Upgrade your skills with an extra 25% off selected courses with codeMTA25
certificate
CySA001

CompTIA Cybersecurity Analyst (CySA+) Course

195.0000 2023-12-30 CySA001 195.0000
100 100 100 0 This is a complete and comprehensive CompTIA CySA+ Certification (CS0-001) course. https://mytrainingacademy.org.uk/pub/media/catalog/product/r/s/rsz_cysa-808157346.jpg
  • Price

    £195.00 including VAT (was £395.00)

    Offer ends 31 May 2022

    Save £200.00
  • Course Type Online Course
  • Course Duration 18 Hours
  • Course Access 12 Months
  • Awarded By CompTIA
  • Student Discount Card All students enrolled on this course are entitled to apply for a XO student discount card.
Share
CySA001
This is a complete and comprehensive CompTIA CySA+ Certification (CS0-001) course.
-
+
Course Description

CompTIA is a globally recognised provider of top quality IT certifications that help to train and identify knowledgeable IT professionals.

This is a complete and comprehensive CompTIA CySA+ Certification (CS0-001) course. It is designed to prepare the student to be able to take and pass the Cybersecurity Analyst exam and become CompTIA CySA+ Certified.Obtaining the CompTIA Cybersecurity Analyst (CySA+) certification validates that you have the knowledge required to prevent, detect, and combat cybersecurity threats. 

As attackers have learned to evade traditional signature-based solutions, such as firewalls, an analytics-based approach within the IT security industry is increasingly important for most organizations. The behavioral analytics skills covered by CySA+ identify and combat malware, and advanced persistent threats (APTs), resulting in enhanced threat visibility across a broad attack surface.

CompTIA CySA+ is for IT professionals looking to gain the following security analyst skills:

  • Perform data analysis and interpret the results to identify vulnerabilities, threats and risks to an organization.
  • Configure and use threat-detection tools.
  • Secure and protect applications and systems within an organization.

CompTIA Cybersecurity Analyst Entry Requirements

While there is no required prerequisite, CySA+ is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus.

Bulk discounts

Bulk discounts are available on purchases of 10 or more courses.

If you wish to discuss a large individual order for this course, and/or would like to be invoiced in advance, please call our sales team on 0808 175 1269 to make an enquiry.

Please Note: The CompTIA CySA+ (CS0-001) exam associated with this course was retired by CompTIA on 21 October, 2020. However, this course still retains value as a training resource.

Who is this course for?
Anyone interested in becoming a Cyber Security professional.
 
By choosing online learning instead of a classroom based course, it eliminates the need for time away from work, saving you valuable time and money. It is ideal for those with tight schedules as our online courses give you 12 months unlimited access to all the course materials, so you can study at a pace that suits you. Allowing you to easily resume your studies whenever you have the time. All you need is internet connection to study, so you can study from the comfort of your home or any environment that suits you.
Course Assessment Process

To earn your official cybersecurity analyst certification from CompTIA, you will need to study this course and achieve a passing mark for the CompTIA Cybersecurity Analyst CS0-001 exam. 

To prepare you for your exam, we provide interactive quizzes after each module and a mock exam at the end of your course to ensure you’re fully prepared for the real thing. Once you’ve passed with at least 85%, you’ll be ready to book your exam as a private candidate. To make life easier, we can help you find an appropriate exam centre and give you all the information you need to secure your place. 

 Please note that the CompTIA exam fees are not included in the course price. To find the latest exam prices, visit:

Once you’re fully prepared and ready to sit your exam, all you’ll have to do is purchase your exam voucher and schedule your exam at a test centre near you. You can use the Pearson Vue Test Locator to find test centre locations near you.For more information on how to schedule your exams, please visit our schedule my exams page.

Got a question about exams? Contact our course advisors by email or by phone on 0808 175 1269. We're happy to help!

Requirements

Our training works on all devices including Mobile phones, IPad’s, Android tablets, Macs and PC’s.

For the best viewing experience on our state-of-the-art eLearning platform we recommend an internet connection of 10Mbps or better. Please also use Google Chrome or Mozilla Firefox as your browser with Adobe Flash Player.

Course Media
Career Path

We've put together a list of relevant job titles you can apply for after achieving the CompTIA cybersecurity analyst certification (note that some careers may require further study, training and/or work experience):

  • Penetration Tester
  • Junior Penetration Tester
  • IT Security Manager
  • Network Analyst
  • Security Analyst
  • Security Advisor
  • IT Security Specialist

In these roles, the average salary you can earn is £65,000.00 per year (source: itjobswatch.co.uk, UK Only). IT Jobs Watch provides a unique perspective on today's information technology job market. Their aim is to present a concise and accurate map of the prevailing UK IT job market conditions.

