CyberSecurity Analyst (indypromo)

CyberSecurity Analyst (indypromo)

Regular price $2,995.00
/

Master the skills of a Cybersecurity Analyst

The Cybersecurity Analyst course will teach the concepts of monitoring and managing networks to identify malicious activity. In this role, you will monitor and manage networks to protect the security of systems and data. This training will arm you with the tools, knowledge, and skills necessary to function in this critical role and prepare you for the CySA+ certification exam.

Includes 1 free month of unlimited access to our Learning platform!
Buy a membership
to save even more!

Course Difficulty

Your Selected Schedule

Date:- 01/12/2024
Day:- M,T,W,Th
Time:- 06:00pm - 11:00pm Eastern
Get $1,000 off on any course with a Premier Membership.
Save 15% off any course with a Pro membership!
Get $1,000 off on any course with a Premier Membership.
Save 15% off any course with a Pro membership!
Get $1,000 off on any course with a Premier Membership.
Save 15% off any course with a Pro membership!

The Cybersecurity Analyst is a course designed to prepare you to take on the responsibilities associated with this pivotal role on the information security squad within your organization (or another) or to expand your capabilities in the role if you already hold that title. You’ll also be readied for the CySA+ certification test from CompTIA.

Based on the essential knowledge and skills associated with CySA+, students who successfully complete this training will demonstrate competence in a variety of specific tasks expected of the security analyst. You will gain in-depth knowledge of various tools associated with threat detection and risk mitigation and how to configure and use them in securing networks and data. You will also advance your ability to monitor and analyze network activity in order to identify malware and other potential threats and recommend or implement appropriate countermeasures.

Identify the presence of malware on the network and recommend tools and strategies to mitigate the threat
Analyze network performance data to identify vulnerabilities, threats, risks, and potential data breaches or malware attacks
Recognize Advanced Persistent Threats (APTs) across a broad attack surface
Configure and use threat detection tools and protocols
Network topology discovery (passive & active)
Social Engineering Reconnaissance
Windows command line tools for threat detection & mitigation
How to monitor network servers for security
Gathering and interpreting threat intelligence
Identifying attack types, assessing risk, deploying countermeasures
Security assessments and compliance
DNS harvesting
Packet sniffing
Intrusion detection and traffic analysis
Understanding and identifying malware threats
Compliance patching
Introduction to digital forensics
Implementing initial and advanced phases of incident response
Data encryption and hashing
Implementing SSl VPN using ASA Device Manager
Implementing the CISCO Adaptive Security Appliance
Software development security measures
IOS features for threat mitigation
Vulnerability scanning with MBSA and Nessus
GRE tunnel connectivity - configuration, verification, troubleshooting
Vulnerability detection using IPv4/IPv6 access lists for traffic filtering
Port security configuration, verification, & troubleshooting
AlienVault Monitoring & Reporting - SIEM and Netflow
Manual SQL injection and password cracking - DVWA
User account security and data privacy protocols
Wireless & cloud security assessment tools and methods
And more…