• Skip to primary navigation
  • Skip to main content
  • Skip to footer
Broadband and Fiber-Optic Training | Courses, Certifications & Degrees | NCTI

Broadband and Fiber-Optic Training | Courses, Certifications & Degrees | NCTI

Train up.

  • Content Solutions
    • NCTI Courses
      • All Technical
        • 5G & Wireless
        • Fiber Tech 360
      • Customer Care
      • Leadership
      • General Education
    • Custom Content
    • Learning Delivery
  • Certifications
    • Master Fiber-Optic Technician
    • Master Technician
    • Master Representative
    • Emerging Leader
    • Master Dispatcher
    • Telecom Specialist
  • College Program
    • Broadband Technology
    • Customer Care
    • Broadband Leadership
  • Hall of Fame
  • About
    • Our Team
    • Our Community
    • News & Announcements
  • Support
    • Contact
    • FAQs
    • Resources
  • Login

CompTIA CySA+

Delivery: OnlineCompTIA CySA+ course cover image

Estimated Length: 20 seat hours

Price: $365

Add to My Account Create New Account
 
The CySA+ (Cybersecurity Analyst+) course assists students who are pursuing the CompTIA CySA+ certification. With increasingly sophisticated attack methods, an analytics-based approach to IT security has become essential for most organizations. CySA+ focuses on the knowledge and skills required to protect and defend computer systems and networks.
 
Students learn how to proactively recognize and respond to network threats, such as threat detection, incident response, and security monitoring, using a variety of data analysis techniques. The course also covers topics like identifying business impacts, using digital forensics to mitigate risks, implementing security protocols, vulnerability management, security operations, and the use of threat intelligence. Though not a requirement, it might be helpful to have a background or understanding of CompTIA A+, Network+, and Security+.

Completion Time:

The estimated completion time for this course is 30 hours. The maximum allotted time is four months from enrollment.

Benefits:

  • use this course to help prepare for CompTIA CySA+ certification exam
  • receive an industry-recognized NCTI certificate of graduation

Outline:

System and Network Architectures

Logging, operating system concepts, infrastructure concepts, network architecture, identity and access management (IAM), encryption, and sensitive information protection

Threat Intelligence in Support of Organizational Security

Standardized processes, streamlined operations, and technology and tool integration

Attack Methodology Frameworks     

Attack frameworks

Analyzing Potentially Malicious Activity        

Network symptoms, host symptoms, application symptoms, social engineering, and pattern recognition

Techniques for Malicious Activity Analysis

Network analysis tools, log analysis (SIEM and SOAR), a day in the life of a cybersecurity analyst, enterprise SOC tools, file analysis, email analysis, sandboxing, user behavior analysis, and programming languages

Tools for Malicious Activity Analysis                

Wireshark demo, WHOIS and AbuseIPDB demo, strings demo, hashing demo, and Joe Sandbox demo

Fundamentals of Threat Intelligence               

Threat actors; supply, TTP, and intelligence; collection methods

Applying Threat Intelligence in Support of Organizational Security             

Fundamentals of threat intelligence, threat modeling, risk and vulnerability management, threat hunting, and integrating vulnerability management with threat hunting

Vulnerability Scanning Methods and Concepts      

Asset discovery, industry frameworks, critical infrastructure, vulnerability identification and scanning, special considerations, and software vulnerability assessment

Vulnerability Assessment Tools         

Scanning tools, Angry IP demo, Maltego demo, web scanning tools, Nikto demo, OWASP ZAP demo, Arachni demo, Burp Suite demo, vulnerability scanning tools, Nessus demo, OpenVAS demo, debugger tools, multipurpose tools, and cloud tools

Analyzing and Prioritizing Vulnerabilities     

Validation, prioritization, context awareness, injection attacks, overflow attacks, and attack mitigation

Mitigating Vulnerabilities        

Injection attacks, overflow attacks, and attack mitigation

The Importance of Proactive Threat Hunting              

Controls, control functions, patch management, risk management, policies and prioritization, attack surface management, secure coding, secure software development, vulnerability management, compliance reporting, action plans, inhibitors to remediation, and key performance indicators

Incident Response Procedures          

Preparation and containment, eradication, and recovery

Post-Incident Response Activities   

Post-incident; reporting and communication

Utilize Basic Digital Forensics Techniques 

Detection and analysis

Footer

Follow Us on Social Media!

  • Email
  • Facebook
  • LinkedIn
  • Twitter
  • YouTube

Can’t Find It?

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

 

©2025 Jones/NCTI®, Inc.
All rights reserved.

Terms of Use | Privacy Policy

 

7807 E. Peakview Ave.

Ste. 450

Centennial, CO 80111 USA