Skip to content
Analyst sitting at desk in cybersecurity lab

PLA CompTIA Cybersecurity Analyst CySA+

E-Learning

The PLA Cybersecurity Analyst CySA+ course is fully funded for those eligible for PLA funding.

The CompTIA Cybersecurity Analyst CySA+ is a globally recognised certification that validates your ability to capture, monitor and respond to network security threats. By undertaking this course, you’ll gain critical knowledge of cybersecurity threats, security architecture, risk management, and incident response.

The CompTIA CySA+ is a comprehensive e-learning programme including lessons and practical activities which you can revisit as often as required.

The programme requires approximately 37.5 hours, accessed flexibly in line with personal study patterns.

Delegates will have 6 months to complete from enrolment date.

CompTIA Cybersecurity Analyst CySA+ (Including Exam)

Cybersecurity Analyst
Cyber Security Analyst

Delivery Method: Self Study via E-Learning Platform

Learning Hours: Approximately 37.5 hours

Prerequisites: CompTIA recommends the equivalent to 4 years of hands-on experience as an incident response analyst or security operations centre (SOC) analyst, or equivalent experience.

Security Operations

Improve processes in security operations and differentiate between threat intelligence and threat hunting concepts; identify and analyse malicious activity using the appropriate tools and techniques

Vulnerability Management

Implement and analyse vulnerability assessments, prioritize vulnerabilities and make recommendations on mitigating attacks and vulnerability response

Incident Response and Management

Apply updated concepts of attack methodology frameworks, perform incident response activities and understand the incident management lifecycle

Reporting and Communication

Apply communication best practices in vulnerability management and incident response as it relates to stakeholders, action plans, escalation and metrics

Lesson 1: Understanding Vulnerability Response, Handling, and Management

Lesson 2: Exploring Threat Intelligence and Threat Hunting Concepts

Lesson 3: Explaining Important System and Network Architecture Concepts

Lesson 4: Understanding Process Improvement in Security Operations

Lesson 5: Implementing Vulnerability Scanning Methods

Lesson 6: Performing Vulnerability Analysis

Lesson 7: Communicating Vulnerability Information

Lesson 8: Explaining Incident Response Activities

Lesson 9: Demonstrating Incident Response Communication

Lesson 10: Applying Tools to Identify Malicious Activity

Lesson 11: Analysing Potentially Malicious Activity

Lesson 12: Understanding Application Vulnerability Assessment

Lesson 13: Exploring Scripting Tools and Analysis Concepts

Lesson 14: Understanding Application Security and Attack Mitigation Best Practices

Assisted Lab: Exploring the Lab Environment

Assisted Lab: Configuring Controls

Assisted Lab: Reviewing IoC and Threat Intelligence Sources

Assisted Lab: Performing Threat Hunting

Assisted Lab: Configuring Centralized Logging

APPLIED LAB: Performing System Hardening

Assisted Lab: Assess Time Synch Errors

Assisted Lab: Configuring Automation

Assisted Lab: Performing Asset Discovery

Assisted Lab: Performing Vulnerability Scanning

Assisted Lab: Performing Passive Scanning

Assisted Lab: Establishing Context Awareness

Assisted Lab: Analysing Vulnerability Reports

Assisted Lab: Detecting Legacy Systems

APPLIED LAB: Performing Post-Incident Forensic Analysis

APPLIED LAB: Performing IoC Detection and Analysis

ADAPTIVE LAB: Performing Playbook Incident Response

APPLIED LAB: Collecting Forensic Evidence

Assisted Lab: Performing Root Cause Analysis

APPLIED LAB: Using Network Sniffers

APPLIED LAB: Researching DNS and IP Reputation

Assisted Lab: Using File Analysis Techniques

Assisted Lab: Analysing Potentially Malicious Files

Assisted Lab: Using Nontraditional Vulnerability Scanning Tools

APPLIED LAB: Performing Web Vulnerability Scanning

Assisted Lab: Exploiting Weak Cryptography

Assisted Lab: Performing and Detecting Directory Traversal and Command Injection

Assisted Lab: Performing and Detecting Privilege Escalation

Assisted Lab: Performing and Detecting XSS

Assisted Lab: Performing and Detecting LFI/RFI

Assisted Lab: Performing and Detecting SQLi

Assisted Lab: Performing and Detecting CSRF

APPLIED LAB: Detecting and Exploiting Security Misconfiguration

Exam Voucher

You will receive an exam voucher to undertake the Cyber Security Analyst CySA+ (CS0-003) exam with Pearson Vue. The exam can be taken online or by registering to attend your nearest Pearson Vue testing centre (details available when booking with Pearson Vue)

CertMaster revision and test preparation

To prepare for your examination you will be provided access to the CompTia CertMaster platform which allows you to practice exam style questions and performance tasks and will provide insights into areas for review, revision and practice.

Exam

The exam is a combination of multiple choice and performance task based questions

A maximum of 85 questions to complete in 165 minutes

Pass mark is 750 out of a possible 900 marks

Apply for your PLA funded course today

ALS PLA funded courses are provided in partnership with Cardiff and Vale College. Click the button below to visit the Cardiff and Vale website to begin your application process