Upgrade your skills with an extra 25% off selected courses with codeMTA25
certificate
CySA001

CompTIA Cybersecurity Analyst (CySA+) Course

195.0000 2023-12-30 CySA001 195.0000
104 104 104 0 This is a complete and comprehensive CompTIA CySA+ Certification (CS0-001) course. https://mytrainingacademy.org.uk/pub/media/catalog/product/r/s/rsz_cysa-808157346.jpg
  • Price

    £195.00 including VAT (was £395.00)

    Offer ends 30 April 2024

    Save £200.00
  • Course Type Online Course
  • Course Duration 18 Hours
  • Course Access 12 Months
  • Awarded By CompTIA
  • Student Discount Card All students enrolled on this course are eligible to apply for a TOTUM Pro card
Share
CySA001
This is a complete and comprehensive CompTIA CySA+ Certification (CS0-001) course.
-
+
Course Description

Please note that CompTIA have retired the CySA CS0-001 exam. Although the exam associated with this course has been retired by CompTIA, this course still retains value as a training resource & learners will receive a certificate of completion after completing the course.

CompTIA is a globally recognised provider of top quality IT certifications that help to train and identify knowledgeable IT professionals.

This is a complete and comprehensive CompTIA CySA+ Certification (CS0-001) course. It is designed to prepare the student to be able to take and pass the Cybersecurity Analyst exam and become CompTIA CySA+ Certified.Obtaining the CompTIA Cybersecurity Analyst (CySA+) certification validates that you have the knowledge required to prevent, detect, and combat cybersecurity threats. 

As attackers have learned to evade traditional signature-based solutions, such as firewalls, an analytics-based approach within the IT security industry is increasingly important for most organizations. The behavioral analytics skills covered by CySA+ identify and combat malware, and advanced persistent threats (APTs), resulting in enhanced threat visibility across a broad attack surface.

CompTIA CySA+ is for IT professionals looking to gain the following security analyst skills:

  • Perform data analysis and interpret the results to identify vulnerabilities, threats and risks to an organization.
  • Configure and use threat-detection tools.
  • Secure and protect applications and systems within an organization.

CompTIA Cybersecurity Analyst Entry Requirements

While there is no required prerequisite, CySA+ is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus.

Bulk discounts

Bulk discounts are available on purchases of 10 or more courses.

If you wish to discuss a large individual order for this course, and/or would like to be invoiced in advance, please call our sales team on 0808 175 1269 to make an enquiry.

Who is this course for?

Anyone interested in becoming a Cyber Security professional.

By choosing online learning instead of a classroom based course, it eliminates the need for time away from work, saving you valuable time and money. It is ideal for those with tight schedules as our online courses give you 12 months unlimited access to all the course materials, so you can study at a pace that suits you. Allowing you to easily resume your studies whenever you have the time. All you need is internet connection to study, so you can study from the comfort of your home or any environment that suits you.

Course Assessment Process

To earn your official cybersecurity analyst certification from CompTIA, you will need to study this course and achieve a passing mark for the CompTIA Cybersecurity Analyst CS0-001 exam. 

To help you prepare for your exam, we provide a mock exam at the end of your course with over 100 multiple choice questions to ensure you’re fully prepared for the real thing. Once you’ve passed with at least 90%, you’ll be ready to book your exam as a private candidate. To make life easier, we can help you find an appropriate exam centre and give you all the information you need to secure your place. 

Please note that the CompTIA exam fees are not included in the course price. To find the latest exam prices, visit:

Once you’re fully prepared and ready to sit your exam, all you’ll have to do is purchase your exam voucher and sit your exam either online or at a test centre near you. Online testing offers you the ease and convenience to test for your certification from any quiet, distraction-free and secure location at any time. For more testing options, please visit CompTIA Testing Options

For in-person testing, you can use the Pearson Vue Test Locator to find test centre locations near you.

Got a question about exams? Contact our course advisors by email or by phone on 0808 175 1269. We're happy to help!

Requirements

Our training works on all devices including Mobile phones, IPad’s, Android tablets, Macs and PC’s.

For the best viewing experience on our state-of-the-art eLearning platform we recommend an internet connection of 10Mbps or better. Please also use Google Chrome or Mozilla Firefox as your browser with Adobe Flash Player.

Course Media
Career Path

We've put together a list of relevant job titles you can apply for after achieving the CompTIA cybersecurity analyst certification (note that some careers may require further study, training and/or work experience):

  • Penetration Tester
  • Junior Penetration Tester
  • IT Security Manager
  • Network Analyst
  • Security Analyst
  • Security Advisor
  • IT Security Specialist

In these roles, the average salary you can earn is £65,000.00 per year (source: itjobswatch.co.uk, UK Only). IT Jobs Watch provides a unique perspective on today's information technology job market. Their aim is to present a concise and accurate map of the prevailing UK IT job market conditions.

