CompTIA CySA+ (CS0-001/002) Complete Course & Practice Exam
4.7 (5,324 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
21,730 students enrolled

CompTIA CySA+ (CS0-001/002) Complete Course & Practice Exam

Pass the CompTIA Cybersecurity Analyst+ (CS0-001 or CS0-002) exam on your 1st attempt, includes a full practice exam!
Bestseller
4.7 (5,324 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
21,730 students enrolled
Last updated 8/2020
English
English, French [Auto], 2 more
  • Italian [Auto]
  • Polish [Auto]
Current price: $139.99 Original price: $199.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 17.5 hours on-demand video
  • 4 articles
  • 2 downloadable resources
  • 1 Practice Test
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Take and pass the CompTIA CySA+ (CS0-001 or CS0-002) certification exam
  • Understand threat and vulnerability management concepts
  • Understand how to conduct a cyber incident response
  • Understand how to setup a strong security architecture for your networks
  • Know what different types of cybersecurity tools are on the market and which to use in different scenarios
Requirements
  • Basic understanding of network and network security
  • Understand the concepts covered by the Network+ and Security+ exams
  • This course aligns directly to the CompTIA CySA+ CS0-002 Certification Study Guide
Description

** Taught by a Best Selling IT Certification Instructor **

** UPDATED WEEKLY TO INCLUDE THE NEW CS0-002 CONTENT  **

This course provides everything you need in order to study for the CompTIA Cybersecurity Analyst+ (CySA+) (CS0-001/CS0-002) exam, including downloadable Study Guide (PDF), quizzes to check your knowledge as you progress through the videos, and a full-length practice exam to test your knowledge before test day!

Taught by an expert in information technology and cybersecurity with over 20 years of experience, this course is a fun way to learn what you need to know to pass the CompTIA Cybersecurity Analyst+ (CySA+) (CS0-001/CS0-002) exam or to better prepare yourself to serve on your organization's cyber defense team.    

The CompTIA CySA+ (Cybersecurity Analyst+) (CS0-001/CS0-002) certification is a vendor-neutral certification that validates your knowledge and ability to conduct intermediate-level cybersecurity skills. This certification fills the gap between the entry-level CompTIA Security+ exam (for those with about 1 year in the field) and the advanced-level CompTIA Advanced Security Practitioner (for those with at least 5 years in the field). The CompTIA CySA+ exam is focused on the technical, hands-on details of the cybersecurity field, including not only cyber threats, secure network architecture, and risk management, but also the ability to perform log analysis, configuration assessments, and more.    

This CySA+ (CS0-001 and CS0-002) course is designed for IT Security analysts, vulnerability analysts, threat intelligence analysts, or anyone who is trying to get a better understanding of the concepts involved in conducting cybersecurity analysis, to include threat management, vulnerability management, cyber incident response, security architecture, and the toolsets associated with these cybersecurity efforts.    

To help you practice for the CompTIA CySA+ (CS0-001 or CS0-002) exam, this course even comes with a realistic practice exam containing 85 multiple-choice questions spread across the four domains tested by the CompTIA CySA+ (CS0-001) certification exam and a second one spread across the five domains tested by the CompTIA CySA+ (CS0-002) certification exam.!       

This course provides full coverage of the four domains of the CySA+ (CS0-001) exam:   

  1. Threat Management (27%)  

  2. Vulnerability Management (26%)  

  3. Cyber Incident Response (23%)  

  4. Security Architecture and Tool Sets (24%)   


This course will also provide you with full coverage of the five domains of the CySA+ (CS0-002) exam (new content being added weekly as it is released to provide you the latest content):   

  1. Threat and Vulnerability Management (22%)

  2. Software and Systems Security (18%)

  3. Security Operations and Monitoring (25%)

  4. Incident Response (25%)

  5. Compliance and Assessment (13%)

This course stays current and up-to-date with the latest release of the CompTIA CySA+ exam (CS0-002), and also provides a 30-day money-back guarantee if you are not satisfied with the quality of this course for any reason!


This course is brought to you by Dion Training Solutions, a CompTIA Platinum Delivery Partner, and aligns directly to the OFFICIAL CompTIA CySA+ CS0-002 Certification Study Guide.


