Other

CYSA+ – Cyber Security Analyst

Course Overview:


Performing data analysis with the ability to identify vulnerabilities, risks, and threats. Configuring, managing, and using threat-detection tools. Securing and protecting organization systems and applications.


Course Content:


Module 1: Threat Management Part-I

  • Cybersecurity Analysts
  • Cybersecurity Roles and Responsibilities
  • Risk Evaluation
  • Frameworks and Security Controls
  • Penetration Testing Processes
  • Reconnaissance Techniques
  • Open Source Intelligence
  • Social Engineering and Topology Discovery
  • Port Scanning and Service discovery Tools
  • OS Fingerprinting

Module 2: Threat Management Part-II

  • Security Appliances
  • Configuring Firewalls
  • Intrusion Detection and Prevention
  • Configuring IDS
  • Configuring Anti-virus Software
  • Enhanced mitigation experience toolkit
  • Logging and Analysis
  • Malware Threats
  • Packet capture
  • Packet capture Tools
  • Monitoring tools
  • Log review and SIEM
  • SIEM data outputs

Module 3: Vulnerability Management

  • Managing vulnerabilities
  • Vulnerability management requirements
  • Asset inventory
  • Data classification
  • Vulnerability management processes
  • Vulnerability scanners
  • Microsoft baseline security analyzer
  • Beyond Trust
  • Configuring vulnerability scans
  • Vulnerability scanning criteria
  • Exploit frameworks
  • Remediating vulnerabilities
  • Remediation and change control
  • Remediating Host vulnerabilities
  • Remediating Network vulnerabilities
  • Remediating Virtual Infrastructure vulnerabilities
  • Secure Software Development
  • Software Development life cycle
  • Software Vulnerabilities
  • Software security testing
  • Web application firewalls
  • Source authenticity
  • Reverse engineering

Module 4: Cyber Incident Response

  • Incident response
  • Incident response processes
  • Threat classification
  • Incident severity and prioritization
  • Types of Data Breaches
  • Computer Forensics
  • Digital Forensics Investigation Process
  • Documentation
  • Image acquisition
  • Password cracking
  • Analysis utilities
  • Incident analysis and recovery
  • Analyzing network symptoms
  • Analyzing host symptoms
  • Analyzing application symptoms
  • Using sysinternals
  • Incident Handling Tools

Module 5: Security Architecture

  • Secure Network Design
  • Control Types
  • Network Segmentation
  • Blackholes | Sinkholes and Honeypots
  • System Hardening
  • Group Policies
  • Endpoint Security
  • Identity and Access Management
  • Network Access Control
  • Identity security issues
  • Authorization & Authentication
  • Single sign on
  • Exploiting identities
  • Security frameworks
  • Security Policies and Procedures
  • Personnel Policies and Training

 

Please Note:


Target Groups:-

* Engineering Students

– Electrical Students

– Electronics Students

– Mechanical Students

– Mechatronics Students

– IT Related Students

– Technical Students

* Working Professionals

– Mechanical Engineering

– Electrical Engineering

– Electronics Engineering

– Mechatronics Engineering

– IT Related Professionals

– Technicians

Duration

1 Month

Category

Other

Course Level

Other

Related Courses

Online

Artificial Neural Networks

Java Institute for Advanced Technology
duration
Duration Hours 300
Physical

Diploma/ Advanced Diploma/ Professional Diploma in Procurement & Supply

Advance Academy of Professional Studies - AAPS
duration
Duration 28 weeks
Online

Practical Electronics for Inventors

Java Institute for Advanced Technology
duration
Duration Hours 100
Physical

Campus Direct - MSc Creative Technologies

Campus Direct
duration
Duration 2 years
Online

AIHR - NETHERLANDS HR CERTIFICATE ONLINE PROGRAMS

CIPM Sri Lanka
Online

Blockchain and Cryptocurrency

Java Institute for Advanced Technology
duration
Duration Hours 60

Ask from ETMA Campus

Need Help?
How can we help you?
Frequently Asked Questions
Contact Support
Call Us:
+94 11 766 2626
+94 77 107 0711
WhatsApp Support