CompTIA® CySA+ (CS0-002) Complete Course

CompTIA® CySA+ (CS0-002) Complete Course

Description

You will learn the technical details of the cybersecurity field, including cyber threats, secure network architecture, risk management, the ability to perform log analysis, configuration assessments, and more.  

The CompTIA CySA+ (Cybersecurity Analyst+) (CS0-002) certification is a vendor-neutral certification that validates your knowledge and ability to conduct intermediate-level cybersecurity skills.

This certification fills the gap between the entry-level CompTIA Security+ exam (for those with about 1 year in the field) and the advanced-level CompTIA Advanced Security Practitioner (for those with at least 5 years in the field).

This CompTIA CySA+ (CS0-002) course is designed for IT Security analysts, vulnerability analysts, threat intelligence analysts, or anyone who is trying to get a better understanding of the concepts involved in conducting cybersecurity analysis, to include threat management, vulnerability management, cyber incident response, security architecture, and the toolsets associated with these cybersecurity efforts.    

By the end of the course, you will be comfortable with the technical tasks required of a cyber security analyst and be ready to take on the role of a cybersecurity analyst in your organization!

This course is designed to help prepare you for the CompTIA CySA+ (CS0-002) certification exam and covers all five domains:

  • Threat and Vulnerability Management (22%)
  • Software and Systems Security (18%)
  • Security Operations and Monitoring (25%)
  • Incident Response (25%)
  • Compliance and Assessment (13%)

Who this course is for?

  • Students preparing for the CompTIA CySA+ (CS0-002) certification exam
  • Threat analysts
  • Vulnerability analysts
  • Risk management professionals
  • Entry-level incident response professionals

Course Learning Objectives

  • Take and pass the CompTIA CySA+ (CS0-002) certification exam
  • Understand how to conduct a cyber incident response
  • Know what different types of cybersecurity tools are on the market and which to use in different scenarios
  • Understand threat and vulnerability management concepts
  • Understand how to setup a strong security architecture for your networks
  • Know what different types of cybersecurity tools are on the market and which to use in different scenarios

Course prerequisites

  • Basic understanding of network and network security
  • Understand the concepts covered by the Network+ and Security+ exams

Course Curriculum

No.

Title

Type

Status

1.

Welcome to the Course

PLAY

2.

Download the Study Guide

PDF

3.

100% Pass Guarantee

VIDEO

4.

Intro to LAB

VIDEO

5.

Discovering the Lab Environment

LAB

No.

Title

Type

Status

1.

Identify Security Control Types (Introduction)

VIDEO

2.

Cybersecurity Roles and Responsibilities

VIDEO

3.

Security Operations Center (SOC)

VIDEO

4.

Security Control Categories

VIDEO

5.

Selecting Security Controls

VIDEO

6.

Quiz: Identify Security Control Types

QUIZ

No.

Title

Type

Status

1.

Threat Intelligence Sharing (Introduction)

VIDEO

2.

Security and Threat Intelligence

VIDEO

3.

Intelligence Cycle

VIDEO

4.

Intelligence Sources

VIDEO

5.

Information Sharing and Analysis Centers (ISACS)

VIDEO

6.

Threat Intelligence Sharing

VIDEO

7.

Quiz: Threat Intelligence

QUIZ

No.

Title

Type

Status

1.

Classifying Threats (Introduction)

VIDEO

2.

Threat Classification

VIDEO

3.

Threat Actors

VIDEO

4.

Malware

VIDEO

5.

Threat Research

VIDEO

6.

Attack Frameworks

VIDEO

7.

Indicator Management

VIDEO

8.

Quiz: Classifying Threat

QUIZ

No.

Title

Type

Status

1.

Threat Hunting (Introduction)

VIDEO

2.

Threat Modeling

VIDEO

3.

Threat Hunting

VIDEO

4.

Open-source Intelligence

VIDEO

5.

Google Hacking

VIDEO

6.

Profiling Techniques

VIDEO

7.

Harvesting Techniques

VIDEO

8.

Quiz: Threat Hunting

QUIZ

No.

