Scroll to top button

CompTIA Cybersecurity Analyst (CySA+) Course & Labs

ISBN : 9781616910259

Kick start your prep for the CompTIA CySA+ CS0-001 certification exam with the CompTIA Cybersecurity Analyst (CySA+) course and lab. The lab simulates real-world, hardware, software, and command-line interface environments and can be mapped to any text-book, course or training. The study guide provides complete coverage of the CS0-001 exam objectives and includes topics such as policy and compliance; forensic analysis, vulnerability scans, identity and access management security; and many more. The CompTIA Cybersecurity Analyst CS0-001 certification exam is designed for IT security analysts, vulnerability analysts, or threat intelligence analysts.

The CompTIA Cybersecurity Analyst (CySA+) is an international, vendor-neutral credential that applies behavioral analytics to improve the overall state of IT security. CompTIA CySA+ certification exam validates the critical knowledge and skills that are required to prevent, detect, and combat cybersecurity threats. The exam validates the expertise of professionals to configure and use threat detection tools; perform data analysis, interpret the results to identify vulnerabilities, and much more.

Glossary of terms
Pre Assessment Questions
Full Length Tests
Post Assessment Questions
Performance lab
Learn the real world skills using LiveLab.
  • What Does This Book Cover?
  • Setting Up a Kali and Metasploitable Learning Environment
  • Setting Up Your Environment
  • Objectives Map for CompTIA Cybersecurity Analyst (CySA+) Exam CS0-001
  • Cybersecurity Objectives
  • Evaluating Security Risks
  • Building a Secure Network
  • Secure Endpoint Management
  • Penetration Testing
  • Reverse Engineering
  • Summary
  • Exam Essentials
  • Lab Exercises
  • Footprinting
  • Passive Footprinting
  • Gathering Organizational Intelligence
  • Detecting, Preventing, and Responding to Reconnaissance
  • Summary
  • Exam Essentials
  • Lab Exercises
  • Identifying Vulnerability Management Requirements
  • Configuring and Executing Vulnerability Scans
  • Developing a Remediation Workflow
  • Overcoming Barriers to Vulnerability Scanning
  • Summary
  • Exam Essentials
  • Lab Exercises
  • Reviewing and Interpreting Scan Reports
  • Validating Scan Results
  • Common Vulnerabilities
  • Summary
  • Exam Essentials
  • Lab Exercises
  • Security Incidents
  • Phases of Incident Response
  • Building the Foundation for Incident Response
  • Creating an Incident Response Team
  • Coordination and Information Sharing
  • Classifying Incidents
  • Summary
  • Exam Essentials
  • Lab Exercises
  • Analyzing Network Events
  • Handling Network Probes and Attacks
  • Investigating Host Issues
  • Investigating Service and Application Issues
  • Summary
  • Exam Essentials
  • Lab Exercises
  • Building a Forensics Capability
  • Understanding Forensic Software
  • Conducting a Forensic Investigation
  • Forensic Investigation: An Example
  • Summary
  • Exam Essentials
  • Lab Exercises
  • Containing the Damage
  • Incident Eradication and Recovery
  • Wrapping Up the Response
  • Summary
  • Exam Essentials
  • Lab Exercises
  • Understanding Policy Documents
  • Complying with Laws and Regulations
  • Adopting a Standard Framework
  • Implementing Policy-Based Controls
  • Security Control Verification and Quality Control
  • Summary
  • Exam Essentials
  • Lab Exercises
  • Understanding Defense in Depth
  • Implementing Defense in Depth
  • Analyzing Security Architecture
  • Summary
  • Exam Essentials
  • Lab Exercises
  • Understanding Identity
  • Threats to Identity and Access
  • Identity as a Security Layer
  • Understanding Federated Identity and Single Sign-On
  • Summary
  • Exam Essentials
  • Lab Exercises
  • Understanding the Software Development Life Cycle
  • Designing and Coding for Security
  • Software Security Testing
  • Summary
  • Exam Essentials
  • Lab Exercises
  • Host Security Tools
  • Monitoring and Analysis Tools
  • Scanning and Testing Tools
  • Network Security Tools
  • Web Application Security Tools
  • Forensics Tools
  • Summary

Hands on Activities (Labs)

  • Performing reconnaissance on a network
  • Identifying search options in Metasploit
  • Performing initial scan
  • Initiating an SSH session from your Windows 10 client to your Windows Server
  • Conducting vulnerability scans
  • Consulting a vulnerability database
  • Examining the DDOS_Attack.pcap file
  • Retrieving a real-time list of running processes
  • Examining the audited events
  • Adding revision to the revision history
  • Viewing and downloading the policy templates
  • Opening the policy template and setting the company name
  • Reviewing and modifying the policy items
  • Implementing security during the SDLC
  • Using Process Explorer to view specific details about running processes on the system
  • Making syslog entries readable
  • Installing Splunk on the server
  • Downloading and running scanning tools
  • Acquainting yourself with Wireshark's interface
  • Analyzing the capture file to find the attack(s)
  • Generating network traffic and using filter
  • Confirming the spoofing attack in Wireshark
  • Starting a live packet capture

Customer Testimonials

Luis Gallegos
I started using uCertify to prepare myself for the CySA+ exam and can honestly say that it is an awesome tool for preparing yourself. It has multiple methods to train which includes flash cards, interactive labs, and practice exams. The lessons and flash cards are basic training aids that are still very effective. But the strength of this course lies in its labs and practice exams. Overall, this course is a useful training aid in preparation to taking the CySA+ certification exam from CompTIA. uCertify did a great job in providing several methods for the student to learn the subject and succeed in passing the certification exam.
I was offered the normal course material, but uCertify went beyond that and provided flashcards, labs, and practice test. The knowledge and education I gained from taking the CySA + from uCertify were superior among the rest. This course allowed me to test my knowledge through a practice test and flashcards. In addition, I gained hands-on experience through lab exercises. I rate uCertify courses a 5 out of 5 and would highly recommend uCertify if you are looking for an all-around course that will give you the knowledge and skills necessary to stand out among the rest.
Emmanuel C. OGU
I have been reviewing the CompTIA Cybersecurity Analyst+ Certification training offered by uCertify, and it has truly been a very enlightening and engaging one. I would totally recommend the Training Course to newcomers to cybersecurity, as well as experts looking to actively expand their skillset.