CompTIA CSA+ (Cybersecurity Analyst)

Track Room Location: Heritage Hall, 123


The "CompTIA CSA" track is now closed, but you can be added to the WAIT LIST by selecting that track as your primary choice. You'll be placed into your alternate track choice. If space opens up in "CompTIA CSA," you will be notified.

Description

This intermediate-level Cyber Security Course will provide students the opportunity to gain immeasurable hands-on experience with current and emerging security tools. Students will learn about the latest threats, vulnerabilities, analysis, and counter-measures in a controlled classroom environment. Students will gain valuable knowledge as applied to both academic and production environments.

Prerequisites

Network+, Security+ or equivalent knowledge. Minimum of 3-4 years of hands-on information security or related experience. While there is no required prerequisite, CSA+ is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus.

Instructor

clay.jpg
Clay Leitzke is President and Chief Instructor for Nexus Worldwide. Clay began his IT career with Delta Airlines in 1991. He earned his MCSE and MCT in 1996, and since that time, he has accumulated over 50,000 instructional hours experience. He holds certifications with CompTIA including CASP, Microsoft, Cisco, EC-Council, CIW, ISC2, and has a BS in IT Security. Clay primarily works with units of the Department of Defense at bases around the world. More than 10,000 members of the DOD have earned certifications through his instruction. Clay also provides consulting services to law enforcement in the areas of Computer Forensics, Data Recovery, and Computer Crime Analysis.

Three Objectives

1. Students will be able to configure and use threat detection tools.
2. Students will be able to collect data samples and perform data analysis.
3. Students will be able interpret the results to identify vulnerabilities, threats and risks to an organization.

Agenda

Day 1 (Monday)
  • Course Introduction – CSA+ Overview and Certification Objectives
Network+ and Security+ Review

  • Module 1 – Domain 1 – Threat Management
Objective 1.1 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes
Objective 1.2 Given a scenario, analyze the results of a network reconnaissance.
Objective 1.3 Given a network-based threat, implement or recommend the appropriate response and countermeasure.
Objective 1.4 Explain the purpose of practices used to secure a corporate environment.

Day 2 (Tuesday)
  • Review – Day 1

  • Module 1 Completion
Objective 1.4 Explain the purpose of practices used to secure a corporate environment.

  • Module 2 – Domain2 Vulnerability Management
Objective 2.1 Given a scenario, implement an information security vulnerability management process.
Objective 2.2 Given a scenario, analyze the output resulting from a vulnerability scan.
Objective 2.3 Compare and contrast common vulnerabilities found in the following targets within an organization.

Day 3 (Wednesday)
  • Review – Day 2

  • Module 3 – Domain 3 – Cyber Incident Response
Objective 3.1 Given a scenario, distinguish threat data or behavior to determine the impact of an incident.
Objective 3.2 Given a scenario, prepare a toolkit and use appropriate forensics tools during an investigation.
Objective 3.3 Explain the importance of communication during the incident response process.
Objective 3.4 Given a scenario, analyze common symptoms to select the best course of action to support incident response.
Objective 3.5 Summarize the incident recovery and post-incident response process.

Day 4 (Thursday)
  • Review – Day 3

  • Module 4 – Domain 4 – Security Architecture and Tool Sets
Objective 4.1 Explain the relationship between frameworks, common policies, controls, and procedures.
Objective 4.2 Given a scenario, use data to recommend remediation of security issues related to identity and access management.
Objective 4.3 Given a scenario, review security architecture and make recommendations to implement compensating controls.
Objective 4.4 Given a scenario, use application security best practices while participating in the Software Development Life Cycle (SDLC).
Objective 4.5 Compare and contrast the general purpose and reasons for using various cybersecurity tools and technologies.

Day 5 (Friday)
  • Review
  • Module 4 Completion
  • Course Review
  • Final Exam

Certification

CSA+ exam vouchers will be provided to all participants that qualify. To qualify, you must 1) attend the class, 2) register your school as a CompTIA Academic partner (if you are not already), 3) register for the CompTIA Instructor Network.

Please note that content is subject to change or modification based on the unique needs of the track participants in attendance.