Title

Type

Status

1.

Network Forensics (Introduction)

VIDEO

2.

Network Forensic Tools

VIDEO

3.

tcpdump

VIDEO

4.

Wireshark

VIDEO

5.

Flow Analysis

VIDEO

6.

IP and DNS Analysis

VIDEO

7.

URL Analysis

VIDEO

8.

Conduct Packet Analysis

VIDEO

9.

Labs: Analyzing Output from Network Security Monitoring Tools

LAB

10.

Quiz: Network Forensics

QUIZ

No.

Title

Type

Status

1.

Appliance Monitoring (Introduction)

VIDEO

2.

Firewall Logs

VIDEO

3.

Firewall Configurations

VIDEO

4.

Proxy Logs

VIDEO

5.

Web Application Firewall Logs

VIDEO

6.

IDS and IPS Configuration

VIDEO

7.

IDS and IPS Logs

VIDEO

8.

Port Security Configuration

VIDEO

9.

NAC Configuration

VIDEO

10.

Analysis of Security Appliances

VIDEO

11.

Labs: Analyzing Output from Security Applicance Logs

LAB

12.

Quiz: Application Monitoring

QUIZ

No.

Title

Type

Status

1.

Endpoint Monitoring (Introduction)

VIDEO

2.

Endpoint Analysis

VIDEO

3.

Sandboxing

VIDEO

4.

Reverse Engineering

VIDEO

5.

Malware Exploitation

VIDEO

6.

Behavior Analysis

VIDEO

7.

Malware Analysis (demo)

VIDEO

8.

EDR Configuration

VIDEO

9.

Blacklisting and Whitelisting

VIDEO

10.

Labs: Analyzing Output from Endpoint Security Monitoring Tools

LAB

11.

Quiz: Endpoint Monitoring

QUIZ

No.

Title

Type

Status

1.

Email Monitoring (Introduction)

VIDEO

2.

Email IOCs

VIDEO

3.

Email Header Analysis

VIDEO

4.

Email Content Analysis

VIDEO

5.

Email Server Security

VIDEO

6.

SMTP Log Analysis

VIDEO

7.

Email Message Security

VIDEO

8.

Analyzing Email Headers

VIDEO

9.

Labs: Analyzing Email Headers

LAB

10.

Quiz: Email Monitoring

QUIZ

No.

Title

Type

Status

1.

Configuring Your SIEM (Introduction)

VIDEO

2.

SIEM

VIDEO

3.

Security Data Collection

VIDEO

4.

Data Normalization

VIDEO

5.

Event Log

VIDEO

6.

Syslog

VIDEO

7.

Configuring a SIEM Agent

VIDEO

8.

Labs: Configuring SIEM Agents and Collectors

LAB

9.

Quiz: Configuring Your SIEM

QUIZ

No.

Title

Type

Status

1.

Analyzing Your SIEM (Introduction)

VIDEO

2.

SIEM Dashboards

VIDEO

3.

Analysis and Detection

VIDEO

4.

Trend Analysis

VIDEO

5.

Rule and Query Writing

VIDEO

6.

Searching and Piping Commands

VIDEO

7.

Scripting Tools

VIDEO

8.

Analyzing, Filtering, and Searching Logs

VIDEO

9.

Labs: Analyzing, Filtering, and Searching Event Log and syslog Output

LAB

10.

Quiz: Analyzing Your SIEM

QUIZ

No.

Title

Type

Status

1.

Digital Forensics (Introduction)

VIDEO

2.

Digital Forensic Analysts

VIDEO

3.

Forensics Procedures

VIDEO

4.

Work Product Retention

VIDEO

5.

Data Acquisition

VIDEO

6.

Forensics Tools

VIDEO

7.

Memory Acquisition

VIDEO

8.

Disk Image Acquisition

VIDEO

9.

Hashing

VIDEO

10.

Timeline Generation

VIDEO

11.

Carving

VIDEO

12.

Chain of Custody

VIDEO

13.

Collecting and Validating Evidence

VIDEO

14.

