CompTIA CySA+ Certification

By Tia Williams

Learn cybersecurity to protect your environment from bad actors.

16 hours
  • 51 Lessons
  • 12 Hands-On Labs
  • 4 Course Quizzes
  • 1 Practice Exam

About the course

Welcome to the CompTIA Cybersecurity Analyst (CySA+) certification course!

Cybersecurity Analysts are the protectors of our networks. They perform many duties that include analyzing data to identify vulnerabilities, threats, and risks to an organization. They also configure and tune threat-detection tools and secure applications and systems within an organization.

As the skills of cyber attackers continue to grow, so should the skills of cybersecurity analysts. These attackers are finding new ways to bypass our toolsets and controls, therefore, we must continue to adapt and advance our skills in order to combat the attackers and defend our networks.

If you want to advance your cybersecurity defensive skills, the CompTIA CySA+ certification is a great place to start your journey.

NOTE: The CompTIA CySA+ (CS0-001) English language exam retired October 21, 2020. The Simple Chinese language exam retired April 23, 2021
The Japanese language exam retirement date is July 26, 2021.

  • Chapter 1 6 Lessons Course Introduction 9:05

    Important Note About A Cloud Guru and Linux Academy Courses

    1:19

    About the Course

    2:35

    About the Author

    1:11

    About the Exam

    2:15

    Connecting to a Linux Lab Server with VNC

    0:51

    Connecting to a Windows Lab Server with RDP

    0:54
  • Chapter 2 3 Lessons Environmental Reconnaissance 29:43

    Attack Procedures and Tools

    16:42

    Evasion Techniques, Social Engineering, and Attack Variables

    9:26

    Traffic Analysis

    3:35
  • Chapter 3 3 Lessons Network Analysis 20:28

    Network Data Analysis

    7:31

    Network Data Correlation, Output, and Tools

    12:57

    Scanning a Host with NMAP

    0:00 Hands-On Lab
  • Chapter 4 3 Lessons Attack Responses and Countermeasures 19:45

    Network Segmentation and Honeypots

    8:36

    Group Policies, ACLs, Hardening, and NAC

    11:09

    Configuring a Host Firewall on Ubuntu using UFW

    0:00 Hands-On Lab
  • Chapter 5 6 Lessons Security Practices 1:27:48

    Pentesting — Part 1

    11:14

    Pentesting — Part 2

    10:01

    Reverse Engineering

    6:52

    Risk Evaluation

    14:41

    Analyzing Possible Malware

    0:00 Hands-On Lab

    Threat Management

    45:00 Quiz
  • Chapter 6 3 Lessons The Vulnerability Management Process 25:12

    Vulnerability Scan Requirements and Frequency

    14:30

    Vulnerability Reports, Remediation, and Continuous Monitoring

    10:42

    Installing and Configuring OpenVAS

    0:00 Hands-On Lab
  • Chapter 7 2 Lessons Vulnerability Scan Results 9:30

    Analyzing and Validating Vulnerability Scan Results

    9:30

    Analyzing an OpenVAS Vulnerability Scan Report

    0:00 Hands-On Lab
  • Chapter 8 3 Lessons Common Vulnerabilities on Targets 36:55

    Common Server, Endpoint, and Network Vulnerabilities

    12:22

    Common Virtual Infrastructure, Mobile Device, VPN, and ICS vulnerabilities

    9:33

    Vulnerability Management

    15:00 Quiz
  • Chapter 9 2 Lessons Determining Impact 16:55

    Incident Response Process and Threat Classifications

    8:30

    Determining Impact Severity and Prioritization and Reviewing Data Classifications

    8:25
  • Chapter 10 3 Lessons The Incident Response Toolkit 12:17

    Forensics Toolkit

    8:10

    Forensic Investigation Suite

    4:07

    Working with Syslog Data

    0:00 Hands-On Lab
  • Chapter 11 1 Lesson Incident Response Communications 7:55

    Communications Process, Stakeholders, and Responsibilities

    7:55
  • Chapter 12 6 Lessons Common Symptoms 35:24

    Network Related Symptoms

    15:38

    Host Related Symptoms

    11:49

    Netcat and Application Related Symptoms

    7:57

    Looking for Malware on Windows Systems

    0:00 Hands-On Lab

    Looking for Malware on Linux Systems

    0:00 Hands-On Lab

    Using Wireshark to Identify Malicious Network Activity

    0:00 Hands-On Lab
  • Chapter 13 3 Lessons The Incident Response Process 1:01:19

    Containment, Eradication, Validation, and Corrective Actions

    10:22

    Setting Up Arpwatch to Identify New Devices on a Network

    20:57

    Cyber Incident Response

    30:00 Quiz
  • Chapter 14 1 Lesson Frameworks, Policies, Controls, and Procedures 17:56

    Regulatory Compliance, Frameworks, Policies, and Procedures

    17:56
  • Chapter 15 3 Lessons Identity and Access Management (IAM) 11:03

    Identities, Repositories, Federation, SSO, and Exploits

    11:03

    Working with Windows Accounts and Security Policies

    0:00 Hands-On Lab

    Working with Linux Accounts and Password Policies

    0:00 Hands-On Lab
  • Chapter 16 1 Lesson Compensating Controls 12:28

    Defense in Depth for Personnel, Processes, and Technologies

    12:28
  • Chapter 17 1 Lesson Application Security 9:12

    SDLC and Software Development Best Practice

    9:12
  • Chapter 18 4 Lessons Tools and Technologies 46:58

    Preventative and Collective Tools

    9:29

    Analytical, Exploit, and Forensic tools

    7:29

    Analyzing Windows Event Logs

    0:00 Hands-On Lab

    Security Architecture and Tool Sets

    30:00 Quiz
  • Chapter 19 2 Lessons Next Steps 2:02:11

    Taking the CySA+ Certification Exam

    2:11

    CySA+

    2:00:00 Quiz

What are Hands-on Labs

What's the difference between theoretical knowledge and real skills? Practical real-world experience. That's where Hands-on Labs come in! Hands-on Labs are guided, interactive experiences that help you learn and practice real-world scenarios in real cloud environments. Hands-on Labs are seamlessly integrated in courses, so you can learn by doing.

Get Started
Who’s going to be learning?
Sign In
Welcome Back!

Psst…this one if you’ve been moved to ACG!