Career Advice

Once you have achieved your certification, you'll have full access to our recruitment package for a wide range of information and advice - including:

  • How to put together a killer CV, Covering Letters and Thank You emails.
  • How to gain relevant work experience.
  • How to prepare for interviews.
  • How to understand Job adverts.
  • How to choose the right recruitment agency.
  • How to look for work on LinkedIn.
  • Information on dealing with redundancy.

Our careers advice section is available for you to see now. For more information about our career advice services, contact us on 0808 175 1269 to speak with one of our friendly course advisors today.

Career Development

Professional certification is critical for any IT technician who wants to establish a long and successful career. By earning CompTIA A+ certification, you will demonstrate your competency as an entry-level computer technician, which can open the door to a wide range of exciting career possibilities.

Many employers consider the CompTIA A+ certification as a prerequisite when considering applicants for positions such as IT Technicians or Technical Support Staff. It is trusted as a solid starting point in the IT field and will be a great addition to your CV.

Getting a CompTIA certification will always help you stand out from the crowd, now and in the future - whether you're just starting out, developing your career, or changing direction entirely. 

Course Outline

CompTIA Cybersecurity Analyst course outline 

Module 1: Threat Management

  • Introduction
  • Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 1
  • Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 2
  • Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 3
  • Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 4
  • Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 5
  • Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 6
  • Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 7
  • Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 8
  • Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 9
  • Given a scenario, analyze the results of a network reconnaissance Part 1
  • Given a scenario, analyze the results of a network reconnaissance Part 2
  • Given a scenario, analyze the results of a network reconnaissance Part 3
  • Given a scenario, analyze the results of a network reconnaissance Part 4
  • Given a scenario, analyze the results of a network reconnaissance Part 5
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 1
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 2
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 3
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 4
  • Explain the purpose of practices used to secure a corporate environment Part 1
  • Explain the purpose of practices used to secure a corporate environment Part 2
  • Explain the purpose of practices used to secure a corporate environment Part 3
  • Explain the purpose of practices used to secure a corporate environment Part 4

Module 2: Vulnerability Management

  • Given a scenario, implement an information security vulnerability management process Part 1
  • Given a scenario, implement an information security vulnerability management process Part 2
  • Given a scenario, implement an information security vulnerability management process Part 3
  • Given a scenario, implement an information security vulnerability management process Part 4
  • Given a scenario, implement an information security vulnerability management process Part 5
  • Given a scenario, implement an information security vulnerability management process Part 6
  • Given a scenario, implement an information security vulnerability management process Part 7
  • Given a scenario, analyze the output resulting from a vulnerability scan Part 1
  • Given a scenario, analyze the output resulting from a vulnerability scan Part 2
  • Compare and contrast common vulnerabilities found in the following targets within an organization Part 1
  • Compare and contrast common vulnerabilities found in the following targets within an organization Part 2
  • Compare and contrast common vulnerabilities found in the following targets within an organization Part 3

Module 3: Cyber Incident Response

  • Given a scenario, distinguish threat data or behavior to determine the impact of an incident Part 1
  • Given a scenario, distinguish threat data or behavior to determine the impact of an incident Part 2
  • Given a scenario, distinguish threat data or behavior to determine the impact of an incident Part 3
  • Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 1
  • Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 2
  • Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 3
  • Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 4
  • Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 5
  • Explain the importance of communications during the incident response process
  • Given a scenario, analyze common symptoms to select the best course of action to support incident response Part 1
  • Given a scenario, analyze common symptoms to select the best course of action to support incident response Part 2
  • Given a scenario, analyze common symptoms to select the best course of action to support incident response Part 3
  • Given a scenario, analyze common symptoms to select the best course of action to support incident response Part 4
  • Summarize the incident recovery and post-incident response process Part 1
  • Summarize the incident recovery and post-incident response process Part 2
  • Summarize the incident recovery and post-incident response process Part 3
  • Summarize the incident recovery and post-incident response process Part 4

