Identify Threats
Identify Vulnerabilities
Determine Likelihood, Impact, and Risk
Reviewing Controls
Building a Secure Network
Network Access Control
Firewalls and Network Perimeter Security
Network Segmentation
Defense through Deception
Secure Endpoint Management
Hardening System Configurations
Patch Management
Group Policies
Endpoint Security Software
Penetration Testing
Planning a Penetration Test
Conducting Discovery
Executing a Penetration Test
Communicating Penetration Test Results
Training and Exercises
Reverse Engineering
Isolation and Sandboxing
Reverse Engineering Software
Reverse Engineering Hardware
Lesson 2: Reconnaissance and Intelligence Gathering
Footprinting
Active Reconnaissance
Mapping Networks and Discovering Topology
Port Scanning and Service Discovery Techniques and Tools
Passive Footprinting
Log and Configuration Analysis
Harvesting Data from DNS and Whois
Information Aggregation and Analysis Tools
Information Gathering Using Packet Capture
Gathering Organizational Intelligence
Organizational Data
Electronic Document Harvesting
Detecting, Preventing, and Responding to Reconnaissance
Capturing and Analyzing Data to Detect Reconnaissance
Preventing Reconnaissance
Lesson 3: Designing a Vulnerability Management Program
Identifying Vulnerability Management Requirements
Regulatory Environment
Corporate Policy
Identifying Scan Targets
Determining Scan Frequency
Configuring and Executing Vulnerability Scans
Scoping Vulnerability Scans
Configuring Vulnerability Scans
Scanner Maintenance
Developing a Remediation Workflow
Reporting and Communication
Prioritizing Remediation
Testing and Implementing Fixes
Overcoming Barriers to Vulnerability Scanning
Lesson 4: Analyzing Vulnerability Scans
Reviewing and Interpreting Scan Reports
Understanding CVSS
Validating Scan Results
False Positives
Documented Exceptions
Understanding Informational Results
Reconciling Scan Results with Other Data Sources
Trend Analysis
Common Vulnerabilities
Server and Endpoint Vulnerabilities
Network Vulnerabilities
Virtualization Vulnerabilities
Internet of Things (IoT)
Web Application Vulnerabilities
Lesson 5: Building an Incident Response Program
Security Incidents
Phases of Incident Response
Preparation
Detection and Analysis
Containment, Eradication, and Recovery
Post-Incident Activity
Building the Foundation for Incident Response
Policy
Procedures and Playbooks
Documenting the Incident Response Plan
Creating an Incident Response Team
Incident Response Providers
CSIRT Scope of Control
Coordination and Information Sharing
Internal Communications
External Communications
Classifying Incidents
Threat Classification
Severity Classification
Lesson 6: Analyzing Symptoms for Incident Response
Analyzing Network Events
Capturing Network Events
Network Monitoring Tools
Detecting Common Network Issues
Handling Network Probes and Attacks
Detecting Scans and Probes
Detecting Denial-of-Service and Distributed Denial-of-Service Attacks
Detecting Other Network Attacks
Detecting and Finding Rogue Devices
Investigating Host Issues
System Resources
Malware and Unauthorized Software
Unauthorized Access, Changes, and Privileges
Investigating Service and Application Issues
Application and Service Monitoring
Application and Service Issue Response and Restoration
Detecting Attacks on Applications
Lesson 7: Performing Forensic Analysis
Building a Forensics Capability
Building a Forensic Toolkit
Training and Certification
Understanding Forensic Software
Capabilities and Application
Conducting a Forensic Investigation
The Forensic Process
Target Locations
Acquiring and Validating Drive Images
Imaging Live Systems
Acquiring Other Data
Forensic Investigation: An Example
Importing a Forensic Image
Analyzing the Image
Reporting
Lesson 8: Recovery and Post-Incident Response
Containing the Damage
Segmentation
Isolation
Removal
Evidence Gathering and Handling
Identifying Attackers
Incident Eradication and Recovery
Reconstruction and Reimaging
Patching Systems and Applications