Career Advice

Once you have achieved your certification, you'll have full access to our recruitment package for a wide range of information and advice - including:

  • How to put together a killer CV, Covering Letters and Thank You emails.
  • How to gain relevant work experience.
  • How to prepare for interviews.
  • How to understand Job adverts.
  • How to choose the right recruitment agency.
  • How to look for work on LinkedIn.
  • Information on dealing with redundancy.

Our careers advice section is available for you to see now. For more information about our career advice services, contact us on 0808 175 1269 to speak with one of our friendly course advisors today.

Career Development

Professional certification is critical for any IT technician who wants to establish a long and successful career. By earning CompTIA A+ certification, you will demonstrate your competency as an entry-level computer technician, which can open the door to a wide range of exciting career possibilities.

Many employers consider the CompTIA A+ certification as a prerequisite when considering applicants for positions such as IT Technicians or Technical Support Staff. It is trusted as a solid starting point in the IT field and will be a great addition to your CV.

Getting a CompTIA certification will always help you stand out from the crowd, now and in the future - whether you're just starting out, developing your career, or changing direction entirely. 

Course Outline

CompTIA Cybersecurity Analyst course outline 

Module 1: Threat Management

  • Introduction
  • Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 1
  • Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 2
  • Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 3
  • Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 4
  • Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 5
  • Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 6
  • Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 7
  • Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 8
  • Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 9
  • Given a scenario, analyze the results of a network reconnaissance Part 1
  • Given a scenario, analyze the results of a network reconnaissance Part 2
  • Given a scenario, analyze the results of a network reconnaissance Part 3
  • Given a scenario, analyze the results of a network reconnaissance Part 4
  • Given a scenario, analyze the results of a network reconnaissance Part 5
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 1
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 2
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 3
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 4
  • Explain the purpose of practices used to secure a corporate environment Part 1
  • Explain the purpose of practices used to secure a corporate environment Part 2
  • Explain the purpose of practices used to secure a corporate environment Part 3
  • Explain the purpose of practices used to secure a corporate environment Part 4

Module 2: Vulnerability Management

  • Given a scenario, implement an information security vulnerability management process Part 1
  • Given a scenario, implement an information security vulnerability management process Part 2
  • Given a scenario, implement an information security vulnerability management process Part 3
  • Given a scenario, implement an information security vulnerability management process Part 4
  • Given a scenario, implement an information security vulnerability management process Part 5
  • Given a scenario, implement an information security vulnerability management process Part 6
  • Given a scenario, implement an information security vulnerability management process Part 7
  • Given a scenario, analyze the output resulting from a vulnerability scan Part 1
  • Given a scenario, analyze the output resulting from a vulnerability scan Part 2
  • Compare and contrast common vulnerabilities found in the following targets within an organization Part 1
  • Compare and contrast common vulnerabilities found in the following targets within an organization Part 2
  • Compare and contrast common vulnerabilities found in the following targets within an organization Part 3

Module 3: Cyber Incident Response

  • Given a scenario, distinguish threat data or behavior to determine the impact of an incident Part 1
  • Given a scenario, distinguish threat data or behavior to determine the impact of an incident Part 2
  • Given a scenario, distinguish threat data or behavior to determine the impact of an incident Part 3
  • Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 1
  • Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 2
  • Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 3
  • Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 4
  • Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 5
  • Explain the importance of communications during the incident response process
  • Given a scenario, analyze common symptoms to select the best course of action to support incident response Part 1
  • Given a scenario, analyze common symptoms to select the best course of action to support incident response Part 2
  • Given a scenario, analyze common symptoms to select the best course of action to support incident response Part 3
  • Given a scenario, analyze common symptoms to select the best course of action to support incident response Part 4
  • Summarize the incident recovery and post-incident response process Part 1
  • Summarize the incident recovery and post-incident response process Part 2
  • Summarize the incident recovery and post-incident response process Part 3
  • Summarize the incident recovery and post-incident response process Part 4