NOTE: The CS0-001 is the current version of the exam and retires in October 2020. Every week, we are adding new sections to the course to fully cover the CS0-002 version of the exam. When the CS0-001 is retired, that portion of the course will be removed to ensure the course is ALWAYS up to date with the latest version of the exam at no extra cost to you.


What Other Students Are Saying About Our Courses:

  • Jason Dion always has some of the best courses. This is the third CYSA+ course I bought from different vendors to see which one would help me more and like always this has already caught my attention and kept me focused the entire time. Other courses have too many distracting factors, unlike this one. I will always recommend Jason Dion. (Luis, 5 stars)

  • Great course, very detailed. Passed the exam on the first try. I have recommended this course to everyone I know in the security industry trying to pass the CySA+ exam. (Jose D., 5 stars)

  • I have really enjoyed and learned a lot from this course. I used Jason's course to pass the Network + on my first attempt, I am expecting that this course will enable me to pass the CySA+, too! (Leone W., 5 stars)

Who this course is for:
  • Students preparing for the CompTIA CySA+ (CS0-001 or CS0-002) Certification Exam
  • Threat analysts
  • Vulnerability analysts
  • Risk management professionals
  • Entry-level incident response professionals
Course content
Expand all 190 lectures 17:17:07
+ IMPORTANT INFORMATION ABOUT THE COURSE (READ THIS FIRST)
1 lecture 01:35

Read this article first to decide which exam you should be studying for, the CS0-001 or CS0-002

IMPORTANT INFORMATION ABOUT THE COURSE (READ THIS FIRST)
01:35
+ CS0-001: Welcome and Introduction
3 lectures 07:44

A short welcome from the instructor that lays the foundation for the rest of the course.

Preview 03:40

This lesson includes the downloadable study guide as a resource for your offline studies and note taking.

Download the Study Guide
00:07

In this lesson, students will learn the format of the exam, what domains are covered by the exam, and how the test is administered on test day.

Preview 03:57
+ CS0-001: Domain 1: Threat Management (27%)
36 lectures 02:40:59

A short welcome from the instructor that lays the foundation for the rest of the section.

Preview 01:05

This lesson covers the three tenets of information systems security: confidentiality, integrity, and availability.

Preview 07:59

This lesson introduces you to the basic concepts of risk, including vulnerabilities and threats.

Preview 05:31

This lesson provides an introduction to the risk assessment process.

Preview 03:16

In this lesson you will learn the four types of threats: adversarial, accidental, structural, and environmental.

Preview 06:27

This lesson will show you the different types of vulnerabilities in risk management.

Identify Vulnerabilities
02:22

This lesson discusses the likelihood (probability) of a risk occurring.

Likelihood, Impact, and Risk
02:47

This lesson discusses the concepts of qualitative (non-numeric) and quantitative (numerical) analyses.

Qualitative and Quantitative Assessments
05:18

This lesson covers the concepts utilized in reviewing risk management controls.

Reviewing Controls
06:54

This lesson discusses network perimeter security devices such as firewalls and IDS/IPS.

Network Perimeter Security
07:37

In this lesson we will discuss the importance of network segmentation in risk management.

Network Segmentation
02:37

In this lesson we will discuss the importance of network access control in risk management.

Network Access Control
05:49

In this lesson we will discuss defense deception methods such as honeypots and DNS sinkholes.

Defense Deception Methods
03:26

In this lesson we will discuss secure endpoint management such as antivirus and HIDS.

Secure Endpoint Management
07:00

In this lesson, we will discuss the importance of penetration testing in securing your networks.

Penetration Testing
07:29

In this lesson, we will discuss the various types of teams in security exercises.

Security Exercises and Training
02:55

In this lesson, we will discuss the concepts of reverse engineering and how it applies to malware analysis.

Reverse Engineering
06:03

In this quiz, you will receive a quick knowledge check on what you learned about preventing cyber threats.

Quiz: Defense Against Cyber Threats
3 questions

In this lesson, we will discuss reconnaissance and intelligence and how it applies to a hacker's information gathering.

