TOTAL: CompTIA CySA+ Cybersecurity Analyst (CS0-003)
- Description
- Curriculum
- FAQ
- Reviews
Welcome to TOTAL: CompTIA CySA+ Cybersecurity Analyst (CS0-003) course from Total Seminars and Khet Kendrick!
Are you looking to get into the exciting world of hackers, cybersecurity, threat hunting, and digital forensics? Do you find the idea of gathering and analyzing intelligence to detect and combat hackers intriguing? Then this is the course for you!
This course is aimed at the aspirational junior analyst looking to step up in their career. However, if your tech skills don’t include cybersecurity, you can also gain a great deal of knowledge from this course to help launch yourself towards a career in cybersecurity.
This course covers everything you need to know to respond to cybersecurity threats and attacks. You’ll learn how to:
Leverage intelligence and threat detection techniques
Analyze and interpret data
Identify and address vulnerabilities
Suggest preventative measures
Effectively respond to and recover from incidents
Analyze the results of network reconnaissance, and recommend or implement countermeasures
Secure a corporate environment
If you’re looking to get certified, this course will also help prepare you for the CompTIA CySA+ Certification (CS0-003) exam. This exam will retire on December 3, 2026. The first goal of the course is to make you an outstanding cybersecurity analyst and, in the process, make sure you are ready to pass the CompTIA exam.
THE COMPTIA CYSA+ (CS0-003) EXAM DOMAINS:
1.0 Security Operations (33% of the exam)
2.0 Vulnerability Management (30% of the exam)
3.0 Incident Response and Management (20% of the exam)
4.0 Reporting and Communication (17% of the exam)
TOPICS INCLUDE:
Threat data and intelligence
Vulnerability management with mobile, IoT, the cloud, and more
Security solutions for your network and in the cloud
Identity and access management (IAM)
Software and hardware best practices
Analyzing data using heuristics, trend analysis, and log review
Implementing intrusion prevention systems (IPS) and intrusion detection systems (IDS)
Threat hunting
Automation concepts like workflow orchestration, machine learning, scripting, API integration, and SCAP
Incident response process
Digital forensics
Controls, policies, frameworks, and procedures to protect data and secure networks
Business impact analysis and organizational risk mitigation
CAREERS THAT USE THE CYSA+ CERTIFICATION:
Security analyst
Tier II SOC analyst
Security monitoring
Security engineer
Threat hunter
Incident response or handler
Threat intelligence analyst
Application security analyst
Compliance analyst
CySA+ provides substantial earnings potential
A career in information security analysis ranked 5th on U.S. News and World Report’s list of the 100 best technology jobs for 2020. According to the Bureau of Labor Statistics, the median pay for an information security analyst is $90,120 per year*.
CySA+ certified skills are in-demand
Properly trained IT security staff who can analyze, monitor and protect cybersecurity resources are in high demand. The U.S. Bureau of Labor Statistics (BLS) predicts that information security analysts will be the fastest-growing overall job category, with 37 percent overall growth between 2012 and 2022.
Khet Kendrick
Follow the CompTIA Cybersecurity Certification Pathway
IT Fundamentals > A+ > Network+ > Security+ > PenTest+ or CySA+ > CASP
-
1Introduction to the CompTIA CySA+ (CS0-003) Exam Course
In this series, Khet will teach you the knowledge you need to be a CompTIA CySA+ certified Cybersecurity Analyst.
-
2How to Take Your CompTIA CySA+ Exam
This episode covers the details of the exam as well as the recommended experience.
-
3Kali Linux Install
Learn how to install Kali Linux!
-
4Logging
Khet will discuss logging and how this applies to system and network architecture.
-
5Operating System Concepts
As an analyst, you will be required to understand basic operating functions along with how they interact with different security systems in your network. Understanding the characteristics of these operating system concepts will help you further your CySA knowledge.
-
6Infrastructure Concepts
In this episode you will learn all about infrastructure concepts.
-
7Network Architecture, Part 1
Network components can be all over the place, both physically and logically. You have to understand how your network nodes are physically connected and logically organized to secure them from attack.
-
8Network Architecture, Part 2
Network components can be all over the place, both physically and logically. You have to understand how your network nodes are physically connected and logically organized to secure them from attack.
-
9Identity and Access Management (IAM)
You can’t restrict resource access to authorized users unless you can identify valid users. Identity management lets you know who is valid and who is not.
-
10Encryption
Defensive security isn’t enough to stay safe. You must actively protect sensitive data from attacks instead of just reacting to attacks.
