CompTIA-CSA+

CompTIA-CSA+
Product Code: CompTIA-CSA+
Availability: In Stock
Price: R810.00

CompTIA-CSA+

PS You can change currency to see the price in your country at the top of the screen, just below the search box

CompTIA Cybersecurity Analyst (CSA+) is an international, vendor-neutral cybersecurity certification that applies behavioural analytics to improve the overall state of IT security. CSA+ validates critical knowledge and skills that are required to prevent, detect and combat cybersecurity threats. As attackers have learned to evade traditional signature-based solutions such as firewalls, an analytics-based approach within the IT security industry is increasingly important for most organizations. The behavioural analytics skills covered by CSA+ identify and combat malware, and advanced persistent threats (APTs), resulting in enhanced threat visibility across a broad attack surface.2KO's online courses are also available as full-time instructor led courses in Cape Town, giving our students hands on skills to help prepare for International IT certification exams. 2KO International delivers computer courses from beginner level to advanced, and is also a leading supplier of of online IT training courses from the comfort of home or work.

 

Module 1: Threat Management
  • Introduction
  • Given a scenario, apply environmental reconnaissance techniques using appropriate tools and
         processes 
  • Given a scenario, analyze the results of a network reconnaissance 
  • Given a network-based threat, implement or recommend the appropriate response and
         countermeasure 
  • Explain the purpose of practices used to secure a corporate environment 

 

Module 2: Vulnerability Management

  • Given a scenario, implement an information security vulnerability management process 
  • Given a scenario, analyze the output resulting from a vulnerability scan 
  • Compare and contrast common vulnerabilities found in the following targets within an
         organization 

 

Module 3: Cyber Incident Response

  • Given a scenario, distinguish threat data or behavior to determine the impact of an incident
  • Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation
  • Explain the importance of communications during the incident response process
  • Given a scenario, analyze common symptoms to select the best course of action to support
         incident response 
  • Summarize the incident recovery and post-incident response process 

 

Module 4: Security Architecture and Tool Sets

  • Explain the relationship between frameworks, common policies, controls, and procedures 
  • Given a scenario, use data to recommend remediation of security issues related to identity and
         access management 
  • Given a scenario, review security architecture and make recommendations to implement
         compensating controls 
  • Given a scenario, use applications security best practices while participating in the Software
         Development Life Cycle (SDLC) 
  • Overview
  • Conclusion

Write a review

Your Name:


Your Review: Note: HTML is not translated!

Rating: Bad           Good

Enter the code in the box below:




Tags: CompTIA, CSA+