Reconnaissance and Intelligence
01:06

In this lesson, we will discuss footprinting and how it applies to a hacker's information gathering.

Footprinting the Network
02:54

In this lesson, we will discuss network mapping and how it applies to a hacker's information gathering.

Network Mapping
03:53

In this lesson, we will discuss port scanning and how it applies to a hacker's information gathering.

Port Scanning
05:17

In this lesson, we will discuss additional types of port scanners (other than NMAP).

Other Port Scanners
02:00

This is a short walkthrough and demonstration of the world's most popular port scanning tool: NMAP!

Preview 06:06

In this lesson, we will discuss passive reconnaissance and how it applies to a hacker's information gathering.

Passive Reconnaissance
02:40

In this lesson, we will discuss how to use logs from network devices in passive reconnaissance.

Passive Recon - Network Devices
07:47

In this lesson, we will discuss how to use Netstat in passive reconnaissance.

Passive Recon - Netstat
04:29

In this lesson, we will discuss how to use DHCP logs and configuration files in passive reconnaissance.

DHCP Logs and Configs
03:00

In this lesson, we will discuss how to use firewall logs and configuration files in passive reconnaissance.

Firewall Logs and Configs
03:42

In this lesson, we will discuss how to use system host log files in passive reconnaissance.

System and Host Log Files
02:24

In this lesson, we will discuss how to use DNS harvesting in reconnaissance.

DNS Harvesting
03:22

In this lesson, we will discuss how to analyze domain names and IP ranges in reconnaissance.

Domain Names and IP Ranges
02:37

In this lesson, we will discuss how to conduct a DNS zone transfer in reconnaissance.

DNS Zone Transfers
03:25

In this lesson, you will learn how to use the whois and host commands in reconnaissance.

Whois and Host Commands
03:01

In this lesson, you will learn how to conduct the aggregation of the information you collected during reconnaissance.

Information Gathering and Aggregation
04:09

In this lesson, you will learn how to gather organizational intelligence and determine what your organization looks like to the outside world.

Organizational Intelligence
07:46

In this lesson, you will learn how to detect, prevent, and respond to an attackers reconnaissance efforts.

Detecting, Preventing, and Responding to Reconnaissance
06:46

In this quiz, you will receive a quick knowledge check on what you learned about reconnaissance and intelligence gathering.

Quiz: Reconnaissance and Intelligence Gathering
3 questions
+ CS0-001: Domain 2: Vulnerability Management (26%)
27 lectures 02:02:21

A short welcome to the section, providing an overview all the topics we will cover. 

Domain 2: Vulnerability Management
02:32

In this lesson, we will discuss the regulatory and legal requirements for having a Vulnerability Management Program, including the PCI DSS, FISMA, and others.

Regulatory Requirements
07:05

In this video, you will learn about how to determine your scanning scope and frequency based on corporate requirements.

Corporate Requirements
07:00

In this lesson, we will discuss the types of scanning tools you can use within your vulnerability management programs.

Scanning Tools
03:33

In this lesson, we will discuss the types of scoping tools you can use within your vulnerability management programs.

Scoping Scans
03:29

In this lesson, we will talked about the various ways to configure your scanner.

Configuring Scans
00:34

In this lesson, we will discuss how to adjust the scanning sensitivity of your scanners.

Scanning Sensitivity
03:16

In this lesson, we will cover the various scanning perspectives you can configure, such as internal and external perspectives, and why they are important.

Scanning Perspective
01:23

In this lesson, we will cover the importance of authenticated scanning and how this provides you a deeper understanding of your systems.

Authenticated Scanning
03:41

In this lesson, we will talk about the vulnerabilities associated with your vulnerability scanner itself.

Maintaining Scanners
03:20

In this lesson, we will cover how vulnerabilities are standardized into common databases like CVE.org.

Standardizing Vulnerabilities
03:21

In this lesson, we will cover to create workflows to remediation the different vulnerabilities found during your scans.

Workflow for Remediation
02:46

In this lesson, we will cover how vulnerability reporting is conducted using our scanners.

