CompTIA C​SA+

About This Course

Course Code Duration Dates & Prices
COMPCSA 5-days

Course Overview

This course is intended for those wishing to gain the CompTIA CSA+ Cybersecurity Analyst Certification. CompTIA's CSA+ Certification is an intermediate-level certificate for IT professionals with previous experience of working in the field of IT security. The CompTIA CSA+ examination is designed for IT security analysts, vulnerability analysts, or threat intelligence analysts. The exam will certify that the successful candidate has the knowledge and skills required to configure and use threat detection tools, perform data analysis, and interpret the results to identify vulnerabilities, threats, and risks to an organisation with the end goal of securing and protecting applications and systems within an organisation.

What's Included?

Materials, Refreshments, Trainers

Target Audience

This course is for students wishing to take and pass both CompTIA A+ exams (220-901 and 220-902). It is also suitable for students with (or seeking) job roles such as Help Desk technician, Service Desk Analyst, Field Service Technician, IT support Technician, IT Support Administrator, or IT Infrastructure Technician.

Success in the CompTIA A+ exams helps to prepare for a career in IT support, perhaps leading to further CompTIA vendor-neutral certifications or qualifications from Microsoft, Cisco and others.

Prerequisites

Ideally, you should have successfully completed CompTIA Network+ Certification AND Security+ Certification courses or have equivalent knowledge before attending this training.

Course Outline

Module 1 – Threat Management 1
• Cybersecurity Analysts  •  Cybersecurity Roles and Responsibilities  • Frameworks and Security Controls  • Risk Evaluation  • Penetration Testing Processes  • Reconnaissance Techniques  • The Kill Chain  • Open Source Intelligence  • Social Engineering  • Topology Discovery  • Service Discovery  • OS Fingerprinting

Module 2 – Threat Management 2
• Security Appliances  • Configuring Firewalls  • Intrusion Detection and Prevention  • Configuring IDS  • Malware Threats  • Configuring Anti-virus Software  • Sysinternals  • Enhanced Mitigation Experience Toolkit • Logging and Analysis  • Packet Capture  • Packet Capture Tools  • Monitoring Tools  • Log Review and SIEM  • SIEM Data Outputs  • SIEM Data Analysis  • Point-in-Time Data Analysis

Module 3 – Vulnerability Management
• Managing Vulnerabilities  • Vulnerability Management Requirements  • Asset Inventory  • Data Classification  • Vulnerability Management Processes  • Vulnerability Scanners  • Microsoft Baseline Security Analyzer  • Vulnerability Feeds and SCAP  • Configuring Vulnerability Scans  • Vulnerability Scanning Criteria  • Exploit Frameworks  • Remediating Vulnerabilities  • Analyzing Vulnerability Scans  • Remediation and Change Control  • Remediating Host Vulnerabilities  • Remediating Network Vulnerabilities  • Remediating Virtual Infrastructure Vulnerabilities  • Secure Software Development  • Software Development Lifecycle  • Software Vulnerabilities  • Software Security Testing  • Interception Proxies  • Web Application Firewalls  • Source Authenticity  • Reverse Engineering

Module 4 – Cyber Incident Response
• Incident Response  • Incident Response Processes  • Threat Classification  • Incident Severity and Prioritization  • Types of Data  •  Forensics Tools  • Digital Forensics Investigations  • Documentation and Forms • Digital Forensics Crime Scene  • Digital Forensics Kits  • Image Acquisition  • Password Cracking  • Analysis Utilities  • Incident Analysis and Recovery  • Analysis and Recovery Frameworks  • Analyzing Network Symptoms  • Analyzing Host Symptoms  • Analyzing Data Exfiltration  • Analyzing Application Symptoms  • Using Sysinternals  • Containment Techniques  • Eradication Techniques  • Validation Techniques  • Corrective Actions

Module 5 – Security Architecture
• Secure Network Design  • Network Segmentation  • Blackholes, Sinkholes, and Honeypots  • System Hardening  • Group Policies and MAC  • Endpoint Security  • Managing Identities and Access  • Network Access Control  • Identity Management  • Identity Security Issues  • Identity Repositories  • Context-based Authentication  • Single Sign On and Federations  • Exploiting Identities  • Exploiting Web Browsers and Applications  • Security Frameworks and Policies  • Frameworks and Compliance  • Reviewing Security Architecture  • Procedures and Compensating Controls  • Verifications and Quality Control  • Security Policies and Procedures  • Personnel Policies and Training

 

NILC reserves the right to improve the specification and format of its courses for the benefit of its customers without prior notice to the customer.

By location

By region

By date

No courses currently scheduled. Please contact us for next available dates.

GET IN TOUCH


Newport: 01633 256482

Cardiff: 02921 690082

FOLLOW US