CompTIA CyberSecurity Analyst (CySA+) - ITEL
CompTIA CyberSecurity Analyst (CySA+)
Duration:
5 Days
Delivery Mode:
Online Live Learning (OLL)
Start Date:
21 Jul 2025
End Date:
25 Jul 2025
Fees:
$3,815.00

As attackers have learned to evade traditional signature-based solutions such as firewalls, an analytics based approach within the IT security industry is increasingly important for most organizations. The behavioral analytics skills covered by CySA+ identify and combat malware, and advanced persistent threats (APTs), resulting in enhanced threat visibility across a broad attack surface. CompTIA CySA+ is for IT professionals looking to gain the following analyst skills:

  • Configure and use threat detection tools
  • Perform data analysis
  • Interpret the results to identify vulnerabilities, threats and risks to an organization

In this 5-day course, participants use their knowledge and skills required to configure and use threat detection tools, perform data analysis and interpret the results to identify vulnerabilities, threats and risks to an organization, with the end goal of securing and protecting applications and systems within an organization.

Course Outline

Lesson 1: Explaining the Importance of Security Controls and Security Intelligence
  • Identify Security Control Types
  • Explain the Importance of Threat Data and Intelligence
Lesson 2: Utilizing Threat Data and Intelligence
  • Classify Threats and Threat Actor Types
  • Utilize Attack Frameworks and Indicator Management
  • Utilize Threat Modeling and Hunting Methodologies

Lesson 3: Analyzing Security Monitoring Data
  • Analyze Network Monitoring Output
  • Analyze Appliance Monitoring Output
  • Analyze Endpoint Monitoring Output
  • Analyze Email Monitoring Output

Lesson 4: Collecting and Querying Security Monitoring Data
  • Configure Log Review and SIEM Tools
  • Analyze and Query Logs and SIEM Data

Lesson 5: Utilizing Digital Forensics and Indicator Analysis Techniques
  • Identify Digital Forensics Techniques
  • Analyze Network-related IoCs
  • Analyze Host-related IoCs
  • Analyze Application-Related IoCs
  • Analyze Lateral Movement and Pivot IoCs

Lesson 6: Applying Incident Response Procedures
  • Explain Incident Response Processes
  • Apply Detection and Containment Processes
  • Apply Eradication, Recovery, and Post-Incident Processes

Lesson 7: Applying Risk Mitigation and Security Frameworks
  • Apply Risk Identification, Calculation, and Prioritization Processes
  • Explain Frameworks, Policies, and Procedures

Lesson 8: Performing Vulnerability Management
  • Analyze Output from Enumeration Tools
  • Configure Infrastructure Vulnerability Scanners
  • Mitigate Vulnerability Issues

Lesson 9: Applying Security Solutions for Infrastructure Management
  • Apply identity and Access Management Security Solutions
  • Apply Network Architecture and Segmentation Security Solutions
  • Apply Network Architecture and Segmentation Security Solutions
  • Explain Hardware Assurance Best Practices
  • Explain Vulnerabilities Associated with Specialized Technologies

Lesson 10: Understanding Data Privacy and Protection
  • Identify Non-Technical Data and Privacy Controls
  • Identify Technical Data and Privacy Controls

Lesson 11: Applying Security Solutions for Software Assurance
  • Mitigate Software Vulnerabilities and Attacks
  • Mitigate Web Application Vulnerabilities and Attacks
  • Analyze Output from Application Assessments

Lesson 12: Applying Security Solutions for Cloud and Automation
  • Identify Cloud Service and Deployment Model Vulnerabilities
  • Explain Service-Oriented Architecture
  • Analyze Output from Cloud Infrastructure Assessment Tools
  • Compare Automation Concepts and Technologies

Course Fee (inclusive of 9% GST)

$3,815.00 *Funding not available
Course Prerequisite
Those who wish to take up this course should meet the following prerequisites:
  • Network+, Security+ or equivalent knowledge
  • Minimum of 3-4 years of hands-on information security or related experience. While there is no required prerequisite, CySA+ is intended to follow CompTIA Security+ or equivalent experience and had a technical, hands-on focus.
Important Notes
None.
Who Should Attend?
Same as Course Prerequisite.

Why ITEL?

  • Diverse Range of IT Courses

    We offer a diverse range of IT courses tailored to student needs. Our curriculum covers foundational to advanced topics, ensuring comprehensive learning. We stay updated with industry trends to deliver relevant courses.

  • Skilled & Experienced Instructors

    We are proud to have a team of highly skilled and experienced instructors. Our instructors are industry professionals with in-depth knowledge and expertise across various IT domains.

  • Practical & Hands-on Exercises

    Our courses feature hands-on exercises, projects, and simulations to build practical skills. Students gain confidence by applying knowledge to real-world scenarios.

Course Enquiry for CompTIA CyberSecurity Analyst (CySA+)

"*" indicates required fields

This field is for validation purposes and should be left unchanged.
I want to find out more about:*
Where did you hear of ITEL?*
*Note: If you chose Others, kindly provide more information in the Remarks/Comments/Questions box.
Consent*
Newsletter Subscription

Download Windows Server 2019 Administration (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Cloud Technology Solutions Architect Associate (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Security Analysis and Penetration Testing (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Information Systems Security (SF) [OLL] Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Microsoft Certified: Azure Fundamentals (AZ-900) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Microsoft Certified Azure Network Engineer Associate (AZ-700) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Cyber Threat Intelligence Analyst (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Cyber Forensics Investigator (SF) [OLL] Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Cyber Security Incident Handling and Response (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Certified Ethical Hacker (CEH) (SF) [OLL] Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Certified Ethical Hacker (CEH) (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download (SCTP) Advanced Certificate in Cyber Security Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download (SCTP) Higher Certificate in Network Administration Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Strategic Cyber Security Leadership (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Cisco Certified Network Associate (CCNA) (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Course Listing Download Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Cisco Certified Network Associate Download Course Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List