CompTIA Security Analytics Expert (CSAE)

Take 25% off all orders of $49.00 or more! No coupon needed; auto applies in cart.

$59.00

Sale Ends Soon

  • 00Days
  • 00Hours
  • 00Minutes
  • 00Seconds

If you’re an IT professional with five or more years of experience, the CompTIA CSAE is a stackable certification designed just for you. The accompanying ITU Certification Path provides all the learning materials to help ace your exams in Security+, Cybersecurity Analyst (CySA+), and CASP+. So let’s get started on achieving this sought-after recognition!

58  Training Hours
140 Videos
28  Topics
496 Practice Questions

Course Description

You can get these courses and more in our  Master CompTIA Certification training series.  The Master CompTIA training series contains 12 courses and is available for a limited time at an exceptionally low price.  Now on sale for a limited time.  Get serious about your training and elevate your career!

CompTIA CSAE Certification Training

The CompTIA CSAE is a stackable certification series by CompTIA. It is designed for IT professionals with 5 or more years of experience. The ITU Certification Path for the CompTIA CSAE certification consists of the learning materials to allow you to study for and pass the CompTIA Security+, CompTIA Cybersecurity Analyst (CySA+) and CompTIA CASP+ exams. It also provides access to self-paced IT online training from ITU, the worlds leading IT training and professional development provider. The CompTIA CSAE certification path is perfect for those who want to take their career to the next level and become a dominant leader and hone their cybersecurity mastery in the IT security field.

Secure an exceptional bargain on this training series; don’t miss out on this limited-time opportunity to save! View our Master CompTIA Training Series which includes the courses provided in this CompTIA certification training series.

Career Pathways and career information

Completing this career pathways and passing the three exams means you end of with three CompTIA certifications and are a designated a CompTIA Security Analytics Expert (CSAE).

The three courses contained in this path are:

  • CompTIA Security+
  • CompTIA Cybersecurity Analyst (CySA+)
  • CompTIA Advanced Security Practitioner (CASP+)

CompTIA Stackable Certifications

The certifications are divided into experience levels, organized by their associated pathways:

  • Specialist: IT professionals in the early stages of their career, with 0-2 years of experience (Early-career IT professionals)
  • Professional: Experienced IT professionals with a minimum of two to five years in the field (Mid-level IT professionals)
  • Expert: Experienced IT professionals with 5+ years of expertise

Upon passing the relevant exams provided by CompTIA, you will be rewarded with your very own CSAE certification badge.

What will the successful completion of the professional certifications do for me?

By obtaining the CompTIA Security Analytics Expert (CSAE) certification, you will have shown proficiency and deeper mastery in security analytics and be able to conceptualize, engineer and build cybersecurity solutions that meet regulations. With this technical knowledge comes the ability to research cyber security through data analytics and develop advanced security program that is highly sought after by many employers and will provide you with the competitive edge to propel your IT Career. With your technical skills, you will:

  • Have a deep knowledge of security concepts and identify security risks
  • Develop security incidentsPlan based on software systems
  • Asses Cloud-based network security issues
  • Map analytics to networks
  • Security experience in networking
  • VulnerabilitiesTest applications

To explore the potential of CompTIAs Stackable Certifications, please pay a visit to their official website. Pricing for these certifications will differ depending on the exam. To find out current pricing information, head over to CompTIAs Pricing page online.

Your Training Instructors

Chrys Thorsen

Chrys Thorsen

Education and Technology Expert

Chrys is an education and technology expert who specializes in enterprise-level IT infrastructure consulting and certified training-of-trainers. In her career, she has garnered 35 IT Certifications including Cisco CCSI/CCNP, CISSP, CISA, MCSE/MCITP, and many more. She has also authored 40 published certification textbooks and is currently working on the new CompTIA PenTest+ courseware.

John Abueg

John Abueg

Senior Technical Instructor

John is a Senior Technical Instructor at Ft. Gordon in Augusta, Georgia, instructing U.S. military and civilian employees on a number of cybersecurity subjects and certifications. He has been an IT professional for well over two decades, as prior to his current job he retired from the Army after a 20-year career as a soldier in the signal branch (IT and communications). John holds a bachelor’s degree in Computer Science from the University of Maryland Global Campus as well as the following IT certifications: Network+, Security+, Cybersecurity Analyst (CySA+), CompTIA Advanced Security Practitioner (CASP+), Certified Information Systems Security Professional (CISSP).

