CySA Student Guide

  • Table of Contents

    Lesson 1: Explaining the Importance of Security Controls and Security Intelligence

    Lesson 2: Utilizing Threat Data and Intelligence

    Lesson 3: Analyzing Security Monitoring Data

    Lesson 4: Collecting and Querying Security Monitoring Data

    Lesson 5: Utilizing Digital Forensics and Indicator Analysis Techniques

    Lesson 6: Applying Incident Response Procedures

    Lesson 7: Applying Risk Mitigation and Security Frameworks

    Lesson 8: Performing Vulnerability Management

    Lesson 9: Applying Security Solutions for Infrastructure Management

    Lesson 10: Understanding Data Privacy and Protection

    Lesson 11: Applying Security Solutions for Software Assurance

    Lesson 12: Applying Security Solutions for Cloud and Automation

    Appendix A: Mapping Course Content to CompTIA Cybersecurity Analyst+ (Exam CS0-002)

    Appendix B: Security Resources