-
11Sensitive Information Protection
Sensitive information should always be the forefront of your mind as a security analyst. This episode covers the protection of sensitive information, including concepts like PII, PHI, cardholder data, and data loss prevention.
-
12Chapter 1 Quiz
-
13Standardized Processes
With all of the rapidly changing security data available, the task of making sense of it becomes more and more difficult. Standards and protocols help to build automation tools to carry out many of the repetitive tasks efficiently.
-
14Streamlined Operations
In this episode, you will learn how to streamline operations with SOAR as well as other processes and tasks involving the human element.
-
15Technology and Tool Integration
Technology and tools are constantly evolving in the realm of cyber security. This episode will give a high level overview of scripting, API's, webhooks, and plugins related to technology and tool integrations.
-
16Chapter 2 Quiz
-
19Network Symptoms
Learn to find common network symptoms of compromise to enable quick response times.
-
20Host Symptoms
Learn to use built-in tools to find common host symptoms of compromise.
-
21Application Symptoms
Discover various tools to pin-point application symptoms of compromise.
-
22Social Engineering
Learn what you will need to know about social engineering and how this relates to the CySA exam.
-
23Pattern Recognition
This episode covers pattern recognition and why it's important as a CySA analyst to use pattern recognition.
-
24Chapter 4 Quiz
-
25Network Analysis Tools
Learn to use various tools and detection methodologies to detect malicious activities on your network.
-
26Log Analysis (SIEM and SOAR)
As a cybersecurity analyst, your bread and butter will be SIEM and SOAR. Learn about log analysis of these two systems.
-
27A Day in the Life of a Cybersecurity Analyst
Have a sit-down chat with Richard Chapman of CyberNowLabs to talk about a day in the life of a cybersecurity analyst.
-
28Enterprise SOC Tools
Have a sit-down chat with Richard Chapman of CyberNowLabs about the different tools you will find in a security operations center.
-
29File Analysis
In this episode, we will talk about file analysis and how to go through the process of identifying malware and appropriately responding to it.
-
30Email Analysis
Learn what the CySA exam wants you to understand about email analysis and how to properly identify emails from suspiscious sources.
-
31Sandboxing
Sandboxing is the art of moving something like software into a position where it truly can't communicate with anything else on your system. In this episode, we will talk about how malware can be tested and identified in an environment where it can't cause harm to the rest of your network.
-
32User Behavior Analysis
Learn how to look at user behavior analysis and entity behavior analysis. Identifying what users are doing on our networks can help keep you alert for any suspicious behavior that may occur under your watch.
-
33Programming Languages
This episode covers the wonderful world of programming languages!
-
34Chapter 5 Quiz
-
35Wireshark Demo
Learn what is required in Wireshark for the CySA exam in a short and condensed package.
-
36WHOIS and AbuseIPDB Demo
Review what you need to understand with WHOIS and AbuseIPDB.
-
37Strings Demo
Dive into a demo of Strings, an essential utility of cyber security to analyze binary and executable files for human-readable text.
-
38Hashing Demo
Learn how to use hashing and how it is utilized in system analysis.
-
39Joe Sandbox Demo
Joe Sandbox is an advanced tool designed to help you analyze files or URLs that you suspect might contain malware or have malicious intent.
-
40Chapter 6 Quiz
-
41Threat Actors
No human can manually monitor multiple systems and devices 24/7 to catch attacks from random sources. Automated monitors help to identify threat actors and Indicators of Compromise (IoC). These automated monitors not only make security easier, they also make it possible.
-
42Supply, TTP, and Intelligence
The supply chain is often overlooked when it comes to security. It’s important to evaluate your vendors to ensure there are no vulnerabilities in their systems that could lead to an open backdoor to yours.
-
43Collection Methods
Learn how collection tools can be used to expose areas in your network that need to be hardened.
-
44Chapter 7 Quiz
-
45Fundamentals of Threat Intelligence
You can’t mount a good defense without understanding the threats that exist. Threat intelligence helps you identify the likely threats to your environment so you can prepare the best defense.
-
46Threat Modeling
Knowing about threats isn’t enough. You also need to know where to look for threats in your environment and how to identify them before you can protect against them.
-
47Risk and Vulnerability Management
A risk is the possibility that a threat may be realized. Understanding risks and how to stop them from being realized is the basis for hardening IT environments.
-
48Threat Hunting
Being reactive to security can only take you so far. Proactive security activities, such as threat hunting, make it possible to go on the offense to protect your environments.
