Based on the essential knowledge and skills associated with CySA+, students who successfully complete this training will demonstrate competence in a variety of specific tasks expected of the security analyst.
People Like You Purchased This Bundle
Full Course Description
The Cybersecurity Analyst Bundle is a course designed to prepare you to take on the responsibilities associated with this pivotal role on the information security squad within your organization (or another) or to expand your capabilities in the role if you already hold that title. You’ll also be readied for the CySA+ certification test from CompTIA.
You will gain in-depth knowledge of various tools associated with threat detection and risk mitigation and how to configure and use them in securing networks and data. You will also advance your ability to monitor and analyze network activity in order to identify malware and other potential threats and recommend or implement appropriate countermeasures.
Course Schedule
This course meets M-Th evenings for 5-hours of instruction (6-11 pm) over a 2 week period OR four consecutive Saturdays (8am-6pm) for a total of 40 hours of LIVE online instruction. Regularly scheduled breaks are included.
High Level Skills You’ll Gain From This Training
Identify the presence of malware on the network and recommend tools and strategies to mitigate the threat
Analyze network performance data to identify vulnerabilities, threats, risks, and potential data breaches or malware attacks
Recognize Advanced Persistent Threats (APTs) across a broad attack surface
Configure and use threat detection tools and protocols
Additional Skills You’ll Build In This Course
Network topology discovery (passive & active)
Social Engineering Reconnaissance
Windows command line tools for threat detection & mitigation
How to monitor network servers for security
Gathering and interpreting threat intelligence
Identifying attack types, assessing risk, deploying countermeasures
Security assessments and compliance
DNS harvesting
Packet sniffing
Intrusion detection and traffic analysis
Understanding and identifying malware threats
Compliance patching
Introduction to digital forensics
Implementing initial and advanced phases of incident response
Data encryption and hashing
Implementing SSl VPN using ASA Device Manager
Implementing the CISCO Adaptive Security Appliance
Software development security measures
IOS features for threat mitigation
Vulnerability scanning with MBSA and Nessus
GRE tunnel connectivity - configuration, verification, troubleshooting
Vulnerability detection using IPv4/IPv6 access lists for traffic filtering
Port security configuration, verification, & troubleshooting
AlienVault Monitoring & Reporting - SIEM and Netflow
Manual SQL injection and password cracking - DVWA
User account security and data privacy protocols
Wireless & cloud security assessment tools and methods
And more…