CompTIA Private Public

CompTIA Cybersecurity Analyst (CySA+) (CTIA_CYBER_SEC)

5 days
CompTIACybersecurity

Prepare for the CompTIA CySA+ (CS0-002/CS0-003) exam with hands-on threat detection, SIEM log analysis, vulnerability management, and incident response.

Register or Request Training

Price per student
$2,445.10
Guaranteed to run
Select a date
Please select a class.
  • Private class for your team
  • Live expert instructor
  • Online or on‑location
  • Customizable agenda
  • Proposal turnaround within 1–2 business days

Course Overview

CompTIA Cybersecurity Analyst (CySA+) training equips you with job-ready skills in threat detection, log analysis, vulnerability management, and incident response.

This instructor-led course prepares you to proactively defend systems using behavioral analytics, threat intelligence, and hands-on investigation tools. You will gain experience managing vulnerabilities, analyzing SIEM output, investigating incidents, and preparing for forensic analysis while building the knowledge needed to pass the CompTIA CySA+ certification exam (CS0-002 or CS0-003).

The CySA+ certification is also DoD 8570/8140 approved, making this course a strong fit for military, civilian, and contractor personnel who need to meet Department of Defense cybersecurity workforce standards.

Course Benefits

  • Assess information security risk in computing and network environments
  • Analyze reconnaissance threats, including social engineering
  • Analyze attacks such as web-based attacks, malware, hijacking/impersonation, DoS, and mobile and cloud threats
  • Analyze post-attack techniques including command and control, persistence, lateral movement, exfiltration, and anti-forensics
  • Implement and operate a vulnerability management program (scanning and penetration testing)
  • Collect cybersecurity intelligence from network- and host-based sources
  • Analyze security and event logs, including SIEM output
  • Perform active analysis on assets and networks using Windows and Linux tools
  • Respond to and investigate cybersecurity incidents, including preparing for forensic analysis
  • Address security issues in an organization’s technology architecture (IAM and secure SDLC)

Delivery Methods

Public Class
Live expert-led online training from anywhere. Guaranteed to run .
Private Class
Delivered for your team at your site or online.

Course Outline

  1. Assessing Information Security Risk
    1. Understand the importance of risk management
    2. Perform risk assessments across systems and networks
    3. Apply risk mitigation strategies
    4. Integrate documentation into the risk management process
  2. Analyzing Reconnaissance Threats to Computing and Network Environments
    1. Evaluate the impact of reconnaissance activities
    2. Assess the risks posed by social engineering attacks
  3. Analyzing Attacks on Computing and Network Environments
    1. Analyze the impact of system hacking attempts
    2. Evaluate the effects of web-based attacks
    3. Assess malware threats and their consequences
    4. Understand hijacking and impersonation attacks
    5. Analyze Denial-of-Service (DoS) incidents
    6. Examine mobile security threats
    7. Explore cloud security risks
  4. Analyzing Post-Attack Techniques
    1. Identify command and control methods
    2. Assess techniques for maintaining persistence
    3. Analyze lateral movement and pivoting strategies
    4. Understand data exfiltration methods
    5. Examine anti-forensics techniques
  5. Managing Vulnerabilities in the Organization
    1. Implement a comprehensive vulnerability management plan
    2. Identify and assess common system and application vulnerabilities
    3. Conduct vulnerability scans effectively
    4. Perform penetration testing on network assets
  6. Collecting Cybersecurity Intelligence
    1. Set up platforms for collecting and analyzing security intelligence
    2. Gather data from network-based intelligence sources
    3. Collect intelligence from host-based sources
  7. Analyzing Log Data
    1. Utilize common tools to analyze log files
    2. Leverage SIEM (Security Information and Event Management) tools for deeper analysis
  8. Performing Active Asset and Network Analysis
    1. Investigate incidents using Windows-based tools
    2. Analyze events using Linux-based tools
    3. Perform basic malware analysis
    4. Examine indicators of compromise (IOCs)
  9. Responding to Cybersecurity Incidents
    1. Deploy an effective incident response architecture
    2. Mitigate active threats
    3. Prepare your CSIRT team for forensic investigation
  10. Investigating Cybersecurity Incidents
    1. Apply a structured forensic investigation plan
    2. Securely collect and analyze electronic evidence
    3. Conduct post-investigation follow-up and reporting
  11. Addressing Security Architecture Issues
    1. Resolve identity and access management (IAM) problems
    2. Integrate security considerations throughout the Software Development Life Cycle (SDLC)

Class Materials

Each student receives a comprehensive set of materials, including course notes and all class examples.

Class Prerequisites

Experience in the following is required for this CompTIA class:

Network+ and Security+ (or equivalent knowledge).

Experience in the following would be useful for this CompTIA class:

At least 4 years of hands-on experience as an incident response analyst or security operations center (SOC) analyst (or equivalent experience).

Have questions about this course?

We can help with curriculum details, delivery options, pricing, or anything else. Reach out and we’ll point you in the right direction.

}