-
49Integrating Vulnerability Management with Threat Hunting
Haphazard threat hunting won’t yield many good results. Following a well-established process increases the probability of success. Threat hunting is fun, but doesn’t do much good unless results are shared and acted upon. Threat results that trigger action can make environments much more resistant to attack.
-
50Chapter 8 Quiz
-
51Asset Discovery
Network components can be all over the place, both physically and logically. You have to understand how your network nodes are physically connected and logically organized to secure them from attack.
-
52Industry Frameworks
Learn about the various best practices frameworks available for security implementation.
-
53Critical Infrastructure
As a cybersecurity analyst, we often have to deal with aspects of our environment and security that are critical in nature. Understand critical infrastructure, operational technology that corresponds with critical infrastructure, industrial control systems (ICS), and SCADA depending on where you are in the world.
-
54Vulnerability Identification and Scanning
Understanding threats is a good first step, but you need to know the vulnerabilities that could let an attacker into your environment. You have to search for vulnerabilities and mitigate each one to protect the network from potential threats.
-
55Special Considerations
All scans are not the same. Understanding the specifics and nuances of a network environment can produce better results while avoiding many common issues.
-
56Software Vulnerability Assessment
Learn how about software vulnerability assessment from a cybersecurity analyst perspective.
-
57Chapter 9 Quiz
-
58Scanning Tools
Network components can be all over the place, both physically and logically. You have to understand how your network nodes are physically connected and logically organized to secure them from attack.
-
59Angry IP Demo
Learn about the various best practices frameworks available for security implementation.
-
60Maltego Demo
Dive into Maltego and try to get a better understanding of how to use this system.
-
61Web Scanning Tools
Web Application and Vulnerability scanners are used to search servers, websites, or other applications on the internet for vulnerabilities. Learn about Nikto, Zed Attack Proxy (ZAP), Arachni, and lastly Burp Suite.
-
62Nikto Demo
In this episode, we will learn about Nikto as a vulnerability assessment tool.
-
63OWASP ZAP Demo
Learn to use OWASP ZAP as a vulnerability assessment tool.
-
64Arachni Demo
Learn how Arachni as a vulnerability assessment tool can help evaluate the security of web applications.
-
65Burp Suite Demo
In this episode, dive into the capabilities of Burp Suite.
-
66Vulnerability Scanning Tools
Use vulnerability analysis tools to quickly see areas of weakness, along with the available resources and solutions to address the issues.
-
67Nessus Demo
Learn about Nesus abilities as a vulnerability scanning tool.
-
68OpenVAS Demo
In this episode, we will dive into OPENVAS as a vulnerability scanning tool.
-
69Debugger Tools
Debuggers are tools in cybersecurity that provide a way to look at the internal workings of a program. This will help us identify different bugs and crashes to identify vulnerabilities in our programs.
-
70Multipurpose Tools
There are many different multipurpose tools to help you on your cybersecurity journey. We will review several of these tools in this episode.
-
71Cloud Tools
Don’t forget about your cloud services and data. A good vulnerability assessment should include all cloud components as well as on-premises devices and computers.
-
72Chapter 10 Quiz
-
73Validation
You can’t trust all results. Not every alarm is a cause for concern. You must validate all results before making any decisions.
-
74Prioritization
Some exploits are more harmful then others. When it comes to prioritization of exploits, we need to have a grasp of how quickly and how much cost we should dedicate to fixing that vulnerability. This episode will cover the prioritization of exploits and when to address them.
-
75Context Awareness
Context awareness helps you prioritize critical components and vulnerabilities. This involves knowing the who, what, when, where, and how the vulnerabilities affect your system so you can understand which threats are the highest priority.
-
76Chapter 11 Quiz
-
77Injection Attacks
Injection attacks are malicious actions involving inputs of untrusted data into an interpreter for evaluation, forcing the system to trigger the operation of the script. On most websites, there is places to input information such as emails or passwords. In this episode, we will learn more about injection attacks and how they can affect our systems.
-
78Overflow Attacks
Overflow attacks are used by malware to target the primary functions of our computers. This episodes details how these attacks work.
-
79Attack Mitigation, Part 1
In this episode, we will learn about data poisoning, broken access controls, and mitigations of attacks on our systems.
-
80Attack Mitigation, Part 2
We continue our discussion of mitigation with the security risks of end-of-life components, identification and authentication failures, and other various attack mitigation strategies for our systems.
-
81Chapter 12 Quiz