CompTIA CySA+ Training

Prepare for the exam and learn the technical details of the cybersecurity field, including cyber threats, secure network architecture, risk management, the ability to perform log analysis, configuration assessments, and more.
Course Details


32 hours

Target Audience

This CompTIA CySA+ (CS0-003) course is designed for IT Security analysts, vulnerability analysts, threat intelligence analysts, or anyone who is trying to get a better understanding of the concepts involved in conducting cybersecurity analysis, to include threat management, vulnerability management, cyber incident response, security architecture, and the toolsets associated with these cybersecurity efforts.

Skills Gained

  • Understand the technical details of the cybersecurity field
  • Manage cyber threats
  • Secure network architecture
  • Implement risk management
  • Analyze logs
  • Perform configuration assessments
Dion Training is partnering with WebAge to provide training for CompTIA certifications. All Dion Training students benefit from a 100% Pass Guarantee. We are confident that you are going to learn everything you need to know to pass your CompTIA certification upon completion of our courses. Therefore, if you take the exam within 60 days of registering for and completing our course and do not pass, simply send us your test score and your course completion letter and we will pay for your exam retake.
Course Outline
  • Introduction
  • Identify Security Control Types
  • Threat Hunting
  • Network Forensics
  • Email Monitoring
  • Analyzing Your SIEM
  • Analyzing Network IOCs
  • Analyzing Host-related IOCs
  • Analyzing Lateral Movement and Pivoting IOCs
  • Detection and Containment
  • Eradication, Recovery, and Post-incident Actions
  • Risk Mitigation
  • Frameworks, Policies, and Procedures
  • Vulnerability Scanning
  • Analyzing Output from Vulnerability Scanners
  • Hardware Assurance Best Practices
  • Non-technical Data and Privacy Controls
  • Technical Data and Privacy Controls
  • Mitigate Software Vulnerabilities and Attacks
  • Mitigate Web Application Vulnerabilities and Attacks
  • Analyzing Application Assessments
  • Automation Concepts and Technologies
  • Conclusion