Sanitization and Secure Disposal
Validating the Recovery Effort
Wrapping Up the Response
Managing Change Control Processes
Conducting a Lessons-Learned Session
Developing a Final Report
Lesson 9: Policy and Compliance
Understanding Policy Documents
Policies
Standards
Procedures
Guidelines
Exceptions and Compensating Controls
Complying with Laws and Regulations
Adopting a Standard Framework
NIST Cybersecurity Framework
ISO 27001
Control Objectives for Information and Related Technologies (COBIT)
Sherwood Applied Business Security Architecture (SABSA)
The Open Group Architecture Framework (TOGAF)
Information Technology Infrastructure Library (ITIL)
Implementing Policy-Based Controls
Security Control Verification and Quality Control
Lesson 10: Defense-in-Depth Security Architectures
Understanding Defense in Depth
Layered Security
Control Types and Classification
Implementing Defense in Depth
Layered Security and Network Design
Layered Host Security
Logging, Monitoring, and Validation
Cryptography
Policy, Process, and Standards
Outsourcing and Personnel Security
Analyzing Security Architecture
Analyzing Security Requirements
Reviewing Architecture
Common Issues
Reviewing a Security Architecture
Maintaining a Security Design
REPLACE
Lesson 11: Identity and Access Management Security
Understanding Identity
Identity Systems and Security Design
Threats to Identity and Access
Understanding Security Issues with Identities
Attacking AAA Systems and Protocols
Targeting Account Creation, Provisioning, and Deprovisioning
Preventing Common Exploits of Identity and Authorization
Acquiring Credentials
Identity as a Security Layer
Identity and Defense-in-Depth
Securing Authentication and Authorization
Detecting Attacks and Security Operations
Understanding Federated Identity and Single Sign-On
Federated Identity Security Considerations
Federated Identity Design Choices
Federated Identity Technologies
Federation Incident Response
Lesson 12: Software Development Security
Understanding the Software Development Life Cycle
Software Development Phases
Software Development Models
Designing and Coding for Security
Common Software Development Security Issues
Secure Coding Best Practices
Application Testing
Information Security and the SDLC
Code Review Models
Formal Code Review
Software Security Testing
Analyzing and Testing Code
Web Application Vulnerability Scanning
Lesson 13: Cybersecurity Toolkit
Host Security Tools
Antimalware and Antivirus
EMET
Sysinternals
Monitoring and Analysis Tools
Syslog
Security Information and Event Management (SIEM)
Network Monitoring
Scanning and Testing Tools
Network Scanning
Vulnerability Scanning
Exploit Frameworks
Password Cracking and Recovery
Network Security Tools
Firewalls
Network Intrusion Detection and Prevention
Host Intrusion Prevention
Packet Capture
Command-Line Network Tools
Web Proxies
OpenSSL
Web Application Security Tools
Web Application Firewalls
Interception Proxies
Fuzzers
Forensics Tools
Hashing
Imaging
Forensic Suites
Mobile Forensics
"Excellent course, well planned, as well as worth every penny. I will recommend this course to anyone who wants to become A+ certified."
Nick
"Great class, I passed both tests on the first try."
Jim
"The labs were great, they really helped me understand the concepts. I passed both tests a few days after the course."
Edison
"The instructor was extremely knowledgeable and helpful. I can now build my own computer. I passed both exams on the first try."
Tracey
"The labs and practice exams were extremely useful. I passed both exams right after the class."
Angel
"I didn't know anything about computer repair before this class. Now I can build my own computer and got my A+ certification. I recommend this course to anyone looking to become A+ certified."
Rafael
"The Small classes and lots of hands-on labs made understanding and passing both exams easy. I will recommend this course to anyone."
David
"Best investment I ever made. Great instructor and course."
Kristen