NET 641 - Intro to CompTIA CySA+ Course Department: Business 3 Credits Total Lecture Hours: 2 Total Lab Hours: 1 Total Clinical Hours: 0 Course Description: This course is designed to meet the needs of learners and professionals who want to master intermediate cybersecurity skills. A fundamental knowledge of computers and networks is required, along with a solid understanding of fundamental computer security. All CySA+ CS0-002 exam objectives are covered.
Prerequisites/Corequisites: None
Mode(s) of Instruction: Traditional/Face-to-Face
Course Fees: None
Student Learning Outcomes and Objectives: Objectives
Unit 1: External Threats and Internal Vulnerabilities
Module 1 - Enterprise Threats and Vulnerabilities Objectives:
1. Identify different types of common attacks.
2. Describe the risks associated with mobile devices.
3. Explain security issues of embedded and specialized devices.
Module 2 - Utilizing Threat Data and Intelligence Objectives:
1. Identify different threat actors.
2. Describe threat intelligence sources.
3. Define frameworks and research sources.
4. Explain modeling methodologies.
Module 3 - Vulnerability Management:
1. List common vulnerabilities.
2. Explain the reasons for conducting a vulnerability scan.
3. Describe the different scanning decisions.
4. Explain how to run a vulnerability scan.
5. Describe how to remediate vulnerabilities.
Module 4 - Cloud Computing and Assessment Tools:
1. Define the cloud and explain how it is used and managed.
2. List different cloud vulnerabilities.
3. Describe the features of tools used for assessing vulnerabilities.
Unit 2: Controls and Best Practices
Module 5 - Infrastructure Controls:
1. Define cybersecurity controls.
2. List infrastructure management controls.
3. Describe different configuration controls.
Module 6 - Software and Hardware Assurance Best Practices:
1. Define assurance best practices.
2. List software assurance best practices.
3. Explain DevSecOps procedures.
4. Describe hardware assurance best practices.
Unit 3: Monitoring and Security Operations
Module 7 - Security Monitoring through Data Analysis:
1. Describe how to monitor endpoints, networks, and email.
2. Define data analytics.
3. Explain how to conduct data analysis reviews.
Module 8 - Security Operations:
1. Describe cybersecurity automation technologies.
2. Define threat hunting.
3. Explain different threat hunting tactics.
Unit 4: Incident Response
Module 9 - Incident Response Planning and Procedures:
1. Define incident response.
2. Explain how to plan for a cyber incident.
3. Describe how to apply appropriate incident response techniques.
Module 10 - Responding to a Cyber Incident:
1. List and explain indicators of compromise for networks, endpoints, and applications.
2. Explain the procedures for a digital forensics’ investigation.
3. Describe specialized digital forensics techniques used for different platforms.
Unit 5: Compliance
Module 11 - Risk Mitigation:
1. Define risk.
2. Explain how to identify and mitigate risks.
3. List and describe policies, procedures, and frameworks that are used as controls.
Module 12 - Data Protection and Privacy:
1. List technical controls for protecting data.
2. Explain nontechnical controls used for data protection.
3. Describe issues surrounding data privacy.
Add to Pathway (opens a new window)
|