CompTIA® CySA+ (CS0-003) Complete Course

CompTIA® CySA+ (CS0-003) Complete Course

You will learn the technical details of the cybersecurity field, including cyber threats, secure network architecture, risk management, the ability to perform log analysis, configuration assessments, and more.  

Course Details

$399USD

Course Highlights

  • Course Price$399
  • InstructorsJason Dion
  • Total Duration36h 11m
  • Total Lessons360
  • Total Quizzes12
  • Total Enrollments65 Students
  • Access to material12 Months
  • Official LabsIncluded
  • Official TextbookIncluded
  • Full Practice ExamsIncluded
  • 100% Pass GuaranteeIncluded

Meet Your Instructor

Disclaimer

Prices may vary depending on local currency and exchange rates.

License

Description

Dive deep into the technical realms of cybersecurity with this course, exploring crucial topics like cyber threats, secure network architecture, risk management, log analysis, and configuration assessments. The CompTIA CySA+ (Cybersecurity Analyst+) (CS0-003) certification, which this course prepares you for, is a vendor-neutral credential affirming your intermediate-level cybersecurity skills.

Situated between the entry-level CompTIA Security+ and the advanced-level CompTIA Advanced Security Practitioner, this certification is ideal for those aspiring for a progression in the field. The course is tailored for IT Security analysts, vulnerability analysts, threat intelligence analysts, and individuals aiming for a comprehensive understanding of cybersecurity analysis concepts such as threat management, vulnerability management, cyber incident response, and security architecture.

Upon completion, you will possess the technical acumen required for a cybersecurity analyst role and be well-prepared for the CompTIA CySA+ (CS0-003) certification exam, encompassing all five domains:

  • Threat and Vulnerability Management (22%)
  • Software and Systems Security (18%)
  • Security Operations and Monitoring (25%)
  • Incident Response (25%)
  • Compliance and Assessment (13%)

Who this course is for:

  • Students preparing for the CompTIA CySA+ (CS0-003) certification exam
  • Threat analysts
  • Vulnerability analysts
  • Risk management professionals
  • Entry-level incident response professionals

Learning Objectives:

  • Successfully pass the CompTIA CySA+ (CS0-003) certification exam
  • Conduct a proficient cyber incident response
  • Discriminate between different types of cybersecurity tools and their application scenarios
  • Grasp the concepts of threat and vulnerability management
  • Establish a robust security architecture for networks

Course Overview:

This course illuminates the technical intricacies of the cybersecurity field, providing insights into cyber threats, secure network architecture, risk management, log analysis, configuration assessments, and more.

Prerequisites:

  • Basic understanding of networks and network security
  • Familiarity with concepts covered by the Network+ and Security+ exams.

Course Outline:

Frequently Asked Questions

No.TitleTypeStatus
1.Welcome to the CourseLAB
2.Download the Study GuidePDF
3.Exam TipsLAB
4.100% Pass GuaranteeLAB
5.Quiz: IntroductionQUIZ
No.TitleTypeStatus
1.Identify Security Control TypesLAB
2.Cybersecurity Roles and ResponsibilitiesVIDEO
3.Security Operations Center (SOC)VIDEO
4.Security Control CategoriesVIDEO
5.Selecting Security ControlsVIDEO
6.Quiz: Identify Security Control TypesQUIZ
No.TitleTypeStatus
1.Threat Intelligence SharingLAB
2.Security and Threat IntelligenceVIDEO
3.Intelligence CycleVIDEO
4.Intelligence SourcesVIDEO
5.Information Sharing and Analysis Centers (ISACS)VIDEO
6.Threat Intelligence SharingVIDEO
7.Quiz: Threat IntelligenceQUIZ
No.TitleTypeStatus
1.Classifying ThreatsLAB
2.Threat ClassificationVIDEO
3.Threat ActorsVIDEO
4.MalwareVIDEO
5.Threat ResearchVIDEO
6.Attack FrameworksVIDEO
7.Indicator ManagementVIDEO
8.Quiz: Classifying ThreatQUIZ
No.TitleTypeStatus
1.Threat HuntingLAB
2.Threat ModelingVIDEO
3.Threat HuntingVIDEO
4.Open-source IntelligenceVIDEO
5.Google HackingVIDEO
6.Profiling TechniquesVIDEO
7.Harvesting TechniquesVIDEO
8.AbuseIPDBVIDEO
9.Deep Web and Dark WebVIDEO
10.Bug BountyVIDEO
11.Quiz: Threat HuntingQUIZ
No.TitleTypeStatus
1.Network ForensicsLAB
2.Network Forensic ToolsVIDEO
3.tcpdumpVIDEO
4.WiresharkVIDEO
5.Flow AnalysisVIDEO
6.IP and DNS AnalysisVIDEO
7.URL AnalysisVIDEO
8.Conduct Packet AnalysisVIDEO
9.Quiz: Network ForensicsQUIZ
No.TitleTypeStatus
1.Appliance MonitoringLAB
2.Firewall LogsVIDEO
3.Firewall ConfigurationsVIDEO
4.Proxy LogsVIDEO
5.Web Application Firewall LogsVIDEO
6.IDS and IPS ConfigurationVIDEO
7.IDS and IPS LogsVIDEO
8.Port Security ConfigurationVIDEO
9.NAC ConfigurationVIDEO
10.Analysis of Security AppliancesVIDEO
11.Quiz: Application MonitoringQUIZ
No.TitleTypeStatus
1.Endpoint MonitoringLAB
2.Endpoint AnalysisVIDEO
3.SandboxingVIDEO
4.Reverse EngineeringVIDEO
5.Malware ExploitationVIDEO
6.Behavior AnalysisVIDEO
7.Malware Analysis (demo)VIDEO
8.EDR ConfigurationVIDEO
9.Block Lists and Allow ListsVIDEO
10.Quiz: Endpoint MonitoringQUIZ
No.TitleTypeStatus
1.Email MonitoringLAB
2.Email IOCsVIDEO
3.Email Header AnalysisVIDEO
4.Email Content AnalysisVIDEO
5.Email Server SecurityVIDEO
6.SMTP Log AnalysisVIDEO
7.Email Message SecurityVIDEO
8.Analyzing Email HeadersVIDEO
9.Quiz: Email MonitoringQUIZ
No.TitleTypeStatus
1.Configuring Your SIEMLAB
2.SIEMVIDEO
3.Security Data CollectionVIDEO
4.Data NormalizationVIDEO
5.Event LogVIDEO
6.SyslogVIDEO
7.Configuring a SIEM AgentVIDEO
8.Quiz: Configuring Your SIEMQUIZ
No.TitleTypeStatus
1.Analyzing Your SIEMLAB
2.SIEM DashboardsVIDEO
3.Analysis and DetectionVIDEO
4.Trend AnalysisVIDEO
5.Rule and Query WritingVIDEO
6.Searching and Piping CommandsVIDEO
7.Scripting ToolsVIDEO
8.Analyzing, Filtering, and Searching LogsVIDEO
9.Quiz: Analyzing Your SIEMQUIZ
No.TitleTypeStatus
1.Digital ForensicsLAB
2.Digital Forensic AnalystsVIDEO
3.Forensics ProceduresVIDEO
4.Work Product RetentionVIDEO
5.Data AcquisitionVIDEO
6.Forensics ToolsVIDEO
7.Memory AcquisitionVIDEO
8.Disk Image AcquisitionVIDEO
9.HashingVIDEO
10.Timeline GenerationVIDEO
11.CarvingVIDEO
12.Chain of CustodyVIDEO
13.Collecting and Validating EvidenceVIDEO
14.Quiz: Digital ForensicsQUIZ
No.TitleTypeStatus
1.Analyzing Network IOCsLAB
2.Analyzing Network IOCsVIDEO
3.Traffic SpikesVIDEO
4.BeaconingVIDEO
5.Irregular P2P CommunicationsVIDEO
6.Rogue DevicesVIDEO
7.Scans and SweepsVIDEO
8.Nonstandard Port UsageVIDEO
9.TCP PortsVIDEO
10.UDP PortsVIDEO
11.Data ExfiltrationVIDEO
12.Covert ChannelsVIDEO
13.Analysis of Network IOCsVIDEO
14.Quiz: Analyzing Network IOCsQUIZ
No.TitleTypeStatus
1.Analyzing Host-related IOCsLAB
2.Host-related IOCsVIDEO
3.Malicious ProcessesVIDEO
4.Memory ForensicsVIDEO
5.ConsumptionVIDEO
6.Disk and File SystemVIDEO
7.Unauthorized PrivilegeVIDEO
8.Unauthorized SoftwareVIDEO
9.Unauthorized Change/HardwareVIDEO
10.PersistenceVIDEO
11.Quiz: Analyzing Host-related IOCsQUIZ
No.TitleTypeStatus
1.Analyzing Application-related IOCsLAB
2.Application-related IOCsVIDEO
3.Anomalous ActivityVIDEO
4.Service InterruptionsVIDEO
5.Application LogsVIDEO
6.New AccountsVIDEO
7.Virtualization ForensicsVIDEO
8.Mobile ForensicsVIDEO
9.Quiz: Analyzing Application-related IOCsQUIZ
No.TitleTypeStatus
1.Analyzing Lateral Movement and Pivoting IOCsLAB
2.Lateral Movement and PivotingVIDEO
3.Pass the HashVIDEO
4.Golden TicketVIDEO
5.Lateral MovementVIDEO
6.PivotingVIDEO
7.Quiz: Analyzing Lateral Movement and Pivoting IOCsQUIZ
No.TitleTypeStatus
1.Incident Response PreparationLAB
2.Incident Response PhasesVIDEO
3.Documenting ProceduresVIDEO
4.Data CriticalityVIDEO
5.Communication PlanVIDEO
6.Reporting RequirementsVIDEO
7.Response CoordinationVIDEO
8.Business Continuity PlanVIDEO
9.Training and TestingVIDEO
10.Quiz: Incident Response PreparationQUIZ
No.TitleTypeStatus
1.Detection and AnalysisLAB
2.OODA LoopVIDEO
3.Defensive CapabilitiesVIDEO
4.Detection and AnalysisVIDEO
5.Impact AnalysisVIDEO
6.Incident ClassificationVIDEO
7.Quiz: Detection and AnalysisQUIZ
No.TitleTypeStatus
1.Containment, Eradication, Recovery, and Post-incident ActionsLAB
2.ContainmentVIDEO
3.EradicationVIDEO
4.Eradication ActionsVIDEO
5.RecoveryVIDEO
6.Recovery ActionsVIDEO
7.Post-Incident ActivitiesVIDEO
8.Lessons LearnedVIDEO
9.Root Cause AnalysisVIDEO
10.Quiz: Containment, Eradication, Recovery, and Post-incident ActionsQUIZ
No.TitleTypeStatus
1.Risk MitigationLAB
3.Conducting an AssessmentVIDEO
2.Risk Identification ProcessVIDEO
4.Risk CalculationVIDEO
5.Business Impact AnalysisVIDEO
6.Risk PrioritizationVIDEO
7.Communicating RiskVIDEO
8.Training and ExercisesVIDEO
9.Quiz: Risk MitigationQUIZ
No.TitleTypeStatus
1.Frameworks, Policies, and ProceduresLAB
2.Enterprise Security ArchitectureVIDEO
3.Prescriptive FrameworksVIDEO
4.Risk-based FrameworksVIDEO
5.Industry FrameworksVIDEO
6.Audits and AssessmentsVIDEO
7.Continuous MonitoringVIDEO
8.Quiz: Frameworks, Policies, and ProceduresQUIZ
No.TitleTypeStatus
1.Enumeration ToolsLAB
2.Enumeration ToolsVIDEO
3.Nmap Discovery ScansVIDEO
4.Nmap Port ScansVIDEO
5.Nmap Port StatesVIDEO
6.Nmap Fingerprinting ScansVIDEO
7.Using NmapVIDEO
9.Angry IP ScannerVIDEO
8.HpingVIDEO
10.MaltegoVIDEO
11.ResponderVIDEO
12.Wireless Assessment ToolsVIDEO
13.Recon-ngVIDEO
14.HashcatVIDEO
15.Testing Credential SecurityVIDEO
16.Quiz: Enumeration ToolsQUIZ