Module 4: Security Architecture and Tool Sets

  • Explain the relationship between frameworks, common policies, controls, and procedures Part 1
  • Explain the relationship between frameworks, common policies, controls, and procedures Part 2
  • Explain the relationship between frameworks, common policies, controls, and procedures Part 3
  • Explain the relationship between frameworks, common policies, controls, and procedures Part 4
  • Given a scenario, use data to recommend remediation of security issues related to identity and access management Part 1
  • Given a scenario, use data to recommend remediation of security issues related to identity and access management Part 2
  • Given a scenario, use data to recommend remediation of security issues related to identity and access management Part 3
  • Given a scenario, use data to recommend remediation of security issues related to identity and access management Part 4
  • Given a scenario, review security architecture and make recommendations to implement compensating controls Part 1
  • Given a scenario, review security architecture and make recommendations to implement compensating controls Part 2
  • Given a scenario, review security architecture and make recommendations to implement compensating controls Part 3
  • Given a scenario, use applications security best practices while participating in the Software Development Life Cycle (SDLC) Part 1
  • Given a scenario, use applications security best practices while participating in the Software Development Life Cycle (SDLC) Part 2
  • Overview
  • Conclusion

Training Features
  • feature
    EXPERT INSTRUCTOR-LED TRAINING

    We only use the industry’s finest instructors to develop our courses. They have a minimum of 15 years real-world experience and are subject matter experts in their fields. Unlike a live class, you can fast-forward, repeat or rewind all your lectures. This creates a personal learning experience and gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7.

     
  • feature
    EXAM SIMULATORS

    To help you prepare for your exam, we provide a mock exam at the end of your course with over 100 multiple choice questions to ensure you’re fully prepared for the real thing. Our mock exams offer tailored practice that mirrors the format, difficulty, and content of your certification test. Practice makes perfect, and with our extensive question bank, you can hone your skills, improve time management, and boost your confidence.

     
  • feature
    VISUAL DEMONSTRATIONS & MULTIMEDIA PRESENTATIONS

    Our courseware includes instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor. Our Courseware always focuses on real world scenarios and skill-set development.

     
  • feature
    NAVIGATION & CONTROLS

    Our self-paced training programs are designed in a modular fashion to allow you the flexibility to work with expert level instruction anytime 24/7. All courses are arranged in defined sections with navigation controls allowing you to control the pace of your training. This allows students to learn at their own pace around their schedule.

     
  • feature
    SOCIAL LEARNING & NETWORKING

    We Have designed a world class Learning Management System (LMS). This system allows you to interact and collaborate with other students, form study groups, engage in discussions in our NOW@ Forums, rate and “like” different courses and stay up to date with all the latest industry knowledge through our forums, student contributions and announcement features. This LMS is unmatched in the industry and makes learning fun and enjoyable.

     
  • feature
    FLASH CARDS & EDUCATIONAL GAMES

    Our Courseware knows that education is not a one size fits all approach. Students learn in different ways through different tools. That is why we provide Flash Cards and Education Games throughout our courses. This will allow you to train in ways that keep you engaged and focused. Each course will have dozens of Flash Cards so you can sharpen your skill-sets throughout your training as well as educational games designed to make sure your retention level of the materials is extremely high.

     
  • feature
    12 MONTHS UNLIMITED ACCESS

    Each student will have 12 months unlimited access to allow you to have access to the training anytime 24/7.

     
Payment Options

For purchases of 1 to 9 user enrolments select the number of users you require and add the course to your shopping basket by selecting Add to Basket. You will then be able to make payment using most credit and debit cards or a PayPal account. Once payment is confirmed, we’ll process your order and email your course login instructions.

For a licence for 10 or more user enrolments, discounts, or if you would like to pay by BACs transfer or by invoice, please contact us on 0808 175 1269 or email sales@mytrainingacademy.org.uk.

Purchase Order Payments: To pay and enrol for courses using a purchase order (PO), please email your PO details to sales@mytrainingacademy.org.uk.

TOTUM PRO Card

All students enrolled on this course are eligible to apply for a TOTUM PRO Card, which offers discounts in a wide range of shops and websites, helping you get money off food, holidays and flights, clothes, make-up gym memberships and much more.

TOTUM PRO card is aimed at professional learners, giving you access to exclusive discounts. Explore the full list of offers.

Student Reviews

We make it our absolute mission to give you the training you need and the service you deserve. Hear what our students say about us...

£395.00 £195.00

Save £200.00

Was £395.00 (Offer ends 30/04/2024)
CompTIA Cybersecurity Analyst (CySA+) Course
-
+
 
Enquire now

Speak to an advisor

+44 (0)808 175 1269

This is a local rate number

klarna

Spread the cost

Interest-free instalments

Read more...

14-Day money-back guarantee

Buying for your team?


Enquire now

Privacy
Protected

Secure
Checkout

We're trusted by
Individuals, small businesses and large corporations who continuously put their trust in My Training Academy.
We are privileged to have trained individuals who work for some of the world’s largest companies, including: