Other

CYSA+ – Cyber Security Analyst

Course Overview:


Performing data analysis with the ability to identify vulnerabilities, risks, and threats. Configuring, managing, and using threat-detection tools. Securing and protecting organization systems and applications.


Course Content:


Module 1: Threat Management Part-I

  • Cybersecurity Analysts
  • Cybersecurity Roles and Responsibilities
  • Risk Evaluation
  • Frameworks and Security Controls
  • Penetration Testing Processes
  • Reconnaissance Techniques
  • Open Source Intelligence
  • Social Engineering and Topology Discovery
  • Port Scanning and Service discovery Tools
  • OS Fingerprinting

Module 2: Threat Management Part-II

  • Security Appliances
  • Configuring Firewalls
  • Intrusion Detection and Prevention
  • Configuring IDS
  • Configuring Anti-virus Software
  • Enhanced mitigation experience toolkit
  • Logging and Analysis
  • Malware Threats
  • Packet capture
  • Packet capture Tools
  • Monitoring tools
  • Log review and SIEM
  • SIEM data outputs

Module 3: Vulnerability Management

  • Managing vulnerabilities
  • Vulnerability management requirements
  • Asset inventory
  • Data classification
  • Vulnerability management processes
  • Vulnerability scanners
  • Microsoft baseline security analyzer
  • Beyond Trust
  • Configuring vulnerability scans
  • Vulnerability scanning criteria
  • Exploit frameworks
  • Remediating vulnerabilities
  • Remediation and change control
  • Remediating Host vulnerabilities
  • Remediating Network vulnerabilities
  • Remediating Virtual Infrastructure vulnerabilities
  • Secure Software Development
  • Software Development life cycle
  • Software Vulnerabilities
  • Software security testing
  • Web application firewalls
  • Source authenticity
  • Reverse engineering

Module 4: Cyber Incident Response

  • Incident response
  • Incident response processes
  • Threat classification
  • Incident severity and prioritization
  • Types of Data Breaches
  • Computer Forensics
  • Digital Forensics Investigation Process
  • Documentation
  • Image acquisition
  • Password cracking
  • Analysis utilities
  • Incident analysis and recovery
  • Analyzing network symptoms
  • Analyzing host symptoms
  • Analyzing application symptoms
  • Using sysinternals
  • Incident Handling Tools

Module 5: Security Architecture

  • Secure Network Design
  • Control Types
  • Network Segmentation
  • Blackholes | Sinkholes and Honeypots
  • System Hardening
  • Group Policies
  • Endpoint Security
  • Identity and Access Management
  • Network Access Control
  • Identity security issues
  • Authorization & Authentication
  • Single sign on
  • Exploiting identities
  • Security frameworks
  • Security Policies and Procedures
  • Personnel Policies and Training

 

Please Note:


Target Groups:-

* Engineering Students

– Electrical Students

– Electronics Students

– Mechanical Students

– Mechatronics Students

– IT Related Students

– Technical Students

* Working Professionals

– Mechanical Engineering

– Electrical Engineering

– Electronics Engineering

– Mechatronics Engineering

– IT Related Professionals

– Technicians

Duration

1 Month

Category

Other

Course Level

Other

Related Courses

Physical

BA (Hons) Business Administration (Marketing)

Oxford College of Business Sri Lanka
duration
Duration 12 MONTHS
Physical

Diploma in Credit Management

Institute of Bankers of Sri Lanka - IBSL
duration
Duration 108 hours
Physical

Strategic Professional level ACCA

Circle Institute of Business and Technology
duration
Duration 6 Months
Physical

BSc (Hons) Accounting and Finance

APIIT Sri Lanka
duration
Duration Three years (full-time) or Two years (accelerated)
Physical

BSC (HONS) INTERNATIONAL BANKING AND FINANCE DEGREE

Human Resource Management Institute (HRMI)
Physical

Diploma in Business & Financial Journalism

Braintree Campus
duration
Duration 1 Year.

Ask from ETMA Campus

Need Help?
How can we help you?
Frequently Asked Questions
Contact Support
Call Us:
+94 11 766 2626
+94 77 107 0711
WhatsApp Support