CompTIA Digital Solutions Catalog

COURSE OVERVIEW

What’s in the exam? The CompTIA CySA+ exam ensures the candidate has the knowledge and skills required to: • Detect and analyze indicators of malicious activity • Understand threat hunting and threat intelligence concepts • Use appropriate tools and methods to manage, prioritize, and respond to attacks and vulnerabilities • Perform incident response processes • Understand reporting and communication concepts related to vulnerability management and incident response activities.

Learners experience both knowledge acquisition and hands-on skills attainment through a single login and seamless workflow. Additionally, organizations who purchase the integrated course will be able to review student and group lab scores in the CertMaster Learn Boost Dashboard and hold students accountable for lab work. INTEGRATED LEARNING PRODUCTS CERTMASTER LEARN & CERTMASTER LABS

Student Guide Lesson Overview

1 Lesson 1: Understanding Vulnerability Response, Handling, and Management

2

Lesson 2: Exploring Threat Intelligence and Threat Hunting Concepts

Lesson 3: Explaining Important System and Network Architecture Concepts

3

Lesson 4: Understanding Process Improvement in Security Operations

4

5

Lesson 5: Implementing Vulnerability Scanning Methods

Lesson 6: Performing Vulnerability Analysis

6

Purchase CompTIA CySA+ Here

Lesson 7: Communicating Vulnerability Information

7

BUY NOW

Lesson 8: Explaining Incident Response Activities

8

Lesson 9: Demonstrating Incident Response Communication

9

Lesson 10: Applying Tools to Identify Malicious Activity

10

Lesson 11: Analyzing Potentially Malicious Activity

11

Lesson 12: Understanding Application Vulnerability Assessment

12

Everybody in technology should have this [CySA+]. It should be mandatory if you’re going to stay in IT over the coming decade. Jim Lucari SENIOR MANAGER, CERTIFICATION SOLUTIONS DEVELOPMENT, HP ENTERPRISE

Lesson 13: Exploring Scripting Tools and Analysis Concepts

13

Lesson 14: Understanding Application Security and Attack Mitigation Best Practices

14

VIEW COURSE OUTLINE

Powered by