We use cookies and similar technology on this website, which helps us to know a little bit about you and how you use our website. This improves the browsing experience for you and enables us to tailor better products and services to you and others. Cookies are stored locally on your computer or mobile device.
To accept cookies continue browsing as normal or go to the Cookies Notice for more information and to set your preferences.
CompTIA Cybersecurity Analyst CySA+ (CSA+). The Total Course
Welcome to CompTIA Cybersecurity Analyst CySA+ CS0-001. The Total Course from Total Seminars and Brent Chapman.
NOTE: CompTIA originally released this certification as CSA+. They had copyright issues and had to change the acronym to CySA+. It is the same certification and the same course.
This course covers everything you need to know to pass your CompTIA CSA+ Certification (CS0-001) Exam. The first goal of the course is to make you an outstanding cybersecurity analyst and in the process, make sure you are ready to pass the CompTIA exam.
The course covers all the CompTIA CySA+ CS0-001 Objective Domains:
1.0 Threat Management 27%
2.0 Vulnerability Management 26%
3.0 Cyber Incident Response 23%
4.0 Security Architecture and Tool Sets 24%
Topics include:
CySA+ provides substantial earnings potential
A career in information security analysis ranked seventh on U.S. News and World Report’s list of the 100 best technology jobs for 2017. According to the Bureau of Labor Statistics, the median pay for an information security analyst is $90,120 per year.
CySA+ certified skills are in-demand
Properly trained IT security staff who can analyze, monitor and protect cybersecurity resources are in high demand. The U.S. Bureau of Labor Statistics (BLS) predicts that information security analysts will be the fastest growing overall job category, with 37 percent overall growth between 2012 and 2022.
Follow the CompTIA Cybersecurity Certification Pathway
IT Fundamentals > A+ > Network+ > Security+ > CySA+ > CASP
4 | Recon Results: Part 1 | ||
5 | Recon Results: Part 2 | ||
6 | Data Output |
9 | Pen Testing | ||
10 | Training | ||
11 | Reverse Engineering | ||
12 | Risk Evaluation |
13 | Requirements Identification | ||
14 | Scanning | ||
15 | Configuring and Executing Scans | ||
16 | Reporting and Remediating |
19 | Incident Response Process | ||
20 | IR Roles and Responsibilities |
23 | Digital Forensics | ||
24 | Seizure and Acquisitions | ||
25 | Forensics Acquisition Tools | ||
26 | Forensics Analysis: Part 1 | ||
27 | Forensics Analysis: Part 2 |
31 | Moving Forward: Part 1 | ||
32 | Moving Forward: Part 2 |
33 | Frameworks | ||
34 | Policies | ||
35 | Controls & Procedures | ||
36 | Verifications |
37 | Context-Based Authentication | ||
38 | Identities | ||
39 | Managing Identities | ||
40 | Exploits |
45 | Preventative Tools: Part 1 | ||
46 | Preventative Tools: Part 2 | ||
47 | Collective Tools | ||
48 | Vulnerability Scanning | ||
49 | Packet Capture | ||
50 | Connectivity Tools | ||
51 | Pen Testing Tools |