SKU: comptia-csae Categories: ,

CompTIA Security Analytics Expert (CSAE)

$139.00

The CompTIA CSAE is a stackable certification by CompTIA. It is designed for IT professionals with 5 or more years of experience. The ITU Certification Path for the CompTIA CSAE certification consists of the learning materials to allow you to study for and pass the CompTIA Security+, CompTIA Cybersecurity Analyst (CySA+) and CompTIA CASP+ exams.

Completing this path and passing the three exams means you end of with three CompTIA certifications and are a designated a CompTIA Security Analytics Expert (CSAE).

The three courses contained in this path are:

About The Exams for CompTIA CSAE

For the CompTIA Security+ certification, you must pass the following exam.

For CompTIA CySA+ certification, , you must pass the following exam.

For CompTIA Advanced Security Practitioner (CASP+) certification, you must pass the following exam.

Upon successfully passing the applicable exams provided by CompTIA, you will earn the CSAE certification badge.

For more information on CompTIA Stackable Certifications, visit the CompTIA website. Pricing charged by CompTIA varies by exam. For details on current pricing, visit CompTIA Pricing on their website.

Course Outline

Module 1: Threats, Attacks and Vulnerabilities
  •  Module 1 Workbook
  •  Introduction
  •  Types Of Malware-Part 1
  •  Types Of Malware-Part 2
  •  Types Of Attacks-Part 1
  •  Types Of Attacks-Part 2
  •  Types Of Attacks-Part 3
  •  Types Of Attacks-Part 4
  •  Types Of Attacks-Part 5
  •  Threat Actors-Part 1
  •  Threat Actors-Part 2
  •  Penetration Testing And Vulnerability Scanning-Part 1
  •  Penetration Testing And Vulnerability Scanning-Part 2
  •  Impact Of Vulnerabilities-Part 1
  •  Impact Of Vulnerabilities-Part 2
Module 2: Technologies and Tools
  •  Module 2 Workbook
  •  Networking Hardware And Software-Part 1
  •  Networking Hardware And Software-Part 2
  •  Networking Hardware And Software-Part 3
  •  Networking Hardware And Software-Part 4
  •  Networking Hardware And Software-Part 5
  •  Networking Hardware And Software-Part 6
  •  Security Assessment-Part 1
  •  Security Assessment-Part 2
  •  Troubleshooting Issues-Part 1
  •  Troubleshooting Issues-Part 2
  •  Securing Mobile Devices-Part 1
  •  Securing Mobile Devices-Part 2
  •  Securing Mobile Devices-Part 3
  •  Securing Mobile Devices-Part 4
  •  Secure Protocols-Part 1
  •  Secure Protocols-Part 2
Module 3: Architecture and Design
  •  Module 3 Workbook
  •  Secure Network Architecture-Part 1
  •  Secure Network Architecture-Part 2
  •  Secure System Designs-Part 1
  •  Secure System Designs-Part 2
  •  Secure Staging Deployment Concepts
  •  Embedded Systems-Part 1
  •  Embedded Systems-Part 2
  •  Application Development And Deployment-Part 1
  •  Application Development And Deployment-Part 2
  •  Application Development And Deployment-Part 3
  •  Physical Security Controls-Part 1
  •  Physical Security Controls-Part 2
  •  Physical Security Controls-Part 3
  •  Cloud Virtualization-Part 1
  •  Cloud Virtualization-Part 2
Module 4: Identity and Access Management
  •  Module 4 Workbook
  •  Identity And Access Management-Part1
  •  Identity And Access Management-Part2
  •  Identity And Access Services-Part1
  •  Identity And Access Services-Part2
  •  Management Controls-Part1
  •  Management Controls-Part2
  •  Account Management Practices-Part1
  •  Account Management Practices-Part2
  •  Account Management Practices-Part3
Module 5: Risk Management
  •  Module 5 Workbook
  •  Organizational Security-Part1
  •  Organizational Security-Part2
  •  Business Impact Analysis Concepts-Part1
  •  Business Impact Analysis Concepts-Part2
  •  Risk Management-Part1
  •  Risk Management-Part2
  •  Incident Response Procedures-Part1
  •  Incident Response Procedures-Part2
  •  Forensics-Part1
  •  Forensics-Part2
  •  Disaster Recovery-Part1
  •  Disaster Recovery-Part2
  •  Types Of Control-Part1
  •  Types Of Control-Part2
  •  Data Security And Privacy Practices-Part1
  •  Data Security And Privacy Practices-Part2
Module 6: Cryptography and PKI
  •  Module 6 Workbook
  •  Cryptographic Basics-Part1
  •  Cryptographic Basics-Part2
  •  Cryptographic Basics-Part3
  •  Cryptographic Algorithms-Part1
  •  Cryptographic Algorithms-Part2
  •  Wireless Security-Part1
  •  Wireless Security-Part2
  •  Implementing PKI-Part1
  •  Implementing PKI-Part2
  •  Implementing PKI-Part3
  •  Conclusion
CompTIA Security Analytics Expert (CSAE)

This Certification Path will enable you to study to obtain the CompTIA CSAE designation.


Save For Later
Add to Wishlist