Module 4: Security Architecture and Tool Sets

  • Explain the relationship between frameworks, common policies, controls, and procedures Part 1
  • Explain the relationship between frameworks, common policies, controls, and procedures Part 2
  • Explain the relationship between frameworks, common policies, controls, and procedures Part 3
  • Explain the relationship between frameworks, common policies, controls, and procedures Part 4
  • Given a scenario, use data to recommend remediation of security issues related to identity and access management Part 1
  • Given a scenario, use data to recommend remediation of security issues related to identity and access management Part 2
  • Given a scenario, use data to recommend remediation of security issues related to identity and access management Part 3
  • Given a scenario, use data to recommend remediation of security issues related to identity and access management Part 4
  • Given a scenario, review security architecture and make recommendations to implement compensating controls Part 1
  • Given a scenario, review security architecture and make recommendations to implement compensating controls Part 2
  • Given a scenario, review security architecture and make recommendations to implement compensating controls Part 3
  • Given a scenario, use applications security best practices while participating in the Software Development Life Cycle (SDLC) Part 1
  • Given a scenario, use applications security best practices while participating in the Software Development Life Cycle (SDLC) Part 2
  • Overview
  • Conclusion

Training Features
  • feature
    EXPERT INSTRUCTOR-LED TRAINING

    We only use the industry’s finest instructors to develop our courses. They have a minimum of 15 years real-world experience and are subject matter experts in their fields. Unlike a live class, you can fast-forward, repeat or rewind all your lectures. This creates a personal learning experience and gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7.

  • feature
    QUIZZES & EXAM SIMULATORS

    Our custom practice exams prepare you for your exams differently and more effectively than the traditional exam preps on the market. You will have practice quizzes after each module to ensure you are confident on the topic you have completed before proceeding. This will allow you to gauge your effectiveness before moving to the next module in your course. Our Courses also include practice exams designed to replicate and mirror the environment in the testing centre. These exams are on average 100 questions to ensure you are 100% prepared before taking your certification exam.

  • feature
    VISUAL DEMONSTRATIONS & MULTIMEDIA PRESENTATIONS

    Our courseware includes instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor. Our Courseware always focuses on real world scenarios and skill-set development.

  • feature
    NAVIGATION & CONTROLS

    Our self-paced training programs are designed in a modular fashion to allow you the flexibility to work with expert level instruction anytime 24/7. All courses are arranged in defined sections with navigation controls allowing you to control the pace of your training. This allows students to learn at their own pace around their schedule.

  • feature
    SOCIAL LEARNING & NETWORKING

    We Have designed a world class Learning Management System (LMS). This system allows you to interact and collaborate with other students, form study groups, engage in discussions in our NOW@ Forums, rate and “like” different courses and stay up to date with all the latest industry knowledge through our forums, student contributions and announcement features. This LMS is unmatched in the industry and makes learning fun and enjoyable.

  • feature
    FLASH CARDS & EDUCATIONAL GAMES

    Our Courseware knows that education is not a one size fits all approach. Students learn in different ways through different tools. That is why we provide Flash Cards and Education Games throughout our courses. This will allow you to train in ways that keep you engaged and focused. Each course will have dozens of Flash Cards so you can sharpen your skill-sets throughout your training as well as educational games designed to make sure your retention level of the materials is extremely high.

  • feature
    12 MONTHS UNLIMITED ACCESS

    Each student will have 12 months unlimited access to allow you to have access to the training anytime 24/7.

EBooks and Practice Labs

Need Practical Experience?

As a bolt-on option, we offer Practice Labs as it provides users with an online lab platform to develop their practical skills in IT technologies such as CompTIA, Microsoft, Cisco and VMWare.


In addition to the hardware you require, you also gain access to high quality practical exercises covering exam topics to help you to maximize your study time and increase your results. Practice Labs are highly effective and offer a cheaper alternative to setting up your own test environment.


You will gain unlimited access to the Practice Labs for 12 months- helping you to consolidate your learning and prepare you for work.

Gain access to our E-Book's Library

This bolt-on option will provide you with a wealth of research and reference material to help you make the most of your studies. Our e-book's library will serve as a great addition to your course material and provide massive savings in comparison to the cost of buying additional study books to support your learning.


For more information about our career advice services, contact us on 0808 175 1269 to speak with one of our friendly course advisors today.

Student Reviews

We make it our absolute mission to give you the training you need and the service you deserve. Hear what our students say about us...

£395.00 £195.00

Save £200.00

Was £395.00 (Offer ends 31/05/2022)
CompTIA Cybersecurity Analyst (CySA+) Course
-
+
 

14 day money back guarantee

klarna

Spread the cost

Interest-free instalments

Read more...

Enquire now
We're trusted by
Individuals, small businesses and large corporations who continuously put their trust in My Training Academy.
We are privileged to have trained individuals who work for some of the world’s largest companies, including: