U heeft geen artikelen in uw winkelwagen
CompTIA CompTIA CySA+ Cybersecurity Analyst Cysa+ CS0-001  E-learning
CompTIA CySA+ Cybersecurity Analyst Cysa+ CS0-001 E-learning

Goedkoper ergens anders?

Laat het ons weten!

+31367601019 [email protected]

CompTIA CySA+ Cybersecurity Analyst Cysa+ CS0-001 E-learning

Merk: CompTIA
€299,00 Excl. btw
€361,79 Incl. btw
Op voorraad
Bestel voor 16:00 uur en start vandaag.
Je hebt nog counting... uur
  • Gecertificeerde docenten
  • Beste opleider 2019
  • Cursist staat centraal

E-learning training CompTIA Cybersecurity Analyst CySA+ CS0-001

Deze OEM Cert Kit bevat de volgende volledige Elearning cursussen:

CompTIA Cybersecurity Analyst+ CS0-001: Network Architecture and Reconnaissance

  • start the course
  • map network hardware and software to the OSI model
  • identify when to use specific network hardware
  • understand IPv4 settings
  • understand IPv6 settings
  • understand transport protocols
  • understand which Windows tools to use when configuring and troubleshooting TCP/IP
  • understand which Linux tools to use when configuring and troubleshooting TCP/IP
  • configure and scan for service ports
  • configure network services securely
  • explain common wired and wireless network concepts
  • scan for wireless networks and understand the returned results
  • determine placement of network devices
  • explain the purpose of cloud computing
  • recognize the use of cloud service models
  • recognize the role of virtualization in cloud computing
  • identify cloud security options
  • explain how to discover network devices
  • use logs to learn about the network environment
  • use packet capturing tools for network traffic analysis
  • capture and interpret FTP and HTTP traffic
  • discover network configurations
  • explain harvesting techniques
  • recognize social engineering techniques
  • identify details within acceptable use policies
  • identify details within data ownership and retention policies
  • identify details within data classification policies
  • identify details within a password policy
  • recognize various network configurations and perform network reconnaissance

CompTIA Cybersecurity Analyst+ CS0-001: Threat Identification

  • start the course
  • identify assets and related threats
  • recognize known, unknown persistent, and zero-day threats
  • identify what constitutes PII
  • explain payment card data
  • identify intellectual property
  • control how valuable data is used
  • configure group policy to prevent data leakage
  • determine the effect of negative incidents
  • identify stakeholders related to incident response
  • recognize incident response roles
  • describe incident disclosure options
  • analyze host symptoms to determine the best response
  • analyze network symptoms to determine the best response
  • analyze application symptoms to determine the best response
  • contain negative incidents
  • thoroughly remove data
  • identify positive learned outcomes resulting from incidents
  • identify how OEM documentation can be used to reverse engineering products
  • recognize the relevance of up-to-date network documentation
  • recognize the ongoing maintenance of incident response plans
  • create proper incident forms
  • protect the integrity of collected evidence
  • implement changes to processes resulting from lessons learned
  • determine which type of report provides the best data for a specific situation
  • determine if SLA details are aligned with business needs
  • explain the purpose of a MOU
  • use existing inventory to drive decisions related to security
  • recognize threat impact and design an incident response plan

CompTIA Cybersecurity Analyst+ CS0-001: Threat Mitigation

  • start the course
  • identify SDLC phases
  • apply secure coding practices
  • properly test technology solutions for security
  • reduce the attack surface of a network host
  • recognize the importance of keeping hardware and software up to date
  • apply patches properly to secure network hosts
  • set the correct access to file systems while adhering to the principle of least privilege
  • recognize the purpose of controlling network access with NAC
  • recognize the purpose of network segregation using VLANs
  • identify various conditions that control access to resources
  • recognize the purpose of intentionally creating vulnerable hosts to monitor malicious use
  • recognize the purpose of a jump box
  • explain how proper IT governance results in secured IT resources
  • recognize how regulatory compliance can influence security controls
  • apply NIST's Cybersecurity Framework to your digital assets
  • apply ISO security standards to harden your environment
  • recognize how the TOGAF enterprise IT architecture can increase efficiency of security controls
  • recognize how to assess risk and apply effective security controls to mitigate that risk
  • recognize how to apply ITIL to increase the efficiency of IT service delivery
  • identify physical security controls
  • identify logical security controls
  • configure router ACL rules to block ICMP traffic
  • identify administrative security controls
  • identify compensating security controls
  • recognize the importance of continuous monitoring
  • explain how firmware must be accredited before universal trust is established
  • identify factors related to conducting penetration tests
  • list categories of security controls and threat mitigations

