JULY SITEWIDE DEALS | UP TO 50% Off
40% OFF SITEWIDE LABOR DAY SALE

Shop our Labor Day sale and take 40% off all regularly priced courses and bundles sitewide.  Just add to cart to see your discounts.

Lock In At Our Lowest Price Ever: $14.99/month for 2,500+ hours of IT training.
Limited time only. Enroll now, cancel anytime!

CompTIA Cybersecurity Analyst (CySA+)

In this IT course you will learn how to configure and use threat-detection tools, perform a threat intelligence analysis, and interpret the results with the end goal of securing an organizations applications and systems with your security solutions. This IT course covers the exam objectives for the CompTIA Cybersecurity Analyst , or CySA+ exam.

Included In This Course

Included In This Course

Total Hours
17  Training Hours
CompTIA Cybersecurity Analyst (CySA+)
67 On-demand Videos
Closed Caption

Closed Captions

Course Topics
4  Topics
Prep Questions
250 Prep Questions
CompTIA Cybersecurity Analyst (CySA+)

Certificate of Completion

Course Description

Leverage intelligence and threat detection techniques strategies to gain an edge.

Cybersecurity certification is one of the hottest IT-related certifications today due to all the cybersecurity threats we face each day from bad actors. The CompTIA Cybersecurity Analyst, also known as CompTIA CySA+, is a CompTIA certification. CySA+ is focused on cyber security fundamentals and arming you with knowledge and skills required to perform the following:

  • Configure and use threat-detection tools to develop threat intelligence analysts
  • Perform data analysis and deploy threat detection techniques
  • Interpreting the results and present a vulnerability analysts along with vulnerability management activities to mitigate cyber threats.

Securing an organization’s network environments applications and systems is the primary goal of a Cybersecurity Analyst. hHaving the practical knowledge to identify and deploy effective IT environments that protect agents network attack strategies will set you apart from your peers in your IT career. 

 About CompTIA CySA+

The CompTIA CySA+ is a vendor-neutral certification. A student normally has three to four years of experience in a related IT field as well as a Security+ or equivalent knowledge. In this regard, the CompTIA CySA+ lies between the CompTIA Security+ and CompTIA Advanced Security Practitioner (CASP) exams. It is an excellent go-between to tackle before diving into the CASP, but when the CompTIA Security+ isn’t enough.

Cybersecurity certification is an ongoing requirement for government agencies. The CompTIA CySA+ was developed with a focus on meeting government requirements to certify IT, workers or contractors. With a Cybersecurity certification, you display an understanding of security best practices and protocols beyond that which is provided by the Security+ certification. You will prove a level of expertise beyond that of basic security practices that are followed when using a computer.

 

This allows any IT employee to prove a better understanding of enterprise security practices, and the necessary tools needed for organizational risk mitigation. The modules of this IT course align with the official objectives of the certification. The course expands past the scope of the certification. It also provides real-life examples and lead-ins to direct further study. This will give students an easier understanding of the material for the certification as well as a basic understanding to apply to real-life applications.

We encourage you to visit the CompTIA website for full details on theCySA+ certification and exam code CS0-001.

Frequently Asked Questions About CompTIA Cybersecurity Analyst (CySA+)

What is the CompTIA CySA+ course about?

The CompTIA CySA+ course offered by ITU Online is focused on cybersecurity fundamentals. It provides you with the knowledge and skills to configure and use threat-detection tools, perform data analysis, deploy threat detection techniques, and interpret the results. The course also trains you in presenting a vulnerability analysis and managing vulnerability to mitigate cyber threats. The ultimate goal is to secure an organization’s network environments, applications, and systems.

What is the structure of the course?

The course consists of 17 training hours, 67 videos, and 4 topics. Additionally, there are 250 practice questions included in the course to help you assess your understanding and readiness​.

What is the recommended background for this course?

The CompTIA CySA+ is a vendor-neutral certification. Typically, a student taking this course should have three to four years of experience in a related IT field, as well as a Security+ certification or equivalent knowledge.

How do I access the course materials?