Vulnerability Reporting
04:13

In this lesson, we will cover how to prioritize vulnerabilities for remediation.

Remediation Priority
04:13

In this lesson, we will cover how to setup implementation and testing before rolling out a vulnerability patch across the network.

Implementing and Testing
05:30

In this lesson, you will receive a walkthrough of how to use Nessus to conduct a scan and analyze a vulnerability report created during that scan.

Nessus Vulnerability Scanner: A Walkthrough
09:45

In this quiz, you will receive a quick knowledge check concerning Vulnerability Management Programs.

Quiz: Vulnerability Management Program
3 questions

In this lesson, we will cover how to interpret the results from a vulnerability scan.

Interpreting Scan Results
08:18

In this lesson, we will cover how to interpret the value of a CVSS number.

Interpreting CVSS
06:13

In this lesson, we will break down how a CVSS is calculated.

Calculating the CVSS Score
04:02

In this lesson, we will discuss the CVSS Temporal Score.

CVSS Temporal Score
03:34

This lesson will teach you how to validate the results of your vulnerability scans by comparing them to logs, configuration files, and other pieces of outside data.

Validation of Results
06:21

This lesson will cover the various types of common vulnerabilities you will encounter in your scan results.

Common Vulnerabilities
02:42

This lesson will dive into the different vulnerability categories affecting servers and hosts on your network.

Server and Host Vulnerabilities
06:32

This lesson will dive into the different vulnerability categories affecting your network.

Network Vulnerabilities
06:02

This lesson will dive into the different vulnerability categories affecting virtualization on your network.

Virtualization Vulnerabilities
04:18

This lesson will dive into the different vulnerability categories affecting web applications on your network.

Web Application Vulnerabilities
05:10

This lesson will dive into the different vulnerability categories affecting IoT devices on your network.

Internet of Things (IoT) Vulnerabilities
03:28

In this quiz, you will receive a quick knowledge check concerning Vulnerability Management Programs.

Quiz: Analyzing Vulnerability Reports
3 questions
+ CS0-001: Domain 3: Cyber Incident Response (23%)
25 lectures 02:17:45

In this video, you will receive a quick overview of what will be covered in this section of the course.

Domain 3: Cyber Incident Response
01:39

In this lesson, you will learn about the different types of security incidents you may face as a cyber incident responder.

Security Incidents
03:44

In this lesson, you will learn about how an incident response team is formed and who the members are.

Incident Response Teams
08:33

In this lesson, you will learn the four phases of incident response.

Incident Response Phases
10:56

In this lesson, you will learn about the different things to include in your incident response policy and procedures.

Incident Response Policy and Procedures
04:36

In this lesson, you will learn what information to communicate during an incident response, and to who.

Communication and Info Sharing
04:25

In this lesson, you will learn how to classify different incidents.

Incident Classification
08:13

In this quiz, you will receive a quick knowledge check about creating and operating a cyber incident response program.

Quiz: Cyber Incident Response Program
3 questions

In this lesson, we will discuss how to monitor different events on your networks.

Network Event Monitoring
07:37

In this lesson, we will discuss different tools for monitoring your network.

Network Monitoring Tools
04:41

In this lesson, we will discuss how to detect different network events.

Detecting Network Events
06:12

In this lesson, you will learn about the different types of network probes and attacks.

Network Probes and Attacks
05:52

In this lesson, you will learn about the different types of attacks and symptoms for your server and hosts.

Server and Host Events
05:18

In this lesson, you will learn about the different types of attacks and symptoms for your services and applications.

Service and Application Events
05:05

In this quiz, you will receive a quick knowledge check about the symptoms of a cyber attack.

Quiz: Symptoms of Cyber Attacks
3 questions

In this lesson, you will learn the basics of digital forensics.

Digital Forensics
02:38

In this lesson, you will learn the basic tools used by digital forensic experts.

Forensic Toolkit Components
08:16

In this lesson, you will learn the basic mobile forensic tools needed.

Mobile Forensic Toolkits
02:56

In this lesson, you will learn the different types of forensic software available.

Forensic Software
06:50

In this lesson, we will discuss the different type of training and certifications for digital forensics.

