Do You Need to Renew Your CompTIA Security+ Certification? Consider CySA+

12/20/2018
In CompTIA

CompTIA outlines their Continuing Education Program as follows (source – CompTIA.org):

  • Renewal Cycle: Your certification expires three years from the date you earn it and must be renewed before that expiration date. If you don’t know your expiration date, log in here.
  • Continuing Education Units (CEUs): Each certification requires a certain number of CEUs for renewal. You earn CEUs by completing approved activities.
  • Continuing Education Fees: CE fees are required for renewal and must be paid prior to submitting CEUs unless you renew by earning a qualifying higher-level CompTIA certification or passing CertMaster CE.
  • Multiple CompTIA Certification Renewal: If you hold more than one CompTIA certification, you only need to meet the renewal requirements for your highest-level certification. When you renew your highest-level certification, your lower-level CompTIA certifications will automatically renew as well.

One renewal path for those that currently have their Security+ license, is to earn a higher-level CompTIA certification. The relatively new CompTIA Cybersecurity Analyst (CySA+) certification was released early in 2017 to provide greater relevancy and depth of knowledge for the Cybersecurity career path. By completing your CySA+ exam, the following previously earned certifications are fully renewed: PenTest+, Security+, Network+, A+. An additional note from CompTIA: “If you're planning to renew your CompTIA certification(s) by achieving a higher-level CompTIA certification, please note that your current certification expiration date(s) will be aligned with the expiration date of the higher-level certification (three years from the date you earn the higher-level certification.)”

Join our LRS Education Services training event to build the following security analyst skills:

  • Perform data analysis and interpret the results to identify vulnerabilities, threats and risks to an organization.
  • Configure and use threat-detection tools.
  • Secure and protect applications and systems within an organization.

The CompTIA CySA+ Cybersecurity Analyst course is designed for IT security analysts, vulnerability analysts, or threat intelligence analysts. CySA+ is the most up-to-date security analyst certification that covers advanced persistent threats in a post-2014 cybersecurity environment.

CompTIA CySA+ meets the ISO 17024 standard and is approved by U.S. Department of Defense to fulfill Directive 8570.01-M requirements. It is compliant with government regulations under the Federal Information Security Management Act (FISMA). Regulators and government rely on ANSI accreditation because it provides confidence and trust in the outputs of an accredited program.

It is recommended that all attendees have existing knowledge in the following areas:

  • Know basic network terminology and functions (such as OSI Model, Topology, Ethernet, Wi-Fi, switches, routers).
  • Understand TCP/IP addressing, core protocols, and troubleshooting tools.
  • Identify network attack strategies and defenses.
  • Know the technologies and uses of cryptographic standards and products.
  • Identify network- and host-based security technologies and practices.
  • Describe the standards and products used to enforce security on web and communications technologies.

Course topics covered in the CompTIA CySA+ Cybersecurity Analyst course include:

Module 1 / Threat Management 1

Cybersecurity Analysts
- Cybersecurity Roles and Responsibilities
- Frameworks and Security Controls
- Risk Evaluation
- Penetration Testing Processes
Reconnaissance Techniques
- The Kill Chain
- Open Source Intelligence
- Social Engineering
- Topology Discovery
- Service Discovery
- OS Fingerprinting

Module 2 / Threat Management 2

Security Appliances
- Configuring Firewalls
- Intrusion Detection and Prevention
- Configuring IDS
- Malware Threats
- Configuring Anti-virus Software
- Sysinternals
- Enhanced Mitigation Experience Toolkit
Logging and Analysis
- Packet Capture
- Packet Capture Tools
- Monitoring Tools
- Log Review and SIEM
- SIEM Data Outputs
- SIEM Data Analysis
- Point-in-Time Data Analysis

Module 3 / Vulnerability Management

Managing Vulnerabilities
- Vulnerability Management Requirements
- Asset Inventory
- Data Classification
- Vulnerability Management Processes
- Vulnerability Scanners
- Microsoft Baseline
- Security Analyzer
- Vulnerability Feeds and SCAP
- Configuring Vulnerability Scans
- Vulnerability Scanning Criteria
- Exploit Frameworks
Remediating Vulnerabilities
- Analyzing Vulnerability Scans
- Remediation and Change Control
- Remediating Host Vulnerabilities
- Remediating Network Vulnerabilities
- Remediating Virtual Infrastructure Vulnerabilities
Secure Software Development
- Software Development Lifecycle
- Software Vulnerabilities
- Software Security Testing
- Interception Proxies
- Web Application Firewalls
- Source Authenticity
- Reverse Engineering

Module 4 / Cyber Incident Response

Incident Response
- Incident Response Processes
- Threat Classification
- Incident Severity and Prioritization
- Types of Data
Forensics Tools
- Digital Forensics Investigations
- Documentation and Forms
- Digital Forensics Crime Scene
- Digital Forensics Kits
- Image Acquisition
- Password Cracking
- Analysis Utilities
Incident Analysis and Recovery
- Analysis and Recovery Frameworks
- Analyzing Network Symptoms
- Analyzing Host Symptoms
- Analyzing Data Exfiltration
- Analyzing Application Symptoms
- Using Sysinternals
- Containment Techniques
- Eradication Techniques
- Validation Techniques
- Corrective Actions

Module 5 / Security Architecture

Secure Network Design
- Network Segmentation
- Blackholes, Sinkholes, and Honeypots
- System Hardening
- Group Policies and MAC
- Endpoint Security
Managing Identities and Access
- Network Access Control
- Identity Management
- Identity Security Issues
- Identity Repositories
- Context-based Authentication
- Single Sign On and Federations
- Exploiting Identities
- Exploiting Web Browsers and Applications
Security Frameworks and Policies
- Frameworks and Compliance
- Reviewing Security Architecture
- Procedures and Compensating Controls
- Verifications and Quality Control
- Security Policies and Procedures
- Personnel Policies and Training

Class Option:
LRS Education Services offers an opportunity for students to join in on one of our Instructor-Led Training (ILT) sessions. We have two live classes scheduled for Q1 2019 at our Bloomington, IL training facility.

February 4-8, 2019

April 29 – May 3, 2019

For remote students who are not able to join us in the classroom, we have a virtual connection option. This uses our online video and audio feeds to connect and interact with both the instructor as well as the in-class students. For a video on how our Virtual Training option works, click on the link.

Click here for a list of all of our Guaranteed to Run Courses, or to search our Online Course Catalog.
Feel free to call or email me for more information!

Christopher Becher
Education Consultant
P 309.664.7670 ext. 6302
E christopher.becher@lrs.com