This 5-day course is intended for those wishing to qualify with CompTIA CSA+ Cybersecurity Analyst Certification. CompTIA’s CSA+ Certification is an intermediate-level certificate for IT professionals with previous experience of working in the field of IT security.
The CompTIA CSA+ examination is designed for IT security analysts, vulnerability analysts, or threat intelligence analysts. The exam will certify that the successful candidate has the knowledge and skills required to configure and use threat detection tools, perform data analysis, and interpret the results to identify vulnerabilities, threats, and risks to an organization with the end goal of securing and protecting applications and systems within an organization.
Click here to print this page »
Target audience and course prerequisites
CompTIA CSA+ certification is aimed at IT professionals with (or seeking) job roles such as IT Security Analyst, Security Operations Center (SOC) Analyst, Vulnerability Analyst, Cybersecurity Specialist, Threat Intelligence Analyst, and Security Engineer.
Ideally, you should have successfully completed gtslearning’s “CompTIA Network+ Certification” and “CompTIA Security+ Certification” courses or have equivalent knowledge. Specifically, it is recommended that you have the following skills and knowledge before starting this course:
- Know basic network terminology and functions (such as OSI Model, Topology, Ethernet, Wi-Fi, switches, routers).
- Understand TCP/IP addressing, core protocols, and troubleshooting tools.
- Identify network attack strategies and defenses.
- Know the technologies and uses of cryptographic standards and products.
- Identify network- and host-based security technologies and practices.
- Describe the standards and products used to enforce security on web and communications technologies.
Detailed Class Syllabus
Module 1 / Threat Management 1
*Cybersecurity Roles and Responsibilities
*Frameworks and Security Controls
*Penetration Testing Processes
*The Kill Chain
*Open Source Intelligence
Module 2 / Threat Management 2
*Intrusion Detection and Prevention
*Configuring Anti-virus Software
*Enhanced Mitigation Experience Toolkit
Logging and Analysis
*Packet Capture Tools
*Log Review and SIEM
*SIEM Data Outputs
*SIEM Data Analysis
*Point-in-Time Data Analysis
Module 3 / Vulnerability Management
*Vulnerability Management Requirements
*Vulnerability Management Processes
*Vulnerability Feeds and SCAP
*Configuring Vulnerability Scans
*Vulnerability Scanning Criteria
*Analyzing Vulnerability Scans
*Remediation and Change Control
*Remediating Host Vulnerabilities
*Remediating Network Vulnerabilities
*Remediating Virtual Infrastructure Vulnerabilities
Secure Software Development
*Software Development Lifecycle
*Software Security Testing
*Web Application Firewalls
Module 4 / Cyber Incident Response
*Incident Response Processes
*Incident Severity and Prioritization
*Types of Data
*Digital Forensics Investigations
*Documentation and Forms
*Digital Forensics Crime Scene
*Digital Forensics Kits
Incident Analysis and Recovery
*Analysis and Recovery Frameworks
*Analyzing Network Symptoms
*Analyzing Host Symptoms
*Analyzing Data Exfiltration
*Analyzing Application Symptoms
Module 5 / Security Architecture
Secure Network Design
*Blackholes, Sinkholes, and Honeypots
*Group Policies and MAC
Managing Identities and Access
*Network Access Control
*Identity Security Issues
*Single Sign On and Federations
*Exploiting Web Browsers and Applications
Security Frameworks and Policies
*Frameworks and Compliance
*Reviewing Security Architecture
*Procedures and Compensating Controls
*Verifications and Quality Control
*Security Policies and Procedures
*Personnel Policies and Training