CompTIA Cybersecurity Analyst+ CS0-001: Reducing Vulnerabilities

  • start the course
  • recognize how crypto is used to secure data in the enterprise
  • differentiate symmetric from asymmetric encryption
  • differentiate asymmetric from symmetric encryption
  • identify the PKI hierarchy
  • request a security certificate from a CA
  • encrypt files on a Windows system using EFS
  • explain how file integrity can be maintained
  • enable file integrity using Linux
  • enable file integrity using Windows
  • recognize authentication methods used to prove one's identity
  • require VPN connections to use MFA
  • recognize how resource access gets authorized
  • configure centralized authentication using RADIUS
  • describe what user provisioning entails
  • describe how identity federation differs from traditional authentication
  • identify security weaknesses in server OSs
  • identify security weaknesses on endpoint devices
  • identify security weaknesses at the network level
  • identify security weaknesses on mobile devices
  • recognize the overall process of scanning for vulnerabilities
  • configure appropriate vulnerability scanning settings
  • explain how the SCAP standard is used to measure vulnerability issues and compliance
  • conduct a vulnerability scan using Nessus
  • distinguish various vulnerability scanning tools from one another
  • conduct a vulnerability scan using MBSA
  • understand vulnerability scan results
  • put controls in place to mitigate threats
  • reduce vulnerabilities that can be exploited

CompTIA Cybersecurity Analyst+ CS0-001: Investigate Security Incidents

  • start the course
  • recognize the purpose of various firewall types
  • recognize how firewall rules are created based on what type of traffic should or should not be allowed
  • recognize how packet filters work
  • configure a packet filtering firewall
  • explain the purpose of a proxy server
  • explain the purpose of a security appliance
  • recognize the unique capabilities of web application firewalls
  • explain the importance of intrusion detection and prevention
  • recognize when to use HIDS
  • recognize when to use NIDS
  • recognize when to use NIPS
  • identify different types of malware
  • identify viruses
  • identify worms
  • identity spyware and adware
  • explain how ransomware works
  • mitigate malware using antimalware solutions
  • explain why user training and awareness is one of the most important security defenses
  • describe digital forensics
  • determine which forensic hardware is best suited for a specific situation
  • determine which forensic software is best suited for a specific situation
  • explain how forensic tools can be used against data stored on media
  • distinguish common forensic tools from one another
  • explain the sequence of steps that should be followed when conducting mobile device forensics
  • create a memory dump
  • retrieve and view deleted files
  • prevent threat materialization and follow proper forensic procedures

CompTIA Cybersecurity Analyst+ CS0-001: Monitoring for Security Issues

  • start the course
  • recognize proper hiring practices
  • provision new user accounts in accordance with organizational security policies
  • apply personnel management best practices
  • distinguish the difference between threats, vulnerabilities, and exploits
  • explain the concept of spoofing
  • craft forged packets using free tools
  • recognize how impersonation can be used to gain unauthorized access
  • recognize CSS attacks
  • recognize root kits
  • explain the concept of privilege escalation
  • distinguish the difference between common exploit tools
  • use Metasploit tools to further understand the attacker toolset
  • use Kali Linux tools to further understand the attacker toolset
  • crack passwords
  • recognize the importance of continuous monitoring of various systems
  • distinguish the difference between common monitoring tools
  • monitor the Linux OS
  • monitor the Windows OS
  • configure Windows event log forwarding
  • identify where SIEM is used
  • identify where SCADA and ICS are used in different industries
  • view network utilization
  • analyze timestamped data from various sources
  • identify trends in network usage
  • identify events from specific types of logs
  • describe the difference between vulnerabilities and exploits as well as use various reporting tools

TestPrep CS0-001 CompTIA Cybersecurity Analyst (CySA+)Test your knowledge on the skills and competencies measured by the vendor certification exam. TestPrep can be taken in either Study or Certification mode. Study mode is designed to maximize learning by not only testing your knowledge of the material, but also by providing additional information on the topics presented. Certification mode is designed to test your knowledge of the material within a structured testing environment, providing valuable feedback at the end of the test.


