pearson-cysa-plus-complete : Pearson CompTIA Cybersecurity Analyst (CySA+) Course and Labs (Pearson-CySA+-Complete)

Pearson CompTIA Cybersecurity Analyst (CySA+) Course and Labs...
Includes:
227+ Test Prepkits
34+ Labs
Rating :
(16)
Kick start your prep for CompTIA CySA+ CS0-001 certification exam with Cybersecurity Analyst+ course and performance-based labs. Performance-based labs simulate real-world, hardware, software & command line interface environments and can be mapped to any text-book, course & training. The course and labs cover the objectives of the CS0-001 certification exam. The course provides you the necessary skills required to configure and use threat detection tools; perform data analysis; and interpret the results to identify vulnerabilities, threats, and risks to an organization with the end goal of securing and protecting applications and systems within an organization.

Here's what you will get

The CompTIA Cybersecurity Analyst (CySA+) certification is an international, vendor-neutral credential that applies behavioral analytics to improve the overall state of IT security. CySA+ validates critical knowledge and skills that are required to prevent, detect, and combat cybersecurity threats. CompTIA Cybersecurity Analyst+: CS0-001 certification exam is designed for IT security analysts, vulnerability analysts, or threat intelligence analysts.

Lessons
Lessons
15+
Quizzes
227+
Flashcards
543+
Glossary of terms
543+
TestPrep
Pre-assessment Questions
85+
Full Length Tests
2+
Post-Assessment Questions
87+
Lab
Performance based lab
34+
Exam FAQs
What are the prerequisites for this exam? There is no required prerequisite for CompTIA CS0-001 certification exam, but the candidate should hold CompTIA Network+, Security+ or equivalent knowledge. Candidate should have a minimum of 3-4 years of hands-on information security or related experience.
What is the exam registration fee? USD 346
Where do I take the exam? Pearson VUE
What is the format of the exam? Multiple-choice and performance-based
How many questions are asked in the exam? The exam contains 85 questions.
What is the duration of the exam? 165 minutes
What is the passing score? 750

(on a scale of 100-900)

What is the exam's retake policy?

In the event that you fail your first attempt at passing the CySA+ examination, CompTIA's retake policies are:

  1. CompTIA does not require a waiting period between the first and second attempt to pass such examination. However, if you need a third or subsequent attempt to pass the examination, you shall be required to wait for a period of at least 14 calendar days from the date of your last attempt before you can retake the exam.
  2. If a candidate has passed an exam, he/she cannot take it again without prior consent from CompTIA.
  3. A test result found to be in violation of the retake policy will not be processed, which will result in no credit awarded for the test taken. Repeat violators will be banned from participation in the CompTIA Certification Program.
  4. Candidates must pay the exam price each time they attempt the exam. CompTIA does not offer free re-tests or discounts on retakes.
What is the validity of the certification? CompTIA CySA+ certification expires after three years from the date of issue, after which the certification holder will need to renew their certification via CompTIA's Continuing Education Program.
Where can I find more information about this exam? To know more about the pearson-cysa-plus-complete, click here.
Which certification covers this exam?
What are the career opportunities after passing this exam?
  • Security Analyst
  • Vulnerability Analyst
  • Cybersecurity Specialist
  • Threat Intelligence Analyst
  • Security Operations Center (SOC) Analyst

Here's what you will learn

  • Goals and Methods
  • Who Should Read This Book?
  • Strategies for Exam Preparation
  • Procedures/Common Tasks
  • Variables
  • Tools
  • Review All Key Topics
  • Point-in-Time Data Analysis
  • Data Correlation and Analytics
  • Data Output
  • Tools
  • Review All Key Topics
  • Network Segmentation
  • Honeypot
  • Endpoint Security
  • Group Policies
  • ACLs
  • Hardening
  • Network Access Control
  • Review All Key Topics
  • Penetration Testing
  • Reverse Engineering
  • Training and Exercises
  • Risk Evaluation
  • Review All Key Topics
  • Identification of Requirements
  • Establish Scanning Frequency
  • Configure Tools to Perform Scans According to Specification
  • Execute Scanning
  • Generate Reports
  • Remediation
  • Ongoing Scanning and Continuous Monitoring
  • Review All Key Topics
  • Analyzing Output Resulting from a Vulnerability Scan
  • Common Vulnerabilities Found in Targets Within an Organization
  • Review All Key Topics
  • Threat Classification
  • Factors Contributing to Incident Severity and Prioritization
  • Forensics Kit
  • Forensic Investigation Suite
  • Review All Key Topics
  • Stakeholders
  • Purpose of Communication Processes
  • Role-Based Responsibilities
  • Using Common Symptoms to Select the Best Course of Action to Support Incident Response
  • Review All Key Topics
  • Containment Techniques
  • Eradication Techniques
  • Validation
  • Corrective Actions
  • Incident Summary Report
  • Review All Key Topics
  • Regulatory Compliance
  • Frameworks
  • Policies
  • Controls
  • Procedures
  • Verifications and Quality Control
  • Review All Key Topics
  • Security Issues Associated with Context-Based Authentication
  • Security Issues Associated with Identities
  • Security Issues Associated with Identity Repositories
  • Security Issues Associated with Federation and Single Sign-on
  • Exploits
  • Review All Key Topics
  • Security Data Analytics
  • Manual Review
  • Defense in Depth
  • Review All Key Topics
  • Best Practices During Software Development
  • Secure Coding Best Practices
  • Review All Key Topics
  • Preventative Tools
  • Collective Tools
  • Analytical Tools
  • Exploit Tools
  • Forensics Tools
  • Review All Key Topics

Hands on Activities (Labs)

  • Performing reconnaissance on a network
  • Downloading and running scanning tools
  • Initiating an SSH session from your Windows 10 client to your Windows Server
  • Opening the policy template and setting the company name
  • Reviewing and modifying the policy items
  • Adding revision to the revision history
  • Identifying security apps available for Android
  • Accessing remotely the DT_Watch folder to generate audit logs
  • Acquiring the Trojan horse simulator
  • Uploading the Trojan horse simulator to VirusTotal
  • Uploading the Trojan horse simulator to Malwr
  • Identifying a suspicious account on the System User Groups
  • Enabling auditing of the DT_Watch folder
  • Enabling logging for audited objects
  • Examining the audited events
  • Implementing security during the SDLC
  • Collecting network-based security intelligence
  • Installing Wireshark and WinPcap
  • Acquainting yourself with Wireshark's interface
  • Analyzing the capture file to find the attack(s)
  • Generating network traffic and using filter
  • Examining the traffic between client and server
  • Confirming the spoofing attack in Wireshark
  • Conducting vulnerability scans
  • Installing Splunk on the server
  • Manipulating Kali Linux VM's network interfaces
  • Starting a live packet capture
  • Using Process Explorer to view specific details about running processes on the system
  • Examining the ipconfig options and creating the activity log
  • Identifying search options in Metasploit
  • Performing initial scan