No.TitleTypeStatus
1.Vulnerability Scanning (Introduction)LAB
2.Identifying VulnerabilitiesVIDEO
3.Scanning WorkflowVIDEO
4.Scope ConsiderationsVIDEO
5.Scanner TypesVIDEO
6.Scanning ParametersVIDEO
7.Scheduling and ConstraintsVIDEO
8.Vulnerability FeedsVIDEO
9.Scan SensitivityVIDEO
10.Scanning RisksVIDEO
11.Conducting ScansVIDEO
12.Quiz: Vulnerability ScanningQUIZ
No.TitleTypeStatus
1.Analyzing Output from Vulnerability ScannersVIDEO
2.Scan ReportsVIDEO
3.Common IdentifiersVIDEO
4.CVSSVIDEO
5.Interpreting CVSSVIDEO
6.Vulnerability ReportsVIDEO
7.NessusVIDEO
8.OpenVAS and QualysVIDEO
9.Assessing Scan OutputsVIDEO
10.Quiz: Analyzing Output from Vulnerability ScannersQUIZ
No.TitleTypeStatus
1.Mitigating VulnerabilitiesLAB
2.Remediation and MitigationVIDEO
3.Configuration BaselinesVIDEO
4.Hardening and PatchingVIDEO
5.Remediation IssuesVIDEO
6.Quiz: Mitigating VulnerabilitiesQUIZ
No.TitleTypeStatus
1.Identity and Access Management SolutionsLAB
2.Identity and Access ManagementVIDEO
3.Password PoliciesVIDEO
4.SSO and MFAVIDEO
5.Certificate ManagementVIDEO
6.FederationVIDEO
7.Passwordless AuthenticationVIDEO
8.Privilege ManagementVIDEO
9.IAM AuditingVIDEO
10.Conduct and Use PoliciesVIDEO
11.Account and Permissions AuditsVIDEO
12.Quiz: Identity and Access Management SolutionsQUIZ
No.TitleTypeStatus
1.Network Architecture and SegmentationLAB
2.Asset and Change ManagementVIDEO
3.Network ArchitectureVIDEO
4.SegmentationVIDEO
5.JumpboxVIDEO
6.VirtualizationVIDEO
7.Virtualized InfrastructureVIDEO
8.HoneypotsVIDEO
9.Zero TrustVIDEO
10.Configuring Network SegmentationVIDEO
11.Quiz: Network Architecture and SegmentationQUIZ
No.TitleTypeStatus
1.Hardware Assurance Best PracticesLAB
2.Supply Chain AssessmentVIDEO
3.Root of TrustVIDEO
4.Trusted FirmwareVIDEO
5.Secure ProcessingVIDEO
6.Quiz: Hardware Assurance Best PracticesQUIZ
No.TitleTypeStatus
1.Specialized TechnologyLAB
2.Mobile VulnerabilitiesVIDEO
3.IoT VulnerabilitiesVIDEO
4.Embedded System VulnerabilitiesVIDEO
5.ICS & SCADA VulnerabilitiesVIDEO
6.Mitigating VulnerabilitiesVIDEO
7.Premise System VulnerabilitiesVIDEO
8.Vehicular VulnerabilitiesVIDEO
9.Quiz: Specialized TechnologyQUIZ
No.TitleTypeStatus
1.Non-technical Data and Privacy ControlsLAB
2.Data ClassificationVIDEO
3.Data TypesVIDEO
4.Legal RequirementsVIDEO
5.Data PoliciesVIDEO
6.Data RetentionVIDEO
7.Data OwnershipVIDEO
8.Data SharingVIDEO
9.Quiz: Non-technical Data and Privacy ControlsQUIZ
No.TitleTypeStatus
1.Technical Data and Privacy ControlsLAB
2.Access ControlsVIDEO
3.File System PermissionsVIDEO
4.EncryptionVIDEO
5.Data Loss PreventionVIDEO
6.DLP Discovery and ClassificationVIDEO
7.Deidentification ControlsVIDEO
8.DRM and WatermarkingVIDEO
9.Analyzing Share PermissionsVIDEO
10.Quiz: Technical Data and Privacy ControlsQUIZ
No.TitleTypeStatus
1.Mitigate Software Vulnerabilities and AttacksLAB
2.SDLC IntegrationVIDEO
3.Execution and EscalationVIDEO
4.Overflow AttacksVIDEO
5.Race ConditionsVIDEO
6.Improper Error HandlingVIDEO
7.Design VulnerabilitiesVIDEO
8.Platform Best PracticesVIDEO
9.Metasploit FrameworkVIDEO
10.Quiz: Mitigate Software Vulnerabilities and AttacksQUIZ
No.TitleTypeStatus
