Companies and organizations today are scrambling to keep up with protection against the latest threats. This course is going to help a candidate prepare from the ground up. Often, network architecture creates a fundamental issue when attempting to monitor. The CCSA course will analyze the entire architecture to better prepare for today’s monitoring.
Our Certified Cybersecurity Analyst courseware helps the candidate prepare an organization to create a complete end to end solution for proactively monitoring, preventing, detecting, and mitigating current threats as they arise in real time.
This course maps to the mile2 Certified Cybersecurity Analyst Exam as well as the CompTIA CySA+ CS0-001 certification exam.
Do not fool yourself, this course is far more advanced and will move at a fast pace for a well-rounded enjoyable experience. Be ready to dig deep into the details of security analysis for today’s needs!
|Start Date||Delivery Format||Days||Time||Status||Price||Enroll|
|Coming Soon||Live Virtual Led||5||10:00 am||Enrolling Now||$2,995|
Leave us a message
Security Professional, Incident Handling Professionals, Anyone working in a Security Operations Center, Forensics Experts, anyone that needs a deep understanding of proactive security analysis on networks and systems
This course assumes that you have a fairly in-depth knowledge of security principles, forensics, incident handling and some ethical hacking skills. The candidate is not required to be an expert in these areas but 2 or more years of experience is recommended.
Upon completion, the Certified Cybersecurity Analyst candidate will not only be able to competently take the CCSA exam they will also be ready to prepare an organization for proactive defense against todays hackers. The candidate will be able to setup and deploy state of the art open source and for purchase analysis tools, intrusion detection tools, syslog servers, SIEMs, along with integrating them for the entire company to find and an many cases prevent todays exploits.
Chapter 1 – Blue Team Principles
Chapter 2 – Digital Forensics
Chapter 3 – Malware Analysis
Chapter 4 – Traffic Analysis
Chapter 5 – Assessing the current state of defense with the organization
Chapter 6 – Leveraging SIEM for Advanced Analytics
Chapter 7 – Defeating the Red Team with Purple Team tactics