Labs: Collecting and Validating Digital Evidence

LAB

15.

Quiz: Digital Forensics

QUIZ

No.

Title

Type

Status

1.

Analyzing Network IOCs (Introduction)

VIDEO

2.

Analyzing Network IOCs

VIDEO

3.

Traffic Spikes

VIDEO

4.

Beaconing

VIDEO

5.

Irregular P2P Communications

VIDEO

6.

Rogue Devices

VIDEO

7.

Scans and Sweeps

VIDEO

8.

Nonstandard Port Usage

VIDEO

9.

TCP Ports

VIDEO

10.

UDP Ports

VIDEO

11.

Data Exfiltration

VIDEO

12.

Covert Channels

VIDEO

13.

Analysis of Network IOCs

VIDEO

14.

Labs: Analyzing Network-related IoCs

LAB

15.

Quiz: Analyzing Network IOCs

QUIZ

No.

Title

Type

Status

1.

Analyzing Host-related IOCs (Introduction)

VIDEO

2.

Host-related IOCs

VIDEO

3.

Malicious Processes

VIDEO

4.

Memory Forensics

VIDEO

5.

Consumption

VIDEO

6.

Disk and File System

VIDEO

7.

Unauthorized Privilege

VIDEO

8.

Unauthorized Software

VIDEO

9.

Unauthorized Change/Hardware

VIDEO

10.

Persistence

VIDEO

11.

Labs: Analyzing Host and Application IoCs

LAB

12.

Quiz: Analyzing Host-related IOCs

QUIZ

No.

Title

Type

Status

1.

Analyzing Application-related IOCs

VIDEO

2.

Application-related IOCs

VIDEO

3.

Anomalous Activity

VIDEO

4.

Service Interruptions

VIDEO

5.

Application Logs

VIDEO

6.

New Accounts

VIDEO

7.

Virtualization Forensics

VIDEO

8.

Mobile Forensics

VIDEO

9.

Quiz: Analyzing Application-related IOCs

QUIZ

No.

Title

Type

Status

1.

Analyzing Lateral Movement and Pivoting IOCs

VIDEO

2.

Lateral Movement and Pivoting

VIDEO

3.

Pass the Hash

VIDEO

4.

Golden Ticket

VIDEO

5.

Lateral Movement

VIDEO

6.

Pivoting

VIDEO

7.

Quiz: Analyzing Lateral Movement and Pivoting IOCs

QUIZ

No.

Title

Type

Status

1.

Incident Response Preparation (Introduction)

VIDEO

2.

Incident Response Phases

VIDEO

3.

Documenting Procedures

VIDEO

4.

Data Criticality

VIDEO

5.

Communication Plan

VIDEO

6.

Reporting Requirements

VIDEO

7.

Response Coordination

VIDEO

8.

Training and Testing

VIDEO

9.

Quiz: Incident Response Preparation

QUIZ

No.

Title

Type

Status

1.

Detection and Containment (Introduction)

VIDEO

2.

OODA Loop

VIDEO

3.

Defensive Capabilities

VIDEO

4.

Detection and Analysis

VIDEO

5.

Impact Analysis

VIDEO

6.

Incident Classification

VIDEO

7.

Containment

VIDEO

8.

Quiz: Detection and Containment

QUIZ

No.

Title

Type

Status

1.

Eradication, Recovery, and Post-incident Actions (Introduction)

VIDEO

2.

Eradication

VIDEO

3.

Eradication Actions

VIDEO

4.

Recovery

VIDEO

5.

Recovery Actions

VIDEO

6.

Post-Incident Activities

VIDEO

7.

Lessons Learned

VIDEO

8.

Labs: Observing IoCs during a Security Incident

LAB

9.

Quiz: Eradication, Recovery, and Post-incident Actions

QUIZ

No.

Title

Type

Status

1.

Risk Mitigation (Introduction)

VIDEO

2.

Risk Identification Process

VIDEO

3.

Conducting an Assessment

VIDEO

4.

Risk Calculation

VIDEO

5.

Business Impact Analysis

VIDEO

6.