Training and Certification
02:22

In this lesson, we will discuss the process to conduct forensic investigations.

Forensic Investigation Process
05:01

In this lesson, we will discuss how you conduct  disk imaging in forensics.

Disk Imaging
04:50

In this hands-on demonstration, you will learn how to create a forensic disk image using standard Linux commands.

Disk Imaging Using dd
02:58

In this hands-on demonstration, you will learn how to use the Windows tool, FTK Imager, to create a forensic disk image.

Disk Imaging Using FTK Imager
06:32

In this quiz, you will receive a quick knowledge check about digital forensics

Quiz: Digital Forensics
3 questions

In this lesson, we will discuss the process of containing incidents on your network.

Incident Containment
06:55

In this lesson, we will discuss how to eradicate and recover from network attacks.

Eradication and Recovery
06:36

In this lesson, we will discuss the final actions to conduct after an incident response.

Finishing the Response
05:00

In this quiz, you will receive a quick knowledge check about conducting incident containment and eradication.

Quiz: Incident Containment and Eradication
3 questions
+ CS0-001: Domain 4: Security Architecture and Toolsets (24%)
32 lectures 02:52:35

In this lesson, we will introduce what will be covered in Domain 4 of the CSA+ exam.

Domain 4: Security Architecture and Tool Sets
00:39

In this lesson, you will learn about policies, standards, guidelines, and procedures.

Policy Documents
07:05

In this lesson, you will learn about TOGAF, ITIL, COBIT, NIST Cybersecurity, and other policy frameworks.

Standard Frameworks
07:49

In this lesson, we will discuss the three types of policy-based controls.

Policy-based Controls
03:32

In this lesson, you will learn the differences between audits and assessments.

Audits and Assessments
02:10

In this lesson, you will learn a brief overview of the different laws and regulations covered by the exam.

Laws and Regulations
05:04

In this quiz, you will receive a quick knowledge check about policies, standards, procedures, and frameworks.

Quiz: Policies, Standards, Procedures, and Frameworks
2 questions

In this lesson, you will learn the types of controls and layered defenses that can be applied to protect your networks.

Defense in Depth
05:19

In this lesson, you will learn the types of controls that can be applied to protect your networks.

Types of Controls
04:42

In this lesson, you will learn the layered defenses that can be applied to protect your networks.

Layered Network Defense
04:36

In this lesson, you will learn the layered defenses that can be applied to protect your hosts.

Layered Host Security
03:07

In this lesson, you will learn about data analytics and how they are used in designing secure architectures.

Data Analytics
04:05

In this lesson, you will learn what types of issues you should consider in providing security from your personnel.

Personnel Security
05:59

In this lesson, you will learn what types of issues you should consider in providing security from your outsource provider.

Outsourcing Concerns
03:03

In this lesson, you will learn what types of issues you should discuss with your employees during user awareness training.

User Awareness Training
03:50

In this lesson, you will learn how to best analyze your security architecture.

Analyzing Secure Architectures
08:09

In this quiz, you will receive a quick knowledge check about defense in depth architectures.

Quiz: Defense in Depth
3 questions

In this lesson, you will learn what identity is in terms of cybersecurity and the kinds of attributes associated with it.

What Is Identity?
04:56

In this lesson, you will learn about identity systems, including RADIUS, TACACS+, and Kerberos.

Identity Systems
11:32

In this lesson, you will learn the different threats to your identity systems.

Threats to Identity Systems
03:13

In the lesson, you will learn the various ways attackers break into our identity systems.

Attacking AAA Protocols and Systems
09:05

In this video, you will learn how attackers target the account lifecycle.

Targeting Account Lifecycle
03:31

In this lesson, you will learn about some different kinds of exploits used against identity systems.

Identity Exploits
03:01

In this lesson, you will learn how attackers attempt to steal credentials from your users and systems.

Credential Theft
03:22

In this lesson, you will be provided a summary of the different methods to secure your authentication and authorization in your systems.

Securing Authentication and Authorization System
06:05

In this lesson, we will discuss the use of Identity as a Service (IDaaS), its challenges, and its benefits.

