Other

CYSA+ – Cyber Security Analyst

Course Overview:


Performing data analysis with the ability to identify vulnerabilities, risks, and threats. Configuring, managing, and using threat-detection tools. Securing and protecting organization systems and applications.


Course Content:


Module 1: Threat Management Part-I

  • Cybersecurity Analysts
  • Cybersecurity Roles and Responsibilities
  • Risk Evaluation
  • Frameworks and Security Controls
  • Penetration Testing Processes
  • Reconnaissance Techniques
  • Open Source Intelligence
  • Social Engineering and Topology Discovery
  • Port Scanning and Service discovery Tools
  • OS Fingerprinting

Module 2: Threat Management Part-II

  • Security Appliances
  • Configuring Firewalls
  • Intrusion Detection and Prevention
  • Configuring IDS
  • Configuring Anti-virus Software
  • Enhanced mitigation experience toolkit
  • Logging and Analysis
  • Malware Threats
  • Packet capture
  • Packet capture Tools
  • Monitoring tools
  • Log review and SIEM
  • SIEM data outputs

Module 3: Vulnerability Management

  • Managing vulnerabilities
  • Vulnerability management requirements
  • Asset inventory
  • Data classification
  • Vulnerability management processes
  • Vulnerability scanners
  • Microsoft baseline security analyzer
  • Beyond Trust
  • Configuring vulnerability scans
  • Vulnerability scanning criteria
  • Exploit frameworks
  • Remediating vulnerabilities
  • Remediation and change control
  • Remediating Host vulnerabilities
  • Remediating Network vulnerabilities
  • Remediating Virtual Infrastructure vulnerabilities
  • Secure Software Development
  • Software Development life cycle
  • Software Vulnerabilities
  • Software security testing
  • Web application firewalls
  • Source authenticity
  • Reverse engineering

Module 4: Cyber Incident Response

  • Incident response
  • Incident response processes
  • Threat classification
  • Incident severity and prioritization
  • Types of Data Breaches
  • Computer Forensics
  • Digital Forensics Investigation Process
  • Documentation
  • Image acquisition
  • Password cracking
  • Analysis utilities
  • Incident analysis and recovery
  • Analyzing network symptoms
  • Analyzing host symptoms
  • Analyzing application symptoms
  • Using sysinternals
  • Incident Handling Tools

Module 5: Security Architecture

  • Secure Network Design
  • Control Types
  • Network Segmentation
  • Blackholes | Sinkholes and Honeypots
  • System Hardening
  • Group Policies
  • Endpoint Security
  • Identity and Access Management
  • Network Access Control
  • Identity security issues
  • Authorization & Authentication
  • Single sign on
  • Exploiting identities
  • Security frameworks
  • Security Policies and Procedures
  • Personnel Policies and Training

 

Please Note:


Target Groups:-

* Engineering Students

– Electrical Students

– Electronics Students

– Mechanical Students

– Mechatronics Students

– IT Related Students

– Technical Students

* Working Professionals

– Mechanical Engineering

– Electrical Engineering

– Electronics Engineering

– Mechatronics Engineering

– IT Related Professionals

– Technicians

Duration

1 Month

Category

Other

Course Level

Other

Related Courses

Physical

Certificate Course in International Relations

Bandaranaike Centre for International Studies - BCIS
duration
Duration 04 Months
Physical

Dinning Etiquette

Ramani Fernando Training
Physical

Cyber Security and Ethical Hacking Program

ATARI City Campus
duration
Duration 12 Months
Physical

Continuous Professional Development Programme CPDP for Superintendent of Surveys

Institute of Surveying and Mapping
duration
Duration 5 Days
Physical

Diploma in Banking & Finance

CA Sri Lanka - The Institute of Chartered Accountants of Sri Lanka
Physical

MA In Corporate Communication

Braintree Campus
duration
Duration 1.5 years

Ask from ETMA Campus

Need Help?
How can we help you?
Frequently Asked Questions
Contact Support
Call Us:
+94 11 766 2626
+94 77 107 0711
WhatsApp Support