Risk Prioritization

VIDEO

7.

Communicating Risk

VIDEO

8.

Training and Exercises

VIDEO

9.

Quiz: Risk Mitigation

QUIZ

No.

Title

Type

Status

1.

Frameworks, Policies, and Procedures (Introduction)

VIDEO

2.

Enterprise Security Architecture

VIDEO

3.

Prescriptive Frameworks

VIDEO

4.

Risk-based Frameworks

VIDEO

5.

Audits and Assessments

VIDEO

6.

Continuous Monitoring

VIDEO

7.

Quiz: Frameworks, Policies, and Procedures

QUIZ

No.

Title

Type

Status

1.

Enumeration Tools (Introduction)

VIDEO

2.

Enumeration Tools

VIDEO

3.

Nmap Discovery Scans

VIDEO

4.

Nmap Port Scans

VIDEO

5.

Nmap Port States

VIDEO

6.

Nmap Fingerprinting Scans

VIDEO

7.

Using Nmap

VIDEO

8.

Hping

VIDEO

9.

Labs: Analyzing Output from Topology and Host Enumeration Tools

LAB

10.

Responder

VIDEO

11.

Wireless Assessment Tools

VIDEO

12.

Hashcat

VIDEO

13.

Testing Credential Security

VIDEO

14.

Labs: Testing Credential Security

LAB

15.

Quiz: Enumeration Tools

QUIZ

No.

Title

Type

Status

1.

Vulnerability Scanning (Introduction)

VIDEO

2.

Identifying Vulnerabilities

VIDEO

3.

Scanning Workflow

VIDEO

4.

Scope Considerations

VIDEO

5.

Scanner Types

VIDEO

6.

Scanning Parameters

VIDEO

7.

Scheduling and Constraints

VIDEO

8.

Vulnerability Feeds

VIDEO

9.

Scan Sensitivity

VIDEO

10.

Scanning Risks

VIDEO

11.

Conducting Scans

VIDEO

12.

Labs: Configuring Vulnerability Scanning and Analyzing Outputs

LAB

13.

Quiz: Vulnerability Scanning

QUIZ

No.

Title

Type

Status

1.

Analyzing Output from Vulnerability Scanners (Introduction)

VIDEO

2.

Scan Reports

VIDEO

3.

Common Identifiers

VIDEO

4.

CVSS

VIDEO

5.

Vulnerability Reports

VIDEO

6.

Nessus

VIDEO

7.

OpenVAS and Qualys

VIDEO

8.

Assessing Scan Outputs

VIDEO

9.

Labs: Assessing Vulnerability Scan Outputs

LAB

10.

Quiz: Analyzing Output from Vulnerability Scanners

QUIZ

No.

Title

Type

Status

1.

Mitigating Vulnerabilities (Introduction)

VIDEO

2.

Remediation and Mitigation

VIDEO

3.

Configuration Baselines

VIDEO

4.

Hardening and Patching

VIDEO

5.

Remediation Issues

VIDEO

6.

Quiz: Mitigating Vulnerabilities

QUIZ

No.

Title

Type

Status

1.

Identity and Access Management Solutions (Introduction)

VIDEO

2.

Identity and Access Management

VIDEO

3.

Password Policies

VIDEO

4.

SSO and MFA

VIDEO

5.

Certificate Management

VIDEO

6.

Federation

VIDEO

7.

Privilege Management

VIDEO

8.

IAM Auditing

VIDEO

9.

Conduct and Use Policies

VIDEO

10.

Account and Permissions Audits

VIDEO

11.

Labs: Performing Account and Permissions Audits

LAB

12.

Quiz: Identity and Access Management Solutions

QUIZ

No.

Title

Type

Status

1.

Network Architecture and Segmentation (Introduction)

VIDEO

2.

Asset and Change Management

VIDEO

3.

Network Architecture

VIDEO

4.

Segmentation

VIDEO

5.

Jumpbox

VIDEO

6.

Virtualization

VIDEO

7.

Virtualized Infrastructure

VIDEO

8.

