CSA+ : Cybersecurity Analyst+ (CSA+)

CSA-plus_pro
CS0-001-lab
Cybersecurity Analyst+ (CSA+)
ISBN : 978-1-61691-971-9
Gain hands-on experience in CompTIA CS0-001 certification exam with Cybersecurity Analyst+ (CSA+) performance-based labs. Performance-based labs simulate real-world, hardware, software & command line interface environments and can be mapped to any text-book, course & training. CompTIA Cybersecurity Analyst (CSA+) certification exam is an international, vendor-neutral credential designed for IT security analysts, vulnerability analysts, or threat intelligence analysts to configure and use threat detection tools; perform data analysis; and interpret the results to identify vulnerabilities, threats, and risks to an organization with the end goal of securing and protecting applications and systems within an organization.

Here's what you will get

The CompTIA Cybersecurity Analyst (CSA+) is an international, vendor-neutral cybersecurity certification that applies behavioral analytics to improve the overall state of IT security. CSA+ validates critical knowledge and skills that are required to prevent, detect, and combat cybersecurity threats.

Lab
Performance based lab
40+
Exam FAQs
What are the prerequisites for this exam? There is no required prerequisite for CompTIA CS0-001 certification exam, but the candidate should hold CompTIA Network+, Security+ or equivalent knowledge. He or she should have a minimum of 3-4 years of hands-on information security or related experience.
What is the exam registration fee? USD 320
Where do I take the exam? Pearson VUE
What is the format of the exam? Multiple-choice and performance-based
How many questions are asked in the exam? The exam contains 85 questions.
What is the duration of the exam? 165 minutes
What is the passing score? 750

(on a scale of 100-900)

What is the validity of the certification? TBD - Three years after launch.
Where can I find more information about this exam? To know more about the CS0-001-lab, click here.
Which certification covers this exam?
What are the career opportunities after passing this exam?
  • Security Analyst
  • Vulnerability Analyst
  • Cybersecurity Specialist
  • Threat Intelligence Analyst
  • Security Operations Center (SOC) Analyst

Here's what you will learn

Hands on Activities (Labs)

  • Viewing and downloading the policy templates
  • Opening the policy template and setting the company name
  • Reviewing and modifying the policy items
  • Adding revision to the revision history
  • Finding information security blogs
  • Consulting a vulnerability database
  • Identifying the most significant emerging technologies of 2016
  • Performing reconnaissance on a network
  • Installing Wireshark and WinPcap
  • Acquainting yourself with Wireshark's interface
  • Analyzing the capture file to find the attack(s)
  • Generating network traffic and using filter
  • Examining the traffic between client and server
  • Assessing the impact of malware
  • Confirming the spoofing attack in Wireshark
  • Examining the DDOS_Attack.pcap file
  • Identifying security apps available for Android
  • Downloading and running scanning tools
  • Conducting vulnerability scans
  • Identifying search options in Metasploit
  • Performing initial scan
  • Collecting network-based security intelligence
  • Exporting your Windows Server logs
  • Making syslog entries readable
  • Installing Splunk on the server
  • Manipulating Kali Linux VM's network interfaces
  • Retrieving a real-time list of running processes
  • Starting a live packet capture
  • Using Process Explorer to view specific details about running processes on the system
  • Examining the ipconfig options and creating the activity log
  • Initiating an SSH session from your Windows 10 client to your Windows Server
  • Accessing remotely the DT_Watch folder to generate audit logs
  • Acquiring the Trojan horse simulator
  • Uploading the Trojan horse simulator to VirusTotal
  • Uploading the Trojan horse simulator to Malwr
  • Identifying a suspicious account on the Active Directory domain
  • Enabling auditing of the DT_Watch folder
  • Enabling logging for audited objects
  • Examining the audited events
  • Implementing security during the SDLC