CompTIA Cybersecurity Analyst (CySA+)
- Learnfast is a CompTIA Learning Partner.
Lesson 1: Assessing Information Security Risks
- Topic A: Identify the Importance of Risk Management
- Topic B: Assess Risk
- Topic C: Mitigate Risk
- Topic D: Integrate Documentation into Risk Management
Lesson 2: Analysing Reconnaissance Threats to Computing and Network Environments
- Topic A: Assess the Impact of Reconnaissance Incidents
- Topic B: Assess the Impact of Social Engineering
Lesson 3: Analysing Attacks on Computing and Network Environments
- Topic A: Assess the Impact of System Hacking Attacks
- Topic B: Assess the Impact of Web-Based Attacks
- Topic C: Assess the Impact of Malware
- Topic D: Assess the Impact of Hijacking and Impersonation Attacks
- Topic E: Assess the Impact of DoS Incidents
- Topic F: Assess the Impact of Threats to Mobile Security
- Topic G: Assess the Impact of Threats to Cloud Security
Lesson 4: Analysing Post-Attacks Techniques
- Topic A: Assess Command and Control Techniques
- Topic B: Assess Persistence Techniques
- Topic C: Assess Lateral Movement and Pivoting Techniques
- Topic D: Assess Data Exfiltration Techniques
- Topic E: Assess Anti-Forensics Techniques
Lesson 5: Managing Vulnerabilities in the Organisation
- Topic A: Implement a Vulnerability Management Plan
- Topic B: Assess Common Vulnerabilities
- Topic C: Conduct Vulnerability Scans
- Topic D: Conduct Penetration Tests on Network Assets
Lesson 6: Collecting Cybersecurity Intelligence
- Topic A: Deploy a Security Intelligence Collection and Analysis Platform
- Topic B: Collect Data from Network-Based Intelligence Sources
- Topic: Collect Data from Host-Based Intelligence Sources
Lesson 7: Analysing Log Data
- Topic A: Use Common Tools to Analyse Logs
- Topic B: Use SIEM Tools for Analysis
Lesson 8: Performing Active Asset and Network Analysis
- Topic A: Analyse Incidents with Windows-Based Tools
- Topic B: Analyse Incidents with Linux-Based Tools
- Topic C: Analyse Malware
- Topic D: Analyse Indicators of Compromise
Lesson 9: Responding to Cybersecurity Incidents
- Topic A: Deploy an Incident Handling and Response Architecture
- Topic B: Mitigate Incidents
- Topic C: Prepare for Forensic Investigation as a CSIRT
Lesson 10: Investigating Cybersecurity Incidents
- Topic A: Apply a Forensic Investigation Plan
- Topic B: Securely Collect and Analyse Electronic Evidence
- Topic C: Follow Up on the Results of an Investigation
Lesson 11: Addressing Security Architecture Issues
- Topic A: Remediate Identity and Access Management Issues
- Topic B: Implement Security During the SDLC

Pricing & Payment Options
Duration
Course Prerequisites
CPD Credits
Delivery Methods

