Skip to content

Comptia CySA+

Course Information

  • Fast Track ( Mon-Thur)
    Duration: 4 days
  • Slow Track (Sat/Sun)
    Duration: 4 Weeks
  • Study Modes: (Classroom/Virtual)
  • What is included:
    instructor-led hands training,
    passing guarantee or free retraining, Lab access during the course

From £1500

Interest Free Finance Available

Enquire Now


Instructor Led Training

from £850


Instructor Led Training

from £750


Instructor Led Training

Enquire for price


Instructor Led Training

Enquire for price

Course Insight

As attackers have learned to evade traditional signature-based solutions, such as firewalls and anti-virus software, an analytics-based approach within the IT security industry is increasingly important for organizations. CompTIA CySA+ applies behavioral analytics to networks to improve the overall state of security through identifying and combating malware and advanced persistent threats (APTs), resulting in an enhanced threat visibility across a broad attack surface. It will validate an IT professional’s ability to proactively defend and continuously improve the security of an organization.

CompTIA CySA+(CS0-002) meets the ISO 17024 standard and is approved by U.S. Department of Defense to fulfill Directive 8570.01-M requirements. It is compliant with government regulations under the Federal Information Security Management Act (FISMA). Regulators and government rely on ANSI accreditation because it provides confidence and trust in the outputs of an accredited program. 

While there is no required prerequisite, CompTIA Sec+ certification is recommended before taking the CompTIA Pentest+ exam.

Career Prospect

Penetration Tester, Vulnerability Tester, Security Analyst, Vulnerability Assessment Analyst, Network Security Operations. 

Learning Facilities
  • Classroom based Training
  • Highly experienced trainer
  • Labs kit, study material, exam
  • Continuous support after course
General Facilities

We also provide Free Wifi Internet, Refreshment, Water, Tea and Coffee Facilities.

Dates & prices

Course Contents

Topics Covered

Module 1: Threat Management

  • Cybersecurity Analysts
    • Cybersecurity Roles and Responsibilities
    • Frameworks and Security Controls
    • Risk Evaluation
    • Penetration Testing Processes
  • Reconnaissance Techniques
    • The Kill Chain
    • Open Source Intelligence
    • Social Engineering
    • Topology Discovery
    • Service Discovery
    • OS Fingerprinting

Module 2: Threat Management

  • Security Appliances
    • Configuring Firewalls
    • Intrusion Detection and Prevention
    • Configuring IDS
    • Malware Threats
    • Configuring Anti-Virus Software
    • Sysinternals
    • Enhanced Mitigation Experience Toolkit
  • Logging and Analysis
    • Packet Capture
    • Packet Capture and Monitoring Tools
    • Log Review and SIEM
    • SIEM Data Outputs
    • SIEM Data Analysis
    • Point-in-time Data Analysis

Module 3: Vulnerability Management

  • Managing Vulnerabilities
    • Vulnerability Management Requirements
    • Asset Inventory
    • Data Classification
    • Vulnerability Management Processes
    • Vulnerability Scanners
    • Microsoft Baseline Security Analyser
    • Vulnerability Feeds and SCAP
    • Configuring Vulnerability Scans
    • Vulnerability Scanning Criteria
    • Exploit Frameworks
  • Remediating Vulnerabilities
    • Analysing Vulnerability Scans
    • Remediation and Change Control
    • Remediating Host Vulnerabilities
    • Remediating Network Vulnerabilities
    • Remediating Virtual Infrastructure Vulnerabilities
  • Secure Software Development
    • Software Development Life Cycle
    • Software Vulnerabilities
    • Software Security Testing
    • Interception Proxies
    • Web Application Firewalls
    • Source Authenticity
    • Reverse Engineering

Module 4: Cyber Incident Response

    • Incident Response
      • Incident Response Processes
      • Threat Classification
      • Incident Severity and Prioritisation
      • Types of Data
    • Forensics Tools
      • Digital Forensics Investigations
      • Documentation and Forms
      • Digital Forensics Crime Scenes
      • Digital Forensics Kits
      • Image Acquisition
      • Password Cracking
      • Analysis Utilities

Training Offers & Packages

Network Engineer Training


Plan Includes

Interest Free Finance Available

Cyber Security Technician


Plan Includes

Interest Free Finance Available

Cyber Security Specialist Training


Plan Includes

Interest Free Finance Available

Enquire Now