The CompTIA CySA+ course is available on-demand. You can get access to this training and over 2,500 hours of other content with ITU Online’s All Access Monthly Subscription. There’s a 7-day free trial period during which you can access the course with no obligation, and you can cancel anytime.

Can I take this course if I am located outside of the United States?

Yes, you can take this course from anywhere in the world as long as you have an internet connection. The course is online and on-demand, meaning you can access it at any time that’s convenient for you.

Are there any other courses offered by ITU Online that could complement the CompTIA CySA+ course?

Yes, ITU Online offers a wide range of courses that could complement your cybersecurity education, including courses in other CompTIA certifications, network administration, data administration, development and programming, and more. We also offer various IT training bundles on sale​

Proudly Display
Your Achievement

Upon completion of your training, you’ll receive a personalized certificate of completion to help validate to others your new skills.
Example Certificate

Course Outline

CompTIA Cybersecurity Analyst (CySA+) Course Content

Module 1: Threat Management

  •    Introduction

  •    Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 1

  •    Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 2

  •    Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 3

  •    Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 4

  •    Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 5

  •    Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 6

  •    Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 7

  •    Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 8

  •    Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 9

  •    Given a scenario, analyze the results of a network reconnaissance Part 1

  •    Given a scenario, analyze the results of a network reconnaissance Part 2

  •    Given a scenario, analyze the results of a network reconnaissance Part 3

  •    Given a scenario, analyze the results of a network reconnaissance Part 4

  •    Given a scenario, analyze the results of a network reconnaissance Part 5

  •    Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 1

  •    Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 2

  •    Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 3

  •    Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 4

  •    Explain the purpose of practices used to secure a corporate environment Part 1

  •    Explain the purpose of practices used to secure a corporate environment Part 2

  •    Explain the purpose of practices used to secure a corporate environment Part 3

  •    Explain the purpose of practices used to secure a corporate environment Part 4

Module 2: Vulnerability Management

  •    Given a scenario, implement an information security vulnerability management process Part 1

  •    Given a scenario, implement an information security vulnerability management process Part 2

  •    Given a scenario, implement an information security vulnerability management process Part 3

  •    Given a scenario, implement an information security vulnerability management process Part 4

  •    Given a scenario, implement an information security vulnerability management process Part 5

  •    Given a scenario, implement an information security vulnerability management process Part 6

  •    Given a scenario, implement an information security vulnerability management process Part 7

  •    Given a scenario, analyze the output resulting from a vulnerability scan Part 1

  •    Given a scenario, analyze the output resulting from a vulnerability scan Part 2

  •    Compare and contrast common vulnerabilities found in the following targets within an organization Part 1

  •    Compare and contrast common vulnerabilities found in the following targets within an organization Part 2

  •    Compare and contrast common vulnerabilities found in the following targets within an organization Part 3

Module 3: Cyber Incident Response

  •    Given a scenario, distinguish threat data or behavior to determine the impact of an incident Part 1

  •    Given a scenario, distinguish threat data or behavior to determine the impact of an incident Part 2

  •    Given a scenario, distinguish threat data or behavior to determine the impact of an incident Part 3

  •    Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 1

  •    Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 2

  •    Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 3

  •    Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 4

  •    Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 5

  •    Explain the importance of communications during the incident response process

  •    Given a scenario, analyze common symptoms to select the best course of action to support incident response Part 1

  •    Given a scenario, analyze common symptoms to select the best course of action to support incident response Part 2

  •    Given a scenario, analyze common symptoms to select the best course of action to support incident response Part 3

  •    Given a scenario, analyze common symptoms to select the best course of action to support incident response Part 4

  •    Summarize the incident recovery and post-incident response process Part 1

  •    Summarize the incident recovery and post-incident response process Part 2

  •    Summarize the incident recovery and post-incident response process Part 3

  •    Summarize the incident recovery and post-incident response process Part 4

Module 4: Security Architecture and Tool Sets

  •    Explain the relationship between frameworks, common policies, controls, and procedures Part 1

  •    Explain the relationship between frameworks, common policies, controls, and procedures Part 2

  •    Explain the relationship between frameworks, common policies, controls, and procedures Part 3

  •    Explain the relationship between frameworks, common policies, controls, and procedures Part 4

  •    Given a scenario, use data to recommend remediation of security issues related to identity and access management Part 1

  •    Given a scenario, use data to recommend remediation of security issues related to identity and access management Part 2

  •    Given a scenario, use data to recommend remediation of security issues related to identity and access management Part 3

  •    Given a scenario, use data to recommend remediation of security issues related to identity and access management Part 4

  •    Given a scenario, review security architecture and make recommendations to implement compensating controls Part 1

  •    Given a scenario, review security architecture and make recommendations to implement compensating controls Part 2

  •    Given a scenario, review security architecture and make recommendations to implement compensating controls Part 3

  •    Given a scenario, use applications security best practices while participating in the Software Development Life Cycle (SDLC) Part 1

  •    Given a scenario, use applications security best practices while participating in the Software Development Life Cycle (SDLC) Part 2

  •    Overview

  •    Conclusion

Add a review
CompTIA Cybersecurity Analyst (CySA+) CompTIA Cybersecurity Analyst (CySA+)
Rating*
0/5
* Rating is required
Your review
* Review is required
Name
* Name is required
4.8
Based on 49 reviews
5 star
78
78%
4 star
22
22%
3 star
0%
2 star
0%
1 star
0%
1-5 of 49 reviews
  1. I was looking for an online course for Six Sigma as my new boss is a true believer and I wanted to have a better handle of what is Six Sigma. I started looking around and found ITU, and bought the course, and could not be happier. I have no intention of getting certified, but at least now I can speak the jargon and understand what my boss is talking about.

  2. The educators at ituonline.com are highly skilled but could improve their methods of instruction. In the CCNA 200-301 course, there’s a heavy emphasis on oral lectures, and it would be beneficial to include more in-depth visual aids. Annotating labs and graphics could also make the educational journey more effective. On the other hand, the N10-008 course instructor consistently offers top-notch material.

  3. The CompTIA PenTest was an excellent course and the instructor, Chrys, explained the material in a clear and easy way for me to understand and comprehend essential techniques. Highly recommend!

  4. This course is super detailed but not boring, and they give you cool projects to actually practice what you’re learning.

CompTIA Cybersecurity Analyst (CySA+)
 

$49.00

OR

Subscribe To All-Access

Gain access to this training and all our other courses, offering over 2,500 hours of content, with our cost-effective monthly subscription. No obligations. Cancel anytime.

$49.00 $14.99 Monthly

CompTIA Cybersecurity Analyst (CySA+)

CompTIA CySA+ Training
CompTIA Cybersecurity Analyst (CySA+)
Additional Options to Access This Training
This training is also part of our extensive training library containing over 225 courses, 12,000+ videos and over 19,000 practice test questions.

Monthly All-Access Subscription
7 Days Free - $39.00 / month

A great option at an affordable monthly price.

Annual All-Access Subscription
$229 / year

A discounted price when paying for your All Access library on an annual basis.

Lifetime All-Access Library
$379 One time payment

Exceptional Value. Pay once, never have to buy IT training again.

Related Courses

$49.00

Learn how to install and configure Windows Server with ITU’s Microsoft 70-410 certification training course. Get certified today!

In this Microsoft 70-410: Installing and Configuring Windows Server course you will learn how to install and configure servers, configure server roles and features, configure Hyper-V., and deploy and configure core network services. This course will also teach you how to install and administer Active Directory as well as create and manage Group Policy.

$49.00

Take your Windows Server administration skills to the next level with ITU Online’s Microsoft 70-411 course. Get certified & enhance your career.

In this Microsoft 70-411: Administering Windows Server course you will learn the tasks required to maintain a Windows Server 2012 infrastructure, such as user and group management, network access, and data security.

$49.00

Get your CompTIA A+ Certification with our 220-1001 Core 1 and 220-1002 Core 2 online course. Enroll now and get ahead in your IT career!

The CompTIA A+ 220-1001 & 220-1002 training for the Core Series covers topics that are growing in IT support, including expanded content on security baselines and a different way of assessing competence in operational procedures. ITU’s online learning environment is ideal for those with a busy schedule, offering convenience and flexibility, study when you want.Â