Brian O'Hair

Brian O'Hair

IT Training Professor

Professor Brian O'Hare has over 25 years of experience in the IT industry. He started off in web design as a Corporate Webmaster but wanted to understand how the internet worked. While working towards his bachelor’s in computer science, he studied and got his MCSE (Microsoft Certified Systems Engineer) and his MCT (Microsoft Certified Trainer). Once certified he paid for his degree working as a Network Engineer and then a Trainer for others wanting to learn about Microsoft’s Desktop and Server products.

Course Outline

CompTIA Security+ SY0-601 (2022) Course Outline

Module 1 - Introduction to Security
  •    1.1 Introduction to Security
Module 2 - Malware and Social Engineering Attacks
  •    2.1 Malware and Social Engineering Attacks
Module 3 - Basic Cryptography
  •    3.1 Basic Cryptography
Module 4 - Advanced Cryptography and PKI
  •    4.1 Advanced Cryptography and PKI
Module 5 - Networking and Server Attacks
  •    5.1 Networking and Server Attacks
Module 6 - Network Security Devices, Designs and Technology
  •    6.1 Network Security Devices, Designs and Technology
Module 7 - Administering a Secure Network
  •    7.1 Administering a Secure Network
Module 8 - Wireless Network Security
  •    8.1 Wireless Network Security
Module 9 - Client and Application Security
  •    9.1 Client and Application Security
Module 10 - Mobile and Embedded Device Security
  •    10.1 Mobile and Embedded Device Security
Module 11 - Authentication and Account Management
  •    11.1 Authentication and Account Management
Module 12 - Access Management
  •    12.1 Access Management
Module 13 - Vulnerability Assessment and Data Security
  •    13.1 Vulnerability Assessment and Data Security
Module 14 - Business Continuity
  •    14.1 Business Continuity
Module 15 - Risk Mitigation
  •    15.1 Risk Mitigation
Module 16 - Security Plus Summary and Review
  •    16.1 - Security Plus Summary and Review
Module 17 - Hands-On Training
  •    17.1 Hands-On Scanning Part 1
  •    17.2 Hands-On Scanning Part 2
  •    17.3 Hands-On Advanced Scanning
  •    17.4 Hands-On MetaSploit
  •    17.5 Hands-On BurpSuite
  •    17.6 Hands-On Exploitation Tools Part 1
  •    17.7 Hands-On Exploitation Tools Part 2
  •    17.8 Hands-On Invisibility Tools
  •    17.9 Hands-On Connect to Tor

CompTIA CySA+ (Cybersecurity Analyst+) CS0-002 Course Outline

Module 1: Threat and Vulnerability Management
  •    Instructor Intro
  •    About the Exam
  •    Test Taking Tips and Techniques
  •    Explain the importance of threat data and intelligence
  •    Given a scenario, utilize threat intelligence to support organizational security
  •    Given a scenario, perform vulnerability management activities Pt 1
  •    Given a scenario, perform vulnerability management activities Pt 2
  •    Given a scenario, analyze the output from common vulnerability assessment tools
  •    Explain the threats and vulnerabilities associated with specialized technology
  •    Explain the threats and vulnerabilities associated with operating in the Cloud
  •    Given a scenario, implement controls to mitigate attacks and software vulnerabilities Pt 1
  •    Given a scenario, implement controls to mitigate attacks and software vulnerabilities Pt 2
Module 2: Software and Systems Security
  •    Outline
  •    Given a scenario, apply security solutions for infrastructure management Pt 1
  •    Given a scenario, apply security solutions for infrastructure management Pt 2
  •    Given a scenario, apply security solutions for infrastructure management Pt 3
  •    Flashcards
  •    Explain software assurance best practices
  •    Scatter
  •    Explain hardware assurance best practices
  •    Learn
  •    Speller
  •    Workbook
Module 3: Security Operations and Monitoring
  •    Given a scenario, analyze data as part of security monitoring activities Pt 1
  •    Given a scenario, analyze data as part of security monitoring activities Pt 2
  •    Given a scenario, analyze data as part of security monitoring activities Pt 3
  •    Given a scenario, implement configuration changes to existing controls to improve security Pt 1
  •    Given a scenario, implement configuration changes to existing controls to improve security Pt 2
  •    Explain the importance of proactive threat hunting
  •    Compare and contrast automation concepts and technologies
Module 4: Incident Response
  •    Explain the importance of the incident response process
  •    Given a scenario, apply the appropriate the incident response procedure
  •    Given an incident, analyze potential indicators of compromise
  •    Given a scenario, utilize basic digital forensic techniques
Module 5: Compliance and Assessment
  •    Understand the importance of data privacy and protection
  •    Given a scenario, apply security concepts in support of organizational risk mitigation Pt 1
  •    Given a scenario, apply security concepts in support of organizational risk mitigation Pt 2
  •    Explain the importance of frameworks, policies, procedures, and controls Pt 1
  •    Explain the importance of frameworks, policies, procedures, and controls Pt 2
Module 6: Afterword
  •    Recap
  •    Review Questions
  •    Before the Exam