Identity as a Service (IDaaS)
02:17

In this lesson, you will learn some of the key things to do in order to identify when identities are being attacked.

Detecting Identity Attacks
01:37

In this lesson, you will learn about the different types of Federated Identity Systems, including OAuth, OpenID Connect, Facebook Connect, Active Directory Federated Services, and more.

Federated Identity Systems
10:35

In this quiz, you will receive a quick knowledge check about identity and access management architectures.

Quiz: Identity and Access Management
3 questions

In this lesson, we will discuss the 8 portions of the basic Software Development Life Cycle (SDLC).

Software Development Life Cycle (SDLC)
08:16

In this lesson, we will discuss the different software development models in both formal and agile programming.

Software Development Models
10:43

In this lesson, we will discuss the best practices to use when coding software in a secure manner.

Coding for Security
07:12

In this lesson, we will dig a little deeper into how to test the security of your applications.

Testing Application Security
05:34

In this lesson, we will discuss how to find security flaws by using code reviews.

Finding Security Flaws
06:41

In this lesson, we will discuss the various types of Web Application Vulnerability Scanners, like Burp Suite, Accunetix, HP's Web Inspect, and more.

Web Application Vulnerability Scanners
05:46

In this quiz, you will receive a quick knowledge check about software development and the SDLC.

Quiz: Software Development and SDLC
3 questions
+ CS0-001: Conclusion
3 lectures 22:36

In this video, we will provide a quick summary of the course and where to go from here in your CSA+ journey.

Conclusion
01:58

In this video, you will receive a special thank you message from Jason with tips on how to get the best price for ANY of our other courses on Udemy!

BONUS: Where to go from here?
04:05
Simulations and Performance-Based Questions (PBQs)
16:33

This practice exam contains 80 multiple-choice questions ranging in difficulty from easy to hard. The questions on this exam are very similar to the type of questions you will receive when you take the actual CompTIA CySA+ certification exam at your testing center.

If you can score 90% or higher on this practice exam, you should be able to take and pass the CompTIA CySA+ Certification Exam on your first attempt!

CompTIA CySA+ Practice Certification Exam
80 questions
+ CompTIA CySA+ (CS0-002) START HERE
2 lectures 11:40

A short welcome to the course and a brief background of the instructor

Preview 11:28

Download your study guide and exam objectives in this lesson

Download the Study Guide
00:12
+ Identify Security Control Types
5 lectures 32:30

A brief introduction to this section of the course

Preview 01:06

Describes the roles and responsibilities associated with cybersecurity (OBJ 5.3)

Preview 06:44

Describes the role of the Security Operations Center and how it integrates into the overall organization

Security Operations Center (SOC) (OBJ 5.3)
05:00

Describes the NIST SP 800-53 and the three control categories that are tested on the CySA+ exam

Security Control Categories (OBJ 5.3)
14:41

Describes the methods of selecting controls to mitigate vulnerabilities and enforce the confidentiality, integrity, and availability of a system

Selecting Security Controls (OBJ 5.3)
04:59

This quiz will test your knowledge of the topics covered in this section of the course.

Quiz: Identify Security Control Types
3 questions
+ Threat Intelligence
6 lectures 34:38

A brief introduction to this section of the course

Threat Intelligence Sharing (Introduction)
01:09

Provides an overview of Security Intelligence and Threat Intelligence

Security and Threat Intelligence (OBJ 1.1)
05:12

Describes the five steps of the intelligence cycle

Intelligence Cycle (OBJ 1.1)
09:44

Describes the sources of intelligence and the factors that identify the value of threat intelligence: timeliness, relevancy, accuracy, and confidence level

Intelligence Sources (OBJ 1.1)
09:15

Describes the public/private partnerships that disseminate sector-specific threat intelligence

Information Sharing and Analysis Centers (ISACS) (OBJ 1.1)
04:25

Describes the dissemination of threat information to support risk management and security engineering, incident response, vulnerability management, and detection and monitoring functions.

Threat Intelligence Sharing (OBJ 1.2)
04:53

This quiz will test your knowledge of the topics covered in this section of the course.

Quiz: Threat Intelligence
3 questions