Snel En Voordelig Certificeren?

Nieuw: OEM Cert Kit© Het beste All In alternatief voor de klassikale training.

Unieke Methode, ….. Snel, efficiënt en in je eigen tempo je Certificeringen halen met behulp van de unieke OEM Cert Kit© inclusief:

E-learning (video-gebaseerde)

E-Learning is de hoeksteen van OEM Cert Kit, het biedt een grondige leerervaring door eigenschappen te integreren die zijn ontworpen om jouw productvaardigheid en productiviteit te verbeteren. Het E-Learning is ontworpen om je te helpen je doel te bereiken, of het nu gaat om je vaardigheden bij te werken of voor een certificaat examen voor te bereiden.
De E-Learning is actief gedurende 360 dagen na de activering

Examen Quiz

Exam Quiz helpt je om de kennis die je hebt verkregen via het E-Learning te testen. Voltooi de quizzen om een overzicht te krijgen van welke gebieden je moet werken om het examen te behalen.
Exam Quiz is actief gedurende 360 dagen na de activering!

Online Mentor

De Online Mentor kan al jouw specifieke technische vragen beantwoorden met betrekking tot uw studie subject.
Online Mentor is actief voor 360 dagen na de activering!

Live Labs (indien beschikbaar)

Met de GetCertified Live Labs kan je 24/7 in een live omgeving beoefenen.


Examensimulatie is een testinstrument waarmee je kennis wordt getoetst aan de vaardigheden en competenties die worden gemeten door het certificaat examen van de verkoper. Examensimulatie kan in de studie- of certificeringsmodus worden ingezet.
Examen Simulatie is actief gedurende 60 dagen - na activering!

Tips en Trucs

Onder Tips & Tricks vindt je informatie die voor jou nuttig kan zijn tijdens je studie. Je vindt informatie over het examen waarmee je werkt, samen met algemene studienotities, examen tips en een verzameling artikelen en links die verband houden met uw studie.
Tips en trucs is actief gedurende 360 dagen na activering

Nog een keer alle voordelen op een rij:

Direct beginnen, dus niet wachten tot er een training gaat beginnen en.. deze gaan altijd door! :)
Je krijgt de lesstof niet één keer aangeboden zoals bij een klassikale training maar een jaar lang net zo vaak als jij wilt.
Door onze samenwerking met Global Mentoring, meer persoonlijke aandacht van Gecertificeerde Trainers dan bij een klassikale training
Je kunt ze 24/7 onbeperkt om hulp en begeleiding vragen waarbij ze zo nodig je scherm overnemen om alles met je door te lopen.
Unieke Live Labs waarmee je 24/7 kunt oefenen *)
Studeren wanneer je wilt, waar je wilt en hoe vaak je wilt zonder op anderen te hoeven wachten.
Geen uren in de file of maanden wachten op de volgende training en maar hopen dat het deze keer wel doorgaat.
Gratis de Officiële door Microsoft aanbevolen MeasureUp oefenexamens.
Tips, tricks, forum en links afdeling

En dat alles voor een fractie van de kosten van een klassikale training
Wilt U meer informatie over OEM Cert Kit? Neem contact op.

Heeft u niet gevonden wat u zocht?
Laat ons helpen!
Algemene eigenschappen
Levertijd: Binnen 1 werkdag
Online toegang: Standaard 12 maanden
Lesduur: variabel
Studiebelasting: Variabel i.v.m. praktijkopdrachten.
Leermethoden: Instructie video, Demonstratie video, Knowledge Base
Besturingssystemen: Microsoft Windows, Google Chrome OS, Apple MacOS
Inbegrepen dienstverlening: Contact met docent per mail en chat, Voortgangsrapportage, 24/7 online toegang
Ondersteunde browsers: Internet Explorer, Edge, Firefox, Safari en Chrome
Certificering: Mogelijk voor bijbehorend examennummer
Toegang tot docent: Per mail en chat
Extra Opties: Virtual Labs (indien beschikbaar)
average of 0 review(s)
Geen reviews gevonden
Help ons en andere klanten door het schrijven van een review
Schrijf uw beoordeling!

Wij slaan cookies op om onze website te verbeteren. Is dat akkoord? Ja Nee Meer over cookies »