Course Description

This certification covers the skills and knowledge that are associated with Firewall Technology, Critical examination of Cybersecurity based analytics (for example, reviewing log files from servers), the ability to conduct various kinds of data analysis to positively confirm any security weaknesses, threats, or vulnerabilities that are posed to a business or a corporation, the ability to configure and deploy various kinds of network-based, threat detection tools, and the know-how in securing software-based applications in the entity.

This course will help prepare students for the CySA+ Certification examination.

Sept. 12, 2020

Program Requirements

DeliveryOnline
Length2-4 weeks
VA ApprovedGI Bill & VET-TEC
CertificationCySA+

Objectives

  • Apply environmental reconnaissance techniques using appropriate tools and processes
  • Analyze the results of a network reconnaissance
  • Implement or recommend appropriate response and countermeasures
  • Explain the purpose of practices used to secure a corporate environment
  • Implement information security vulnerability management processes
  • Analyze the output resulting from a vulnerability scan
  • Compare and contrast common vulnerabilities found within an organization
  • Analyze threat data or behavior to determine the impact of an incident
  • Prepare a toolkit and use appropriate forensics tools during an investigation
  • Explain the importance of communication during the incident response process
  • Analyze common symptoms to select the best course of action to support incident response
  • Summarize the incident recovery and post-incident response processes
  • Explain the relationship between frameworks, common policies, controls, and procedures
  • Use data to recommend remediation of security issues related to identity and access management
  • Review security architecture and make recommendations to implement compensating controls
  • Use application security best practices while participating in the software development life cycle
  • Compare and contrast the general purpose and reasons for using various security tools and technologies

Prerequisite

It is recommended that CySA+ candidates must have a minimum of 3-4 years of hands-on information/cybersecurity or related experience.

Course Content

Enterprise Security: Policies, Practices, and Procedures

Computer Fundamentals: Networking A. What Is Networking?

The Issues of Identity and Access Management (IAM)

Secure Software Development

Performing and Analyzing Network Reconnaissance

Implementing and Performing Vulnerability Management