CompTIA CySA+ (CS0-002)

Ethical Hacking and CompTIA Cyber Security Analyst CySA+ CS0-002

   Watch Promo

Welcome to TOTAL: CompTIA CySA+ Cybersecurity Analyst (CS0-002) course from Total Seminars, Brent Chapman, GCIH, GCFA, CISSP, CySA+, and Michael Solomon, Ph.D., CySA+, CISSP, PMP, CISM.

Are you looking to get into the exciting world of hackers, cybersecurity, threat hunting, and digital forensics? Do you find the idea of gathering and analyzing intelligence to detect and combat hackers intriguing? Then this is the course for you!

This course is aimed at the aspirational junior analyst looking to step up in their career. However, if your tech skills don't include cybersecurity, you can also gain a great deal of knowledge from this course to help launch yourself towards a career in cybersecurity.

This course covers everything you need to know to respond to cybersecurity threats and attacks. You’ll learn how to:

  • Leverage intelligence and threat detection techniques
  • Analyze and interpret data
  • Identify and address vulnerabilities
  • Suggest preventative measures
  • Effectively respond to and recover from incidents
  • Analyze the results of network reconnaissance, and recommend or implement countermeasures
  • Secure a corporate environment

If you're looking to get certified, this course will also help prepare you for the CompTIA CySA+ Certification (CS0-002) exam. The first goal of the course is to make you an outstanding cybersecurity analyst and, in the process, make sure you are ready to pass the CompTIA exam.

THE COMPTIA CYSA+ (CS0-002) EXAM DOMAINS:

1.0 Threat and Vulnerability Management (22% of the exam)

2.0 Software and Systems Security (18% of the exam)

3.0 Security Operations and Monitoring (25% of the exam)

4.0 Incident Response (22% of the exam)

5.0 Compliance and Assessment (13% of the exam)

TOPICS INCLUDE:

Threat data and intelligence

Vulnerability management with mobile, IoT, the cloud, and more

Security solutions for your network and in the cloud

Identity and access management (IAM)

Software and hardware best practices

Analyzing data using heuristics, trend analysis, and log review

Implementing intrusion prevention systems (IPS) and intrusion detection systems (IDS)

Threat hunting

Automation concepts like workflow orchestration, machine learning, scripting, API integration, and SCAP

Incident response process

Digital forensics

Controls, policies, frameworks, and procedures to protect data and secure networks

Business impact analysis and organizational risk mitigation

CAREERS THAT USE THE CYSA+ CERTIFICATION:

  • Security analyst
    • Tier II SOC analyst
    • Security monitoring
  • Security engineer
  • Threat hunter
  • Incident response or handler
  • Threat intelligence analyst
  • Application security analyst
  • Compliance analyst

CySA+ provides substantial earnings potential

A career in information security analysis ranked 5th on U.S. News and World Report’s list of the 100 best technology jobs for 2020. According to the Bureau of Labor Statistics, the median pay for an information security analyst is $90,120 per year*.

CySA+ certified skills are in-demand

Properly trained IT security staff who can analyze, monitor and protect cybersecurity resources are in high demand. The U.S. Bureau of Labor Statistics (BLS) predicts that information security analysts will be the fastest growing overall job category, with 37 percent overall growth between 2012 and 2022.

Brent Chapman is an information security engineer with over 15 years' experience in information technology and cyber security. He spent over 10 years in active duty in the United States Army, where he served as an intelligence analyst, communications officer, network engineer, and cyber operations officer. He has also been a researcher and instructor at West Point, where he graduated, as well as a member of the Security of Defense's staff.

Michael Solomon is a security, privacy, blockchain, and data science author, consultant, and speaker who specializes in leading teams in achieving and maintaining secure and effective IT environments. Dr. Solomon has over 25 years' experience in IT, cybersecurity, and pentesting. He is a Professor of Cyber Security and IT at the University of the Cumberlands, and holds a PhD in Computer Science and Informatics from Emory University.


Your Instructor


Total Seminars
Total Seminars

Total Seminars provides certification training services and training materials to thousands of schools, corporations, and government agencies including the United Nations, the FBI and all branches of the Department of Defense. Total Seminars produces the #1 selling CompTIA A+ and Network+ Certification books with over 1 million books in print.

Total Seminars has created a number of “Best-Selling” video courses by Mike Meyers and the Total Seminars team of Instructors. They also develop supplemental materials such as the TotalTester certification practice tests and TotalSims lab simulations to support your certification preparation. These are available on the Total Seminars web site www.totalsem.com.


Course Curriculum


  Chapter 2: Threat Intelligence in Support of Organizational Security
Available in days
days after you enroll
  Chapter 5: Threats and Vulnerabilities Associated with Specialized Technology
Available in days
days after you enroll
  Chapter 6: Threats and Vulnerabilities Associated with Operating in the Cloud
Available in days
days after you enroll
  Chapter 10: Hardware Assurance Best Practices
Available in days
days after you enroll
  Ch12: Implement Configuration Changes to Existing Controls to Improve Security
Available in days
days after you enroll
  Chapter 13: The Importance of Proactive Threat Hunting
Available in days
days after you enroll
  Chapter 15: The Importance of the Incident Response Process
Available in days
days after you enroll
  Chapter 16: Appropriate Incident Response Procedures
Available in days
days after you enroll
  Chapter 17: Analyze Potential Indicators of Compromise
Available in days
days after you enroll
  Chapter 19: The Importance of Data Privacy and Protection
Available in days
days after you enroll
  Chapter 21: The Importance of Frameworks, Policies, Procedures, and Controls
Available in days
days after you enroll

Frequently Asked Questions


When does the course start and finish?
The course starts now and never ends! It is a completely self-paced online course - you decide when you start and when you finish.
How long do I have access to the course?
How does lifetime access sound? After enrolling, you have unlimited access to this course for as long as you like - across any and all devices you own.
What if I am unhappy with the course?
We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 30 days and we will give you a full refund.

What you'll learn

1-Threat hunting
2-Data analysis to combat cyber attacks
3-Digital forensics
4-Securing your network to protect critical data
5-Business impact analysis and risk mitigation
6-Vulnerability management with networks, IoT, mobile, cloud, and more
7-Identity and access management (IAM)

Get started now!