Objectives
After taking this training, the student should be able to:
- Detect and analyze indicators of malicious activity.
- Understand threat hunting and threat intelligence concepts.
- Use appropriate tools and methods to manage, prioritize, and respond to attacks and vulnerabilities.
- Perform incident response processes.
- Understand reporting and communication concepts related to vulnerability management and incident
response activities.
Prerequisite Knowledge Advisory
Although there are no formal prerequisites, before taking this class you should have:
- At least 2 years’ hands-on experience in technical cybersecurity role.
- Knowledge gained from, for example, CompTIA’s Network+ and Security+ classes.
Additionally:
- Knowledge of basic network terminology and functions (such as OSI Model, Topology, Ethernet, Wi-Fi, switches, routers).
- Understanding of TCP/IP addressing, core protocols, and troubleshooting tools.
- Ability to identify network attack strategies and defenses.
- Knowledge of the technologies and uses of cryptographic standards and products.
- Ability to identify network- and host-based security technologies and practices.
- Ability to describe the standards and products used to enforce security on web and communications technologies.
Required Exam for CySA+ Certification
Exam: CS0-003
Proctor: PearsonVUE
Recertification: 3 years
CySA+ Training Class Outline
Lesson 1: Understanding Vulnerability Response, Handling, and Management
Lesson 2: Exploring Threat Intelligence and Threat Hunting Concepts
Lesson 3: Explaining Important System and Network Architecture Concepts
Lesson 4: Understanding Process Improvement in Security Operations
Lesson 5: Implementing Vulnerability Scanning Methods
Lesson 6: Performing Vulnerability Analysis
Lesson 7: Communicating Vulnerability Information
Lesson 8: Explaining Incident Response Activities
Lesson 9: Demonstrating Incident Response Communication
Lesson 10: Applying Tools to Identify Malicious Activity
Lesson 11: Analyzing Potentially Malicious Activity
Lesson 12: Understanding Application Vulnerability Assessment
Lesson 13: Exploring Scripting Tools and Analysis Concepts
Lesson 14: Understanding Application Security and Attack Mitigation Best Practices