1.Mitigate Web Application Vulnerabilities and AttacksLAB
2.Directory TraversalVIDEO
3.Cross-site ScriptingVIDEO
4.SQL InjectionVIDEO
5.XML VulnerabilitiesVIDEO
6.Secure CodingVIDEO
7.Authentication AttacksVIDEO
8.Session HijackingVIDEO
9.Server-Side Request ForgeryVIDEO
10.Sensitive Data ExposureVIDEO
11.ClickjackingVIDEO
12.Web Application VulnerabilitiesVIDEO
13.Quiz: Mitigate Web Application Vulnerabilities and AttacksQUIZ
No.TitleTypeStatus
1.Analyzing Application AssessmentsLAB
2.Software AssessmentsVIDEO
3.Reverse EngineeringVIDEO
4.Dynamic AnalysisVIDEO
5.Web Application ScannersVIDEO
6.Burp SuiteVIDEO
7.OWASP ZAPVIDEO
8.Analyzing Web ApplicationsVIDEO
9.Quiz: Analyzing Application AssessmentsQUIZ
No.TitleTypeStatus
1.Cloud and AutomationLAB
2.Cloud ModelsVIDEO
3.Service ModelsVIDEO
4.Cloud-based InfrastructureVIDEO
5.CASBVIDEO
6.Quiz: Cloud and AutomationQUIZ
No.TitleTypeStatus
1.Service-Oriented ArchitectureLAB
2.SOA and MicroservicesVIDEO
3.SOAPVIDEO
4.SAMLVIDEO
5.RESTVIDEO
6.APIs, Webhooks, and PluginsVIDEO
7.ScriptingVIDEO
8.Workflow OrchestrationVIDEO
9.FAAS and ServerlessVIDEO
10.Quiz: Service-Oriented ArchitectureQUIZ
No.TitleTypeStatus
1.Cloud Infrastructure AssessmentsLAB
2.Cloud ThreatsVIDEO
3.Cloud ForensicsVIDEO
4.Auditing the CloudVIDEO
5.Conducting Cloud AuditsVIDEO
6.Quiz: Cloud Infrastructure AssessmentsQUIZ
No.TitleTypeStatus
1.Automation Concepts and TechnologiesLAB
2.CI/CDVIDEO
3.DevSecOpsVIDEO
4.IACVIDEO
5.Machine LearningVIDEO
6.Data EnrichmentVIDEO
7.SOARVIDEO
8.Standardized ProcessesVIDEO
9.Single Pane of GlassVIDEO
10.Quiz: Automation Concepts and TechnologiesQUIZ
No.TitleTypeStatus
1.Conclusion (What to Do Next…)VIDEO
2.BONUS: What's Come Next?VIDEO
3.Practice ExamQUIZ

Customer Reviews

Review Avatar Image

MUHSIN NSUBUGA

Senior Network Engineer

5 out of 5 stars

Coming from a heavy technical field, I found ITIL content dry. But Dion's videos made it easy for me to understand all the concepts. I passed the exam within a week
Review Avatar Image

Laurynas Pakalnis

confidential

5 out of 5 stars

Before signing up for this course I've reasearched various course providers and tried some sample materials. With 100% certainty I can state that Dion Trainining is simpy the best! And Jason Dion is one of the best instructors out there.
ato Comptia Logo
Accredited Training Organization
Dion Training is an Platinum Partner for CompTIA certification exams.

All of our courses undergo a stringent review by the accreditation body prior to being published. When you take a course through us, you can be assured you are getting the highest quality training and an affordable price.

60 Day Money Back Guarantee

100% Pass Guarantee

All the risk is on us, as it should be. You literally have nothing to lose.

We are so confident that you are going to learn everything you need to know to pass your CompTIA®, ITIL®, PRINCE2®, PRINCE2 Agile®, or Linux certification if you complete our courses at diontraining.com. So, if you do not pass your certification within 60 days of registering for and completing your course, simply send us your test score and your course completion letter, and we will pay for your exam retake.