CompTIA Cybersecurity Analyst


Request for price


Length: 5 day (40 hours)

 

Course objectives

After completing this course, students will be able to:

  • Detect and analyze indicators of malicious activity 
  • Understand threat hunting and threat intelligence concepts 
  • Use appropriate tools and methods to manage, prioritize and respond to attacks and vulnerabilities 
  • Perform incident response processes 
  • Understand reporting and communication concepts related to vulnerability management and incident response activities

Course outlines

  • UNDERSTANDING VULNERABILITY RESPONSE, HANDLING, AND MANAGEMENT
  • EXPLORING THREAT INTELLIGENCE AND THREAT HUNTING CONCEPTS
  • EXPLAINING IMPORTANT SYSTEM AND NETWORK ARCHITECTURE CONCEPTS
  • UNDERSTANDING PROCESS IMPROVEMENT IN SECURITY OPERATIONS
  • IMPLEMENTING VULNERABILITY SCANNING METHODS
  • PERFORMING VULNERABILITY ANALYSIS
  • COMMUNICATING VULNERABILITY INFORMATION
  • EXPLAINING INCIDENT RESPONSE ACTIVITIES
  • DEMONSTRATING INCIDENT RESPONSE COMMUNICATION
  • APPLYING TOOLS TO IDENTIFY MALICIOUS ACTIVITY
  • ANALYZING POTENTIALLY MALICIOUS ACTIVITY
  • UNDERSTANDING APPLICATION VULNERABILITY ASSESSMENT
  • EXPLORING SCRIPTING TOOLS AND ANALYSIS CONCEPTS
  • UNDERSTANDING APPLICATION SECURITY AND ATTACK MITIGATION BEST PRACTICES