$950.00 On-Demand Learning

Overview

Course Overview

Companies and organizations today are scrambling to keep up with protection against the latest threats. This course is going to help a candidate prepare from the ground up. Often, network architecture creates a fundamental issue when attempting to monitor. The CCSA course will analyze the entire architecture to better prepare for today’s monitoring.

Our Certified Cyber Security Analyst courseware helps the candidate prepare an organization to create a complete end to end solution for proactively monitoring, preventing, detecting, and mitigating current threats as they arise in real time.

This course maps to the mile2 Certified Cyber Security Analyst Exam as well as the CompTIA CySA+ CS0-001 certification exam.

Do not fool yourself, this course is far more advanced and will move at a fast pace for a well-rounded enjoyable experience. Be ready to dig deep into the details of security analysis for today’s needs!

This course assumes that you have a fairly in-depth knowledge of security principles, forensics, incident handling and some ethical hacking skills. The candidate is not required to be an expert in these areas but 2 or more years of experience is recommended.

Key Data

Course Title: Certified Cyber Security Analyst

Duration: 5 Days

Language: English

Class Format Options:

Instructor-led classroom

Live Online Training

Prerequisites:

  • Certified Security Principles, Certified Digital Forensics Examiner, Certified Incident Handling Engineer, Certified Professional Ethical Hacker/Certified Penetration Testing Engineer or equivalent knowledge

Student Materials:

  • Student Workbook
  • Student Lab Guide
  • Student Prep Guide

Certification Exams:

  • Certified Cyber Security Analyst
  • Covers CompTIA Cybersecurity Analyst Exam Objectives

CEUs: 40

Who Should Attend?

Security Professional, Incident Handling Professionals, Anyone working in a Security Operations Center, Forensics Experts, anyone that needs a deep understanding of proactive security analysis on networks and systems

Upon Completion

Upon completion, the Certified Cyber Security Analyst candidate will not only be able to competently take the C)CSA exam they will also be ready to prepare an organization for proactive defense against todays hackers. The candidate will be able to setup and deploy state of the art open source and for purchase analysis tools, intrusion detection tools, syslog servers, SIEMs, along with integrating them for the entire company to find and an many cases prevent todays exploits.

Exam Information

The Certified Cyber Security Analyst exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple choice questions. The cost is $500 USD and must be purchased from Mile2.com.

Outline

Course Introduction

Chapter 1 – Blue Team Principles

Chapter 2 – Digital Forensics

Chapter 3 – Malware Analysis

Chapter 4 – Traffic Analysis

Chapter 5 – Assessing the Current State of Defense with the Organization

Chapter 6 – Leveraging SIEM for Advanced Analytics

Chapter 7 – Defeating the Red Team with Purple Team Tactics

Description

Chapter 1 – Blue Team Principles  

  • Network Architecture and how it lays the groundwork
    • Defensive Network
  • Security Data Locations and how they tie together
  • Security Operations Center
    • The People, Processes, and Technology
    • Triage and Analysis
    • Digital Forensics
    • Incident Handling
    • Vulnerability Management
  • Automation, Improvement, and Tuning

Chapter 2 – Digital Forensics 

  • Investigative Theory and Processes
    • Digital Acquisition
    • Evidence Protocols
    • Evidence Presentation
  • Computer Forensics Laboratory
    • Protocols
    • Processing Techniques
    • Specialized Artifacts
  • Advanced Forensics for Today’s Exploitations

Chapter 3 – Malware Analysis 

  • Creating the Safe Environment
  • Static Analysis
  • Dynamic Analysis
  • Behavior Based Analysis
  • What is different about Ransomware?
  • Manual Code Reversing

Chapter 4 – Traffic Analysis 

  • Manual Analysis Principles
  • Automated Analysis Principles
    • Signatures compared to Behaviors
  • Application Protocols Analysis Principles
  • Networking Forensics

Chapter 5 – Assessing the current state of defense with the organization 

  • Network Architecture and Monitoring
  • Endpoint Architecture and Monitoring
  • Automation, Improvement, and continuous monitoring

Chapter 6 – Leveraging SIEM for Advanced Analytics 

  • Architectural Benefits
  • Profiling and Baselining
  • Advanced Analytics

Chapter 7 – Defeating the Red Team with Purple Team tactics 

  • Penetration Testing with full knowledge
    • Reconnaissance
    • Scanning
    • Enumeration
    • Exploitation
    • Lateral Movement