CompTIA Cybersecurity Analyst (CSA+)

Prepare for the CSA+ Certification

The CompTIA Cybersecurity Analyst, or CSA+, is a CompTIA certification focusing on the knowledge and skills required to configure and use threat-detection tools, perform data analysis, and interpreting the results with the end goal of securing an organization’s applications and systems. With the ongoing requirement for government agencies to receive certifications, the CSA+ was developed with a focus on meeting government requirements to certify IT workers or contractors.

People sitting in front of computers in a dark room.

Job Outlook for Information Security Analysts

According the Bureau of Labor Statistics the employment of information security analysts is expected to grow 31% during the next few years, which equals 40,900 new jobs.

The BLS also states that the average salary for these analysts is just under $104,000 per year with top earners making more than $163,000.

Course Objectives

Configure and use threat detection tools

Perform data analysis

Interpret the results to identify vulnerabilities, threats and risks to an organization

Prerequisites and Requirements

This course is designed for professionals with three to four years of experience in a related field as well as a Security+ or equivalent knowledge.

This course can be taken on either a PC or Mac.

Instructor

Brandon Smith

  • Module 1: Threat Management

    • 1.1 Introduction
    • 1.2 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 1
    • 1.3 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 2
    • 1.4 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 3
    • 1.5 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 4
    • 1.6 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 5
    • 1.7 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 6
    • 1.8 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 7
    • 1.9 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 8
    • 1.10 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 9
    • 1.11 Given a scenario, analyze the results of a network reconnaissance - Part 1
    • 1.12 Given a scenario, analyze the results of a network reconnaissance - Part 2
    • 1.13 Given a scenario, analyze the results of a network reconnaissance - Part 3
    • 1.14 Given a scenario, analyze the results of a network reconnaissance - Part 4
    • 1.15 Given a scenario, analyze the results of a network reconnaissance - Part 5
    • 1.16 Given a network-based threat, implement or recommend the appropriate response and countermeasure - Part 1
    • 1.17 Given a network-based threat, implement or recommend the appropriate response and countermeasure - Part 2
    • 1.18 Given a network-based threat, implement or recommend the appropriate response and countermeasure - Part 3
    • 1.19 Given a network-based threat, implement or recommend the appropriate response and countermeasure - Part 4
    • 1.20 Explain the purpose of practices used to secure a corporate environment - Part 1