We may earn an affiliate commission when you visit our partners.
Course image
Warner Chaves and Dale Meredith

This series provides an overview of the knowledge and skills required to prevent, detect, and mitigate information/cyber security threats and vulnerabilities. This series can be used to prepare for the CompTIA CySA+ (Cybersecurity Analyst, CSO-001) first released in February 2017.For 10% discount when you sign up for your next CompTIA exam, use the code "PLURAL10"

Read more

This series provides an overview of the knowledge and skills required to prevent, detect, and mitigate information/cyber security threats and vulnerabilities. This series can be used to prepare for the CompTIA CySA+ (Cybersecurity Analyst, CSO-001) first released in February 2017.For 10% discount when you sign up for your next CompTIA exam, use the code "PLURAL10"

What You'll Learn

  • How to apply environmental reconnaissance techniques using the appropriate tools and processes
  • How to analyze the results of network reconnaissance
  • Given a network-based threat, how to implement or recommend the appropriate response and countermeasure
  • How to explain the purpose of practices used to secure a corporate environment
  • How to implement an information security vulnerability management process
  • How analyze the output resulting from a vulnerability scan
  • How to compare and contrast common vulnerabilities found within an organization
  • How to analyze threat data or behavior to determine the impact of an incident
  • How to prepare a toolkit and use appropriate forensics tools during an investigation
  • How to explain the importance of communication during the incident response process
  • How to analyze common symptoms to select the best course of action to support incident response
  • How to summarize the incident recovery and post-incident response process
  • How to explain the relationship between frameworks, common policies, controls, and procedures
  • How to use data to recommend remediation of security issues related to identity and access management
  • How to review security architecture and make recommendations to implement compensating controls
  • How to use application security best practices while participating in the software development life cycle
  • How to compare and contrast the general purpose and reasons for using various security tools and technologies
  • Enroll now

    Share

    Help others find this collection page by sharing it with your friends and followers:

    What's inside

    Save this collection

    Save CompTIA CySA+ (CSO-001) to your list so you can find it easily later:
    Save
    Our mission

    OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

    Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

    Find this site helpful? Tell a friend about us.

    Affiliate disclosure

    We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

    Your purchases help us maintain our catalog and keep our servers humming without ads.

    Thank you for supporting OpenCourser.

    © 2016 - 2024 OpenCourser