Feb 05, 2025  
2024-2025 General Catalog 
    
2024-2025 General Catalog
Add to Pathway (opens a new window)

NET 641 - Intro to CompTIA CySA+


Course Department: Business
3 Credits
Total Lecture Hours: 2
Total Lab Hours: 1
Total Clinical Hours: 0
Course Description:
This course is designed to meet the needs of learners and professionals who want to master intermediate cybersecurity skills.  A fundamental knowledge of computers and networks is required, along with a solid understanding of fundamental computer security.  All CySA+ CS0-002 exam objectives are covered.

Prerequisites/Corequisites: None

Mode(s) of Instruction: Traditional/Face-to-Face

Course Fees: None

Student Learning Outcomes and Objectives:
Objectives

Unit 1: External Threats and Internal Vulnerabilities

Module 1 - Enterprise Threats and Vulnerabilities Objectives:

1.           Identify different types of common attacks.

2.           Describe the risks associated with mobile devices.

3.           Explain security issues of embedded and specialized devices.

Module 2 - Utilizing Threat Data and Intelligence Objectives:

1.           Identify different threat actors.

2.           Describe threat intelligence sources.

3.           Define frameworks and research sources.

4.           Explain modeling methodologies.

Module 3 - Vulnerability Management:

1.           List common vulnerabilities.

2.           Explain the reasons for conducting a vulnerability scan.

3.           Describe the different scanning decisions.

4.           Explain how to run a vulnerability scan.

5.           Describe how to remediate vulnerabilities.

Module 4 - Cloud Computing and Assessment Tools:

1.           Define the cloud and explain how it is used and managed.

2.           List different cloud vulnerabilities.

3.           Describe the features of tools used for assessing vulnerabilities.

Unit 2: Controls and Best Practices

              Module 5 - Infrastructure Controls:

1.           Define cybersecurity controls.

2.           List infrastructure management controls.

3.           Describe different configuration controls.

Module 6 - Software and Hardware Assurance Best Practices:

1.           Define assurance best practices.

2.           List software assurance best practices.

3.           Explain DevSecOps procedures.

4.           Describe hardware assurance best practices.

Unit 3: Monitoring and Security Operations

              Module 7 - Security Monitoring through Data Analysis:

1.           Describe how to monitor endpoints, networks, and email.

2.           Define data analytics.

3.           Explain how to conduct data analysis reviews.

Module 8 - Security Operations:

1.           Describe cybersecurity automation technologies.

2.           Define threat hunting.

3.           Explain different threat hunting tactics.

Unit 4: Incident Response

              Module 9 - Incident Response Planning and Procedures:

1.           Define incident response.

2.           Explain how to plan for a cyber incident.

3.           Describe how to apply appropriate incident response techniques.

Module 10 - Responding to a Cyber Incident:

1.           List and explain indicators of compromise for networks, endpoints, and applications.

2.           Explain the procedures for a digital forensics’ investigation.

3.           Describe specialized digital forensics techniques used for different platforms.

Unit 5: Compliance

              Module 11 - Risk Mitigation:

1.           Define risk.

2.           Explain how to identify and mitigate risks.

3.           List and describe policies, procedures, and frameworks that are used as controls.

Module 12 - Data Protection and Privacy:

1.           List technical controls for protecting data.

2.           Explain nontechnical controls used for data protection.

3.           Describe issues surrounding data privacy.



Add to Pathway (opens a new window)