CompTIA Advanced Security Practitioner (CASP) CAS-003 Course Outline

Module 1 - Risk Management
  •    Module 1 Notes
  •    Intro CASP
  •    CASP Introduction
  •    Mod 1.1 Exploring Cloud Services Act
  •    Mod 1.1 Acquisition Merger Demerger
  •    Mod 1.1 Acquisition Merger Demerger Part2
  •    Mod 1.2 Compare and Contrast
  •    Mod 1.3 Given Scenario Execute Risk
  •    Mod 1.3 Given Scenario Execute Risk Part2
  •    Mod 1.3 Continuing Terminology IT Governance
  •    Mod 1.4 Analyze Security Solution Metrics and Attributes
  •    Mod 1.4 Analyze Risk
  •    Mod 1.4 Trend Analysis Act
Module 2 - Enterprise Security Architecture
  •    Module 2 Notes
  •    Mod 2 Enterprise Security Architecture
  •    Mod 2.1 Network Device Security Act
  •    Mod 2.1 Application and Protocol
  •    Mod 2.1 Advanced Network Security Act
  •    Mod 2.1 Complex Network Security Solution
  •    Mod 2.1 Implementing VLANs Switchport Sec Act
  •    Mod 2.1 Implementing VLANs Switchport Sec Act Part2
  •    Mod 2.1 Distributed Denial of Service
  •    Mod 2.1 Exploring DoS Attacks Act
  •    Mod 2.1 Security Zones
  •    Mod 2.1 Network Access Control
  •    Mod 2.1 Searching for Vulnerablie ICS-SCADA Act
  •    Mod 2.2 Analyze a Scenario Integrate Security
  •    Mod 2.2 Configuring Windows Firewall Act
  •    Mod 2.2 Log Monitoring and Auditing
  •    Mod 2.2 Group Policy Act
  •    Mod 2.2 Patch Management
  •    Mod 2.2 Management Interface
  •    Mod 2.2 Measured Launch
  •    Mod 2.3 Analyze a Scenario to Integrate Security Controls
  •    Mod 2.3 Security Implications Privacy
  •    Mod 2.3 Baseband
  •    Mod 2.4 Given Software Vulnerabilty Scenarios
  •    Mod 2.4 SQL Injection Act
  •    Mod 2.4 Improper Error and Exception Handling
  •    Mod 2.4 Buffer Overflows Act
  •    Mod 2.4 Memory Leaks
  •    Mod 2.4 Researching Vulnerabilities Exploits Act
Module 3 - Enterprise Security Operations
  •    Module 3 Notes
  •    Mod 3 Enterprise Security Operations
  •    Mod 3 Runtime Debugging
  •    Mod 3.1 Fingerprinting an OS Services Act
  •    Mod 3.1 Code Review
  •    Mod 3.1 Conducting OSINT Act
  •    Mod 3.1 Types
  •    Mod 3.1 Conducting a Vulnerability Assessment Act
  •    Mod 3.2 Analyze a Scenario Output
  •    Mod 3.2 Network Sniffing Act
  •    Mod 3.2 Security Content Automation
  •    Mod 3.2 Using a SCAP Scanner Act
  •    Mod 3.2 Network Enumerator
  •    Mod 3.2 Password Cracking Act
  •    Mod 3.2 Host Vulnerability Scanner
  •    Mod 3.2 Using Command Line Tools Act
  •    Mod 3.2 OpenSSL
  •    Mod 3.2 Scanning for Heartbleed Act
  •    Mod 3.2 Local Exploitation Tools
  •    Mod 3.2 Verifying File Integrity with SFC Act
  •    Mod 3.2 Log Analysis Tools
  •    Mod 3.3 Given Scenario Implement Incident
  •    Mod 3.3 Facilitate Incident Detection Response
  •    Mod 3.3 Using Incident Response Support Tools Act
  •    Mod 3.3 Severity of Incident Detection Breach
Module 4 - Technical Integration of Enterprise Security
  •    Module 4 Notes
  •    Mod 4 Technical Integration of Enterprise
  •    Mod 4 Technical Integration of Enterprise Part2
  •    Mod 4.1 DataSecurity Considerations
  •    Mod 4.1 Examing Network Diagrams Act
  •    Mod 4.1 Security and Privacy Considerations of Storage integration
  •    Mod 4.1 Exploring Directory Services and DNS Act
  •    Mod 4.2 Given Scenario Integrate Cloud and Virtualization
  •    Mod 4.2 Taking Another Look at Cloud Services Act
  •    Mod 4.2 Security Advantages and Disadvanatges of Virtualization
  •    Mod 4.2 Using Virtualization Act
  •    Mod 4.2 Cloud Augmented Security
  •    Mod 4.3 Given Scenario Integrate and Troubleshoot Advanced Authentication
  •    Mod 4.4 Given Scenario Cryptographic
  •    Mod 4.4 Cryptographic Part2
  •    Mod 4.4 Mobile Device Encryption
  •    Mod 4.4 Cryptography Act
  •    Mod 4.5 Select the Appropriate Control
  •    Mod 4.5 Phising Act
  •    Mod 4.5 Telephony VoIP Integration
Module 5 - Research, Development and Collaboration
  •    Module 5 Notes
  •    Mod 5 Research Methods to Determine Industry Trends
  •    Mod 5.1 Practicing Threat Intelligence Act
  •    Mod 5.2 Scenario Implememt Security Activities Across
  •    Mod 5.2 Static Testing
  •    Mod 5.3 Explain the Importance of Interaction
  •    CASP Conclusion
CompTIA CSAE
CompTIA Security Analytics Expert (CSAE)

