Certcop (A division of Secbay Inc.) A proud member of CompTIA
Secbay and its partners have provided successfully training to many top edge companies worldwide. They have successfully delivered instructor-led classroom as well as Virtual-live training and certification for many industry leaders such as DoD, DHS, US Army, US Navy, US Airforce, Unisys, ICE, BAH, Booz Allen Hamilton, Freddie Mac, Guidewell Source, Disney, Navarro, Apple, Amazon, Deloitte, Seagate and many more
The CompTIA Cybersecurity Analyst (CySA+).
CompTIA Cybersecurity Analyst (CySA+) is an IT workforce credential that uses behavioral analytics to avoid, identify, and battle cybersecurity threats through continuous security monitoring on networks and devices.
CySA+ will confirm that the successful candidate possesses the knowledge and abilities needed to:
•Use intelligence and threat detection tools to your advantage.
•Data analysis and interpretation
•Recognize and address vulnerabilities
•Suggestions for preventative measures
•Respond to and recover from incidents in a timely and effective manner.
•Threat and Vulnerability Management
•Explain the importance of threat data and intelligence.
•Given a scenario, utilize threat intelligence to support organizational security.
•Given a scenario, perform vulnerability management activities.
•Given a scenario, analyze the output from common vulnerability assessment tools.
•Explain the threats and vulnerabilities associated with specialized technology.
•Explain the threats and vulnerabilities associated with operating in the cloud.
•Given a scenario, implement controls to mitigate attacks and software vulnerabilities.
•Software and Systems Security
•Given a scenario, apply security solutions for infrastructure management.
•Explain software assurance best practices
•Explain hardware assurance best practices
•Security Operations and Monitoring
•Given a scenario, analyze data as part of security monitoring activities.
•Given a scenario, implement configuration changes to existing controls to improve security.
•Explain the importance of proactive threat hunting.
•Compare and contrast automation concepts and technologies
•Explain the importance of the incident response process.
•Given a scenario, apply the appropriate incident response procedure.
•Given an incident, analyze potential indicators of compromise.
•Given a scenario, utilize basic digital forensics techniques.
•Compliance and Assessment
•Understand the importance of data privacy and protection.
•Given a scenario, apply security concepts in support of organizational risk mitigation.
•Explain the importance of frameworks, policies, procedures, and controls.