Length of Program: 8-9 months (720 hours) - Credential: Certificate

Program Description
This program has been designed with the professional certification CompTIA CySA+. This certification focuses on the candidate’s ability to not only proactively capture, monitor, and respond to network traffic findings, but also emphasizes software and application security, automation, threat hunting, and IT regulatory compliance, which affects the daily work of security analysts. CompTIA CySA+ covers the most up-to-date core security analyst skills and upcoming job skills used by threat intelligence analysts, application security analysts, compliance analysts, incident responders/handlers, and threat hunters, bringing new techniques for combating threats inside and outside of the Security Operations Center (SOC).

General Objectives
At the end of the program, then student will:
1. Threat and Vulnerability Management
• Explain the importance of threat data and intelligence.
• Given a scenario, utilize threat intelligence to support organizational security.
• Given a scenario, perform vulnerability management activities.
• Given a scenario, analyze the output from common vulnerability assessment tools.
• Explain the threats and vulnerabilities associated with specialized technology.
• Explain the threats and vulnerabilities associated with operating in the cloud.
• Given a scenario, implement controls to mitigate attacks and software vulnerabilities.

2. Software and Systems Security
• Given a scenario, apply security solutions or infrastructure management.
• Explain software assurance best practices.
• Explain hardware assurance best practices.

3. Security Operations and Monitoring
• Given a scenario, analyze data as part of security monitoring activities.
• Given a scenario, implement configuration changes to existing controls to improve security.
• Explain the importance of proactive threat hunting.
• Compare and contrast automation concepts and technologies.

4. Incident Response
• Explain the importance of the incident response process.
• Given a scenario, apply the appropriate incident response procedure.
• Given an incident, analyze potential indicators of compromise.
• Given a scenario, utilize basic digital forensics techniques.

5. Compliance and Assessment

• Understand the importance of data privacy and protection.
• Given a scenario, apply security concepts in support of organizational risk mitigation.
• Explain the importance of frameworks, policies, procedures, and controls.