HOME >> IT CERTIFICATIONS >> , >> CompTIA Cybersecurity Analyst (CySA+)

£140.00
Duration: 17 Hours 55 Minutes
67 Course Videos
CompTIA Cybersecurity Analyst (CySA+)

Cybersecurity certification is one of the hottest IT-related certifications. The CompTIA Cybersecurity Analyst, also known as CompTIA CySA+, is a CompTIA certification. CySA+ is focused on the knowledge and skills required to perform the following:

  • Configure and use threat-detection tools
  • Perform data analysis
  • Interpreting the results

Securing an organisation’s applications and systems is the primary goal of a Cybersecurity Analyst.

The CompTIA CySA+ is a vendor-neutral certification. A student normally has three to four years of experience in a related field as well as Security+ or equivalent knowledge. In this regard, the CompTIA CySA+ lies between the CompTIA Security+ and CompTIA Advanced Security Practitioner (CASP) exams. It is an excellent go-between to tackle before diving into the CASP, but when the CompTIA Security+ isn’t enough.

Cybersecurity certification is an ongoing requirement for government agencies. The CompTIA CySA+ was developed with a focus on meeting government requirements to certify IT, workers, or contractors. With a Cybersecurity certification, you display an understanding of security best practices and protocols beyond that which is provided by the Security+ certification. You will prove a level of expertise beyond that of basic security practices that are followed when using a computer. This allows any employee to prove a better understanding of enterprise security practices, and the necessary tools needed to protect a company network. The modules of this course align with the official objectives of the certification. The course expands past the scope of the certification. It also provides real-life examples and lead-ins to direct further study. This will give students an easier understanding of the material for the certification as well as a basic understanding to apply to real-life applications.

We encourage you to visit the CompTIA website for full details on the CySA+ certification and exam code CS0-001.

Course Videos

This course contains the following modules and videos. Click the down arrow to view video details.


  • Introduction
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 1
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 2
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 3
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 4
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 5
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 6
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 7
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 8
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 9
  • Analyze the results of a network reconnaissance Part 1
  • Analyze the results of a network reconnaissance Part 2
  • Analyze the results of a network reconnaissance Part 3
  • Analyze the results of a network reconnaissance Part 4
  • Analyze the results of a network reconnaissance Part 5
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 1
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 2
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 3
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 4
  • Explain the purpose of practices used to secure a corporate environment Part 1
  • Explain the purpose of practices used to secure a corporate environment Part 2
  • Explain the purpose of practices used to secure a corporate environment Part 3
  • Explain the purpose of practices used to secure a corporate environment Part 4
  • Implement an information security vulnerability management process Part 1
  • Implement an information security vulnerability management process Part 2
  • Implement an information security vulnerability management process Part 3
  • Implement an information security vulnerability management process Part 4
  • Implement an information security vulnerability management process Part 5
  • Implement an information security vulnerability management process Part 6
  • Implement an information security vulnerability management process Part 7
  • Analyze the output resulting from a vulnerability scan Part 1
  • Analyze the output resulting from a vulnerability scan Part 2
  • Compare and contrast common vulnerabilities found in the following targets within an organization Part 1
  • Compare and contrast common vulnerabilities found in the following targets within an organization Part 2
  • Compare and contrast common vulnerabilities found in the following targets within an organization Part 3
  • Distinguish threat data or behavior to determine the impact of an incident Part 1
  • Distinguish threat data or behavior to determine the impact of an incident Part 2
  • Distinguish threat data or behavior to determine the impact of an incident Part 3
  • Prepare a toolkit and use appropriate forensic tools during an investigation Part 1
  • Prepare a toolkit and use appropriate forensic tools during an investigation Part 2
  • Prepare a toolkit and use appropriate forensic tools during an investigation Part 3
  • Prepare a toolkit and use appropriate forensic tools during an investigation Part 4
  • Prepare a toolkit and use appropriate forensic tools during an investigation Part 5
  • Explain the importance of communications during the incident response process
  • Analyze common symptoms to select the best course of action to support incident response Part 1
  • Analyze common symptoms to select the best course of action to support incident response Part 2
  • Analyze common symptoms to select the best course of action to support incident response Part 3
  • Analyze common symptoms to select the best course of action to support incident response Part 4
  • Summarize the incident recovery and post-incident response process Part 1
  • Summarize the incident recovery and post-incident response process Part 2
  • Summarize the incident recovery and post-incident response process Part 3
  • Summarize the incident recovery and post-incident response process Part 4
  • Explain the relationship between frameworks, common policies, controls, and procedures Part 1
  • Explain the relationship between frameworks, common policies, controls, and procedures Part 2
  • Explain the relationship between frameworks, common policies, controls, and procedures Part 3
  • Explain the relationship between frameworks, common policies, controls, and procedures Part 4
  • Use data to recommend remediation of security issues related to identity and access management Part 1
  • Use data to recommend remediation of security issues related to identity and access management Part 2
  • Use data to recommend remediation of security issues related to identity and access management Part 3
  • Use data to recommend remediation of security issues related to identity and access management Part 4
  • Review security architecture and make recommendations to implement compensating controls Part 1
  • Review security architecture and make recommendations to implement compensating controls Part 2
  • Review security architecture and make recommendations to implement compensating controls Part 3
  • Use applications security best practices while participating in the Software Development Life Cycle (SDLC) Part 1
  • Use applications security best practices while participating in the Software Development Life Cycle (SDLC) Part 2
  • Overview
  • Conclusion
Our Learning System Includes
Instructor Led Lectures
All of our IT Courses recreate a real time class experience with a highly qualified and experienced instructor delivering the course’s theories and concepts on screen. All of our lectures are pre-recorded and available to the user 24/7. They can easily be paused, repeated, rewound and fast-forwarded.
Visual Presentations
We understand that all students are different when it comes to learning, therefore different types of delivery mediums are needed in order to achieve success for students. Taking that into account, we deliver our content in a variety of different ways to ensure that students stay engaged and productive throughout their courses.
Mobile Optimisation & Progress Tracking
Our courses are optimised for all mobile devices allowing users to learn on the go whenever they have spare time and wish to do so. Users can access their courses from anywhere and their progress is completely tracked and recorded delivering peace of mind to each and every user.
Practice Quizzes and Exams
Our custom practice exams prepare students for their exams differently and more effectively than the traditional exam preps on the market. Students will have practice quizzes after each module to ensure that they are confident on the topic they are learning.
World Class Learning Management System
We provide the next generation Learning Management System (LMS) to all of our students. This is an experience that combines the feature set of traditional LMS with advanced functionality designed to make learning management easy and online learning engaging from the student’s perspective.
Copyright © 2024 London College of Online Learning Limited. Registered in the UK: 12747658. | Sitemap
Open chat
1
We are available 24/7
Hello there 👋

Can we help you today?