Honeypots

VIDEO

9.

Configuring Network Segmentation

VIDEO

10.

Labs: Configuring Network Segmentation and Security

LAB

11.

Quiz: Network Architecture and Segmentation

QUIZ

No.

Title

Type

Status

1.

Hardware Assurance Best Practices (Introduction)

VIDEO

2.

Supply Chain Assessment

VIDEO

3.

Root of Trust

VIDEO

4.

Trusted Firmware

VIDEO

5.

Secure Processing

VIDEO

6.

Quiz: Hardware Assurance Best Practices

QUIZ

No.

Title

Type

Status

1.

Specialized Technology (Introduction)

VIDEO

2.

Mobile Vulnerabilities

VIDEO

3.

IoT Vulnerabilities

VIDEO

4.

Embedded System Vulnerabilities

VIDEO

5.

ICS & SCADA Vulnerabilities

VIDEO

6.

Mitigating Vulnerabilities

VIDEO

7.

Premise System Vulnerabilities

VIDEO

8.

Vehicular Vulnerabilities

VIDEO

9.

Quiz: Specialized Technology

QUIZ

No.

Title

Type

Status

1.

Non-technical Data and Privacy Controls (Introduction)

VIDEO

2.

Data Classification

VIDEO

3.

Data Types

VIDEO

4.

Legal Requirements

VIDEO

5.

Data Policies

VIDEO

6.

Data Retention

VIDEO

7.

Data Ownership

VIDEO

8.

Data Sharing

VIDEO

9.

Quiz: Non-technical Data and Privacy Controls

QUIZ

No.

Title

Type

Status

1.

Technical Data and Privacy Controls (Introduction)

VIDEO

2.

Access Controls

VIDEO

3.

File System Permissions

VIDEO

4.

Encryption

VIDEO

5.

Data Loss Prevention

VIDEO

6.

DLP Discovery and Classification

VIDEO

7.

Deidentification Controls

VIDEO

8.

DRM and Watermarking

VIDEO

9.

Analyzing Share Permissions

VIDEO

10.

Labs: Configuring and Analyzing Share Permissions

LAB

11.

Quiz: Technical Data and Privacy Controls

QUIZ

No.

Title

Type

Status

1.

Mitigate Software Vulnerabilities and Attacks (Introduction)

VIDEO

2.

SDLC Integration

VIDEO

3.

Execution and Escalation

VIDEO

4.

Overflow Attacks

VIDEO

5.

Race Conditions

VIDEO

6.

Improper Error Handling

VIDEO

7.

Design Vulnerabilities

VIDEO

8.

Platform Best Practices

VIDEO

9.

Quiz: Mitigate Software Vulnerabilities and Attacks

QUIZ

No.

Title

Type

Status

1.

Mitigate Web Application Vulnerabilities and Attacks (Introduction)

VIDEO

2.

Directory Traversal

VIDEO

3.

Cross-site Scripting

VIDEO

4.

SQL Injection

VIDEO

5.

XML Vulnerabilities

VIDEO

6.

Secure Coding

VIDEO

7.

Authentication Attacks

VIDEO

8.

Session Hijacking

VIDEO

9.

Sensitive Data Exposure

VIDEO

10.

Clickjacking

VIDEO

11.

Web Application Vulnerabilities

VIDEO

12.

Labs: Assessing the Impact of Web Application Vulnerabilities

LAB

13.

Quiz: Mitigate Web Application Vulnerabilities and Attacks

QUIZ

No.

Title

Type

Status

1.

Analyzing Application Assessments (Introduction)

VIDEO

2.

Software Assessments

VIDEO

3.

Reverse Engineering

VIDEO

4.

Dynamic Analysis

VIDEO

5.

Web Application Scanners

VIDEO

6.

Burp Suite

VIDEO

7.

OWASP ZAP

VIDEO

8.

Analyzing Web Applications

VIDEO

9.

Labs: Analyzing Output from Web Application Assessment Tools

LAB

10.

Quiz: Analyzing Application Assessments

QUIZ

No.

