CompTIA CySA+
Click Play For More Information
CompTIA CySA+ is the only intermediate high-stakes cybersecurity analyst certification with performance-based questions covering security analytics, intrusion detection and response. High-stakes exams are proctored at a Pearson VUE testing center in a highly secure environment. CompTIA CySA+ is the most up-to-date security analyst certification that covers advanced persistent threats in a post-2014 cybersecurity environment.
As attackers have learned to evade traditional signature-based solutions, such as firewalls, an analytics-based approach within the IT security industry is increasingly important for most organizations. The behavioral analytics skills covered by CompTIA CySA+ identify and combat malware, and advanced persistent threats (APTs), resulting in enhanced threat visibility across a broad attack surface.
CompTIA CySA+ is for IT professionals looking to gain the following security analyst skills:
CompTIA CySA+ meets the ISO 17024 standard and is approved by U.S. Department of Defense to fulfill Directive 8570.01-M requirements. It is compliant with government regulations under the Federal Information Security Management Act (FISMA). Regulators and government rely on ANSI accreditation because it provides confidence and trust in the outputs of an accredited program. Over 1.3 million CompTIA ISO/ANSI-accredited exams have been delivered since January 1, 2011.
This course is designed primarily for cybersecurity practitioners who perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. In addition, the course ensures that all members of an IT team—everyone from help desk staff to the Chief Information Officer—understand their role in these security processes.
Threat Intelligence Analyst
Cybersecurity Analyst
IT Security Analyst
Vulnerability Analyst
Tier II SOC Analyst
Cybersecurity Specialist
Security Engineer
NORTHROP GRUMMAN
TARGET
NETFLIX
DELL
JOHNS HOPKINS
UNIVERSITY OF MARYLAND
Your Course Instructors
Introduction
Download The Official CompTIA CySA+ Student Guide Exam CSO-001
Download All The Tools And Reference Materials
Apply Environmental Reconnaissance Techniques Using Appropriate Tools And Processes - Part 1
Apply Environmental Reconnaissance Techniques Using Appropriate Tools And Processes - Part 2
Apply Environmental Reconnaissance Techniques Using Appropriate Tools And Processes - Part 3
Apply Environmental Reconnaissance Techniques Using Appropriate Tools And Processes - Part 4
Apply Environmental Reconnaissance Techniques Using Appropriate Tools And Processes - Part 5
Apply Environmental Reconnaissance Techniques Using Appropriate Tools And Processes - Part 6
Apply Environmental Reconnaissance Techniques Using Appropriate Tools And Processes - Part 7
Apply Environmental Reconnaissance Techniques Using Appropriate Tools And Processes - Part 9
Analyze The Results Of A Network Reconnaissance - Part 1
Analyze The Results Of A Network Reconnaissance - Part 2
Analyze The Results Of A Network Reconnaissance - Part 3
Analyze The Results Of A Network Reconnaissance - Part 4
Analyze The Results Of A Network Reconnaissance - Part 5
Given A Network Based Threat Implement Or Recommend The Appropriate Response And Countermeasure - Part 1
Given A Network Based Threat Implement Or Recommend The Appropriate Response And Countermeasure - Part 2
Given A Network Based Threat Implement Or Recommend The Appropriate Response And Countermeasure - Part 3
Given A Network Based Threat Implement Or Recommend The Appropriate Response And Countermeasure - Part 4
Explain The Purpose Of Practices Used To Secure A Corporate Environment - Part 1
Explain The Purpose Of Practices Used To Secure A Corporate Environment - Part 2
Explain The Purpose Of Practices Used To Secure A Corporate Environment - Part 3
Explain The Purpose Of Practices Used To Secure A Corporate Environment - Part 4
Implement An Information Security Vulnerability Management Process - Part 1
Implement An Information Security Vulnerability Management Process - Part 2
Implement An Information Security Vulnerability Management Process - Part 3
Implement An Information Security Vulnerability Management Process - Part 4
Implement An Information Security Vulnerability Management Process - Part 5
Implement An Information Security Vulnerability Management Process - Part 6
Implement An Information Security Vulnerability Management Process - Part 7
Exam Codes | CS0-001 | CS0-002 |
Launch Date | February 15, 2017 | April, 2020 |
Exam Description | The CompTIA Cybersecurity Analyst (CySA+) certification verifies that successful candidates have the knowledge and skills required to configure and use threat detection tools, perform data analysis and interpret the results to identify vulnerabilities, threats and risks to an organization, with the end goal of securing and protecting applications and systems within an organization. | The CompTIA Cybersecurity Analyst (CySA+) certification verifies that successful candidates have the knowledge and skills required to leverage intelligence and threat detection techniques, analyze and interpret data, identify and address vulnerabilities, suggest preventative measures, and effectively respond to and recover from incidents. |
Number of Questions | Maximum of 85 questions | |
Type of Questions | Multiple choice and performance-based | |
Length of Test | 165 minutes | |
Passing Score | 750 (on a scale of 100-900) | |
Recommended Experience | Network+, Security+ or equivalent knowledge. Minimum of 3-4 years of hands-on information security or related experience. While there is no required prerequisite, CySA+ is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus. | Network+, Security+ or equivalent knowledge. Minimum of 4 years of hands-on information security or related experience. |
Languages | English, Japanese, and Simplified Chinese | English, Japanese, TBD - others |
Retirement | October, 2020 | TBD – Usually three years after launch |
EXAM Price | The voucher price is not included in this course. |
Regular price
Price with laptop