$59.00

If you’re an IT professional with five or more years of experience, the CompTIA CSAE is a stackable certification designed just for you. The accompanying ITU Certification Path provides all the learning materials to help ace your exams in Security+, Cybersecurity Analyst (CySA+), and CASP+. So let’s get started on achieving this sought-after recognition!

Additional Options to Access This Training
This training is also part of our extensive training library containing over 225 courses, 12,000+ videos and over 19,000 practice test questions.
Monthly All-Access Subscription
$39.00 / month

A great option at an affordable monthly price.

Annual All-Access Subscription
$229 / year

A discounted price when paying for your All Access library on an annual basis.

Lifetime All-Access Library
$379 One time payment

Exceptional Value. Pay once, never have to buy IT training again.

Related Courses

$79.00

Our CompTIA certification training courses are comprehensive, providing IT professionals with 12 courses that feature the Core Series for A+ certification as well as introducing our innovative IT Fundamentals (ITF+) course! Furthermore, we have PenTest+, Security+, Cloud+ and Network+. For those seeking to become an expert in IT certifications – this is the training product for you!

$49.00

This IT course teaches the skills required to implement enterprise-level wired and wireless network solutions, identify and troubleshoot performance issues and harden networks against threats to mitigate security vulnerabilities. This IT course online covers the exam objectives needed in order to pass the CompTIA Network+ N10-008 certification exam

$59.00

IT professionals with 2-5 years of experience can gain the valuable CompTIA CCAP certification by following their Certification Path. This comprehensive study guide will provide you with all the essential learning materials and advice needed to ace both your CompTIA Network+ and Cloud+ exams, giving you a competitive edge in today’s ever-evolving tech industry.

$59.00

CompTIA CIOS is an invaluable stackable certification by CompTIA, specifically tailored for IT professionals with up to two years of experience. This remarkable path comprises learning materials that will help you pass the CompTIA A+ and Network+ exams—allowing you to make your mark as a certified professional in no time!

UNLOCK

25% OFF

Sign up for updates, discounts, and more.