Title

Type

Status

1.

Cloud and Automation (Introduction)

VIDEO

2.

Cloud Models

VIDEO

3.

Service Models

VIDEO

4.

Cloud-based Infrastructure

VIDEO

5.

CASB

VIDEO

6.

Labs: Analyzing Output from Cloud Infrastructure Assessment Tools

LAB

7.

Quiz: Cloud and Automation

QUIZ

No.

Title

Type

Status

1.

Service-Oriented Architecture (Introduction)

VIDEO

2.

SOA and Microservices

VIDEO

3.

SOAP

VIDEO

4.

SAML

VIDEO

5.

REST

VIDEO

6.

API

VIDEO

7.

Scripting

VIDEO

8.

Workflow Orchestration

VIDEO

9.

FAAS and Serverless

VIDEO

10.

Quiz: Service-Oriented Architecture

QUIZ

No.

Title

Type

Status

1.

Cloud Infrastructure Assessments (Introduction)

VIDEO

2.

Cloud Threats

VIDEO

3.

Cloud Tools

VIDEO

4.

Cloud Forensics

VIDEO

5.

Quiz: Cloud Infrastructure Assessments

QUIZ

No.

Title

Type

Status

1.

Automation Concepts and Technologies (Introduction)

VIDEO

2.

CI/CD

VIDEO

3.

DevSecOps

VIDEO

4.

IAC

VIDEO

5.

Machine Learning

VIDEO

6.

Data Enrichment

VIDEO

7.

SOAR

VIDEO

8.

Quiz: Automation Concepts and Technologies

QUIZ

No.

Title

Type

Status

1.

Conclusion (What to Do Next…)

VIDEO

2.

BONUS: What's Come Next?

VIDEO

3.

Practice Exam

EXAM

Meet Your Instructor

Jason Dion

Jason Dion

Lead Instructor

Jason Dion, CISSP No. 349867, is a former college professor and the lead instructor at Dion Training Solutions.

He has multiple information technology professional certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Network Defense Architect (CNDA), Digital Forensic Examiner (DFE), Digital Media Collector (DMC), CySA+, Security+, Network+, A+, PRINCE2 Practitioner, and ITIL.

With networking experience dating back to 1992, Jason has been a network engineer, Deputy Director of a Network Operations Center, and an Information Systems Officer for large organizations around the globe.

He holds a Master’s of Science degree in Information Technology with a specialization in Information Assurance and a Bachelor’s of Science in Human Resources Management. He lives in Puerto Rico with his wife and two children.

Course Rating

( 5 average based on 6 reviews)
5 star
6
4 star
0
3 star
0
2 star
0
1 star
0

6 Reviews

Alhaji O Gbla
Alhaji O Gbla
Position: confidential

A great course. I feel better prepared for the exam. The practice test was challenging which is a good prep for the actual test, the practice test forced me to go back and review sections and additional research on understanding the scenario-based questions.

Breanna Hall
Breanna Hall
Position: confidential

Everything is very easy to understand the study notes take some of the stress off of trying to keep up with the material.

CompTIA® CySA+ (CS0-002) Complete Course
Course Preview
  • Price$349
  • InstructorJason Dion
  • Duration32+ hours
  • Lessons363
  • Quizzes12
  • Enrolled405 students
  • Access12 Months
  • Full Practice Exams
    Included
  • Official Textbook
    Included
  • 100% Pass Guarantee
    Included

100% Pass Guarantee


All the risk is on us, as it should be. You literally have nothing to lose.


We are so confident that you are going to learn everything you need to know to pass your CompTIA®, ITIL®, PRINCE2®, PRINCE2 Agile®, or Linux certification if you pass our courses at diontraining.com. So, if you do not pass your certification within 60 days of registering for and passing your course, simply send us your test score and your course completion letter, and we will pay for your exam retake.

guarantee
image

Authorized Training Organization


CompTIA Authorized Training Organization


All of our courses undergo a stringent review by the accreditation body prior to being published. When you take a course through us, you can be assured you are getting the highest quality training and an affordable price.