The CompTIA Cybersecurity Analyst (CySA+) course is an international, vendor-neutral cybersecurity certification that applies behavioural analytics to improve the overall state of IT security. The CySA+ course validates knowledge and skills that are required to prevent, detect and combat cybersecurity threats.
In addition, this course covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. Depending on the size of the organization, this individual may act alone or may be a member of a cybersecurity incident response team (CSIRT).
The course introduces delegates to tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization’s security, collect and analyse cybersecurity intelligence, and handle incidents as they occur. Ultimately, the course promotes a comprehensive approach to security aimed towards those on the front lines of defence.
This course is designed primarily for cybersecurity practitioners who perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation.
This course focuses on the knowledge, ability, and skills necessary to provide for the defence of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes.
In addition, the course ensures that all members of an IT team—everyone from help desk staff to the Chief Information Officer—understand their role in these security processes.
How will this Course help You
After completing the CompTIA CySA+ course, delegates will have the skills and knowledge to:
Assess information security risk in computing and network environments
Analyse the cybersecurity threat landscape
Analyse reconnaissance threats to computing and network environments
Analyse attacks on computing and network environments
Analyse post-attack techniques on computing and network environments
Implement a vulnerability management program
Evaluate the organization’s security through penetration testing
Collect cybersecurity intelligence
Analyse data collected from security and event logs
Perform active analysis on assets and networks
Respond to cybersecurity incidents
Investigate cybersecurity incidents
Address security issues with the organization’s technology architecture
Addis Ababa, Ethiopia