Study any time, from any device.

Get CompTIA CySA+ Certified

The CompTIA Cybersecurity Analyst (CySA+) certification path teaches you how to use behavioral analytics to prevent, detect and combat cyber threats. You'll learn how to configure and use threat detection tools, perform data analysis to identify threats and secure applications and systems.

17 courses  //   118 videos  //   10 hours of training

CompTIA CySA+ training

This learning path teaches you the tools and techniques used by cybersecurity analysts and prepares you for the CySA+ exam. Seventeen courses build on your existing security knowledge and walk you through the key concepts covered in the four CySA+ certification exam objectives: threat management, vulnerability management, cyber incident response and security architecture and tools. Upon completion, you’ll be prepared to earn your CySA+ certification and validate your skills as a cybersecurity analyst.

Learning path components

CySA+ Custom Practice Exam
Practice Exam
CySA+ Custom Practice Exam

CySA+ Custom Practice Exam

Prepare for your CompTIA CySA+ exam and test your domain knowledge.

Number of questions: 150

Introduction to CySA+
Course
Introduction to CySA+

Introduction to CySA+

This two-video course is a brief introduction to the CySA+ course pathway, including the four CySA+ domains.

2 videos
8 minutes of training

Introduction to Threat Management
Course
Introduction to Threat Management

Introduction to Threat Management

Explore threat management with nine videos on key concepts such as the CIA triad, risk management controls and more.

9 videos
40 minutes of training

Network Based Threats
Course
Network Based Threats

Network Based Threats

Five videos give you a step up on network-based threats. Includes information on secure endpoint management, firewall types and types of risk controls.

5 videos
27 minutes of training

Securing Corporate Environment
Course
Securing Corporate Environment

Securing Corporate Environment

Refresh your knowledge of securing corporate environments, with a special focus on pentesting and analysis.

3 videos
16 minutes of training

Environmental Reconnaissance Techniques and Analysis
Course
Environmental Reconnaissance Techniques and Analysis

Environmental Reconnaissance Techniques and Analysis

Sixteen videos take you through the details of environmental reconnaissance techniques and analysis, including tools and vocabulary.

16 videos
58 minutes of training

Vulnerability Management Process
Course
Vulnerability Management Process

Vulnerability Management Process

Brush up on your knowledge of vulnerability management with fifteen videos on policy requirements, scanning and more.

15 videos
55 minutes of training

Analyzing Vulnerability Scan Results
Course
Analyzing Vulnerability Scan Results

Analyzing Vulnerability Scan Results

Five videos help you raise your knowledge of analyzing vulnerability scan results. Explore the details of CVSS, validation of results and more.

5 videos
28 minutes of training

Common Vulnerabilities
Course
Common Vulnerabilities

Common Vulnerabilities

Refresh your knowledge of common vulnerabilities with six videos on the many different types and sources of system weak spots.

6 videos
28 minutes of training

Incident Response Process
Course
Incident Response Process

Incident Response Process

The incident response process is explored in seven videos on incident response teams, security incidents, response phases and more.

7 videos
43 minutes of training

Analyzing Common Symptoms
Course
Analyzing Common Symptoms

Analyzing Common Symptoms

Six videos help you take your knowledge of common symptom analysis to the next level. Focuses on networks, servers and monitoring tools.

6 videos
35 minutes of training

Digital Forensics Tools and Investigation Techniques
Course
Digital Forensics Tools and Investigation Techniques

Digital Forensics Tools and Investigation Techniques

Learn more about digital forensic tools and investigation techniques with this seven-video course.

7 videos
33 minutes of training

Incident Recovery and Post-Incident Response Process
Course
Incident Recovery and Post-Incident Response Process

Incident Recovery and Post-Incident Response Process

Three videos explore incident recovery and the challenges of the post-incident response process.

3 videos
19 minutes of training

Frameworks, Policies, Controls and Procedures
Course
Frameworks, Policies, Controls and Procedures

Frameworks, Policies, Controls and Procedures

Explