TOTAL: CompTIA CySA+ Cybersecurity Analyst (CS0-001).
4.6 (2,473 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
13,707 students enrolled

TOTAL: CompTIA CySA+ Cybersecurity Analyst (CS0-001).

Ethical Hacking and CompTIA Cyber Security Analyst CySA+ (CS0-001) Exam Prep.
4.6 (2,473 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
13,707 students enrolled
Last updated 2/2020
English
English [Auto], Indonesian [Auto], 4 more
  • Italian [Auto]
  • Polish [Auto]
  • Romanian [Auto]
  • Thai [Auto]
Current price: $135.99 Original price: $194.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 7 hours on-demand video
  • 17 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • This is a complete and comprehensive CompTIA CySA+ Certification (CS0-001) course. It is designed to prepare the student to be able to take and pass the Cybersecurity Analyst exam and become CompTIA CySA+ Certified.
  • Learn skills to break into a career in information security analysis, which ranks 7th in the 100 best tech jobs for 2017, and is predicted to be the fastest growing overall job category between 2012-2022. Cybersecurity Analysts earn a median pay of $90,120.
Requirements
  • Basic familiarity with PCs and networks.
  • There are no specific prerequisites as the course covers all the topics in detail.
  • It is a good idea to have an understanding of CompTIA A+, Network+, and Security+ or to be certified in these topics. You can learn more about these certifications from our Mike Meyers – Total Seminars CompTIA A+, Network+, and Security+ Certification courses on Udemy.
Description

Welcome to TOTAL: CompTIA CySA+ Cybersecurity Analyst (CS0-001) course. from Total Seminars and Brent Chapman, GCIH, GCFA, CISSP, CySA+.

Brent Chapman is an information security engineer with over 15 years' experience in information technology and cyber security. He spent over 10 years in active duty in the United States Army, where he served as an intelligence analyst, communications officer, network engineer, and cyber operations officer. He has also been a researcher and instructor at West Point, where he graduated, as well as a member of the Security of Defense's staff.

This course covers everything you need to know to respond to cybersecurity threats and attacks. You’ll learn how to:

  • Apply environmental reconnaissance techniques like OS fingerprinting, e-mail harvesting, and social media profiling using tools such as Nmap, Netstat, and syslog

  • Analyze the results of network reconnaissance, and recommend or implement countermeasures

  • Secure a corporate environment by scanning for vulnerabilities

  • Respond to cyber incidents with a forensics toolkit, maintain the chain of custody, and analyze incident severity

If you're looking to get certified, this course will also help prepare you for the CompTIA CySA+ Certification (CS0-001) exam. The first goal of the course is to make you an outstanding cybersecurity analyst and in the process, make sure you are ready to pass the CompTIA exam.

The course covers all the CompTIA CySA+ (CS0-001) exam domains:

1.0 Threat Management                                                             27%

2.0 Vulnerability Management                                                  26%

3.0 Cyber Incident Response                                                     23%

4.0 Security Architecture and Tool Sets                                   24%

 

Topics include:        

Threat and vulnerability management

Conducting an analyzing reconnaissance

Responding to network-based threats

Securing a corporate network

Cyber incident response

Determining the impact of incidents

Preparing the incident response toolkit

 

CySA+ provides substantial earnings potential

A career in information security analysis ranked seventh on U.S. News and World Report’s list of the 100 best technology jobs for 2017. According to the Bureau of Labor Statistics, the median pay for an information security analyst is $90,120 per year.


CySA+ certified skills are in-demand

Properly trained IT security staff who can analyze, monitor and protect cybersecurity resources are in high demand.  The U.S. Bureau of Labor Statistics (BLS) predicts that information security analysts will be the fastest growing overall job category, with 37 percent overall growth between 2012 and 2022.

Follow the CompTIA Cybersecurity Certification Pathway

IT Fundamentals > A+ > Network+ > Security+ > CySA+ > PenTest+ > CASP


NOTE: CompTIA originally released this certification as CSA+. They had copyright issues and had to change the acronym to CySA+. It is the same certification and the same course.


The course is brought to you by Total Seminars with Brent Chapman, Cybersecurity Expert:

Brent Chapman is the co-author of McGraw-Hill's CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide. He is an information security engineer with over 15 years of experience in information technology and cyber security. 

As a researcher at the Army Cyber Institute (ACI), Brent explored emerging information security and cyber warfare issues with a focus on field-expedient solutions and countermeasures. He held a number of unique assignments to include researcher and instructor at West Point. He was formerly assigned as project manager at the Secretary of Defense's Defense Innovation Unit Experiment (DIUx) in Silicon Valley.

Brent has industry certifications in incident handling, computer forensics, and network security (GCIH, GCFA, CISSP, CySA+). He is a professional member of the Association of Computing Machinery, FCC Amateur Radio Technician Class license holder, and contributor to several technical and maker-themed publications. 

He holds a BS from West Point and an MS from Carnegie Mellon University.

Who this course is for:
  • This course is intended for anyone who is interested in a Cybersecurity position or looking to improve their security skills. The course will prepare you to pass the CompTIA CySA+ Certification Exam. It goes beyond certification and gives you the skills you need to be a better cybersecurity analyst.
Course content
Expand all 51 lectures 07:01:20
+ Introduction
1 lecture 01:50

In this series, Brent will teach you everything you need to know about becoming a CompTIA CySA+ certified Cybersecurity Analyst. This introduction includes an additional resource link to the CompTIA CySA+ exam objectives. 

At the beginning of each section, you'll find a downloadable PDF of the notes for each chapter. 

Preview 01:50
+ Conducting Reconnaissance
2 lectures 16:55

Learn how attackers are positioning and collecting information for targeting attacks. 

Preview 09:20

Use scanning tools to identify network and system vulnerabilities. 

Preview 07:35
Chapter 01 Conducting Reconnaissance Quiz
4 questions
+ Analyzing Reconnaissance Results
3 lectures 22:59

Explore recon methods and tools to look at single events and complete system-wide scans.

Preview 13:06

Understand types and proper usage of analysis methods. 

Recon Results: Part 2
04:52

Learn the various types of information that can be found in your log files. 

Data Output
05:01
Chapter 02 Analyzing Reconnaissance Results Quiz
4 questions
+ Responding to Network-Based Threats
2 lectures 17:35

Understand the usage of physical and logical segmentation as a defense strategy. 

Protecting Your Territory
04:53

Learn network-hardening techniques. 

Hardening Strategies
12:42
Chapter 03 Responding to Network-Based Threats Quiz
4 questions
+ Securing a Corporate Environment
4 lectures 20:01

Understand pen testing methods and procedures.    

Pen Testing
05:42

Learn about the teaming process and how to keep a security program in a “ready state.”    

Training
04:03

Learn about detecting counterfeit hardware and fraudulent software files.    

Reverse Engineering
07:42

Learn about risk evaluation methods and logic for prioritization of threat responses.    

Risk Evaluation
02:34
Chapter 04 Securing a Corporate Environment Quiz
4 questions
+ Vulnerability Management
4 lectures 27:50

Understand the importance of correct policies & procedures used to protect assets.    

Requirements Identification
04:50

Learn about setting up vulnerability scanning criteria, reviewing resources and scoping.

Scanning
05:49

Create and configure a Nessus scan.    

Configuring and Executing Scans
07:47

See how remediation can be addressed in various environments.    

Reporting and Remediating
09:24
Chapter 05 Vulnerability Management Quiz
4 questions
+ Analyzing Vulnerabilities Scan Results
2 lectures 15:48

Learn about great vulnerability resources to use in security programs.    

Common Vulnerabilities: Part 1
07:58

Get insights on how to manage challenges with vulnerabilities.    

Common Vulnerabilities: Part 2
07:50
Chapter 06 Analyzing Vulnerabilities Scan Results Quiz
4 questions
+ Incident Response
2 lectures 14:23

Understand the incident response process, phases, elements, and plan.

Incident Response Process
06:40

Understand the importance of creating the IR communication policies, responsibilities, and roles.

IR Roles and Responsibilities
07:43
Chapter 07 Incident Response Quiz
4 questions
+ Preparation Phase
2 lectures 17:20

Learn to spot indicators of compromise and determine your IR response and scope of impact.

IR Active Preparation
09:45

Understand the profile of attackers and learn about their attributes.

Threat Trends
07:35
Chapter 08 Defensive Strategies Quiz
5 questions
+ Forensic Tools
5 lectures 35:50

Learn the implications, methods, and processes of collecting digital forensic data.

Digital Forensics
09:37

Learn the ins and outs of keeping a forensic investigation on track.

Seizure and Acquisitions
04:56

Learn to use hash methods to maintain the integrity of a file.

Forensics Acquisition Tools
08:57

Use Windows-based tools to manually collect evidence for forensic investigations.

Forensics Analysis: Part 1
04:29

Use Linux-based tools to manually collect evidence for forensic investigations.

Forensics Analysis: Part 2
07:51
Chapter 09 Forensic Tools Quiz
5 questions