CySA+ Channel

Course i041

  • Language: English
  • Level:

This on-demand series is intended to explore the topics necessary to prepare for the CySA+ exam. Here we cover many computer security related concepts and tools, exploring their best practices and practical application. This includes threats, threat management, reconnaissance, and countermeasures, common vulnerabilities, penetration testing, incident response, security architectures, and common tool sets.

CySA+ Channel Delivery Methods

  • Official CompTIA online IT training
  • Prepare for the CySA+ exam

CySA+ Channel Course Benefits

Apply computer security related concepts and toolsExplore their best practices and practical applicationLearn about threats, threat management, reconnaissance, and countermeasures, common vulnerabilities, penetration testing, incident response, security architectures, and common tool sets

On-Demand Training Outline

  • Threat Management Overview
  • Reconnaissance: Tools
  • Reconnaissance: Tools Part 2
  • Reconnaissance: Tools Part 3
  • Reconnaissance: Tools Part 4
  • Reconnaissance: Techniques
  • Reconnaissance: Techniques Part 2
  • Reconnaissance: Techniques Part 3
  • Reconnaissance: Techniques Part 4
  • Data Correlation and Analytics
  • Reconnaissance: Interpreting Results
  • Countermeasures: Network Segmentation
  • Countermeasures: Honeypots and Sinkholes
  • Countermeasures: System Hardening and NAC
  • Security Practices: Penetration Testing
  • Security Practices: Reverse Engineering
  • Security Practices: Training and Risk Evaluation
  • Vulnerability Management
  • Vulnerability Management Process
  • Vulnerability Management: Scan Configuration
  • Vulnerability Management CVSS
  • Vulnerability Management: CVSS Part 2
  • Vulnerability Management: Remediation
  • Scan Results Verification
  • Common Vulnerabilities
  • Common Vulnerabilities Part 2
  • Common Vulnerabilities Part 3
  • Common Vulnerabilities Part 4
  • Common Vulnerabilities Part 5
  • Cyber Incident Response Threat Classification
  • Severity and Prioritization
  • Forensics Toolkit
  • Incident Response Plan
  • Forensic Suites and Utilities
  • Forensic Suites and Utilities Part 2
  • Forensic Suites and Utilities Part 3
  • Forensic Suites and Utilities Part 4
  • CSIRT Roles and Communication
  • Indicator of Compromise: Network Symptoms
  • Indicators of Compromise: Host and App Symptoms
  • Recovery and Post-Incident Response
  • Recovery and Post-Incident Response Part 2
  • Security Architecture and Toolsets Cybersecurity Frameworks
  • Cybersecurity Frameworks Part 2
  • Policies, Controls and Procedures
  • Policies, Controls and Procedures Part 2
  • Identity and Access Management
  • Identity and Access Management Part 2
  • Compensating Controls and Architecture
  • Compensating Controls and Architecture Part 2
  • Compensating Controls and Architecture Part 3
  • Security Tools and Technologies
  • Security Tools and Technologies Part 2
  • Security Tools and Technologies Part 3
  • Software Development Security
  • Software Development Security Part 2

Need Help Finding The Right Training Solution?

Our training advisors are here for you.

Course FAQs

When you have checked out through our Shopify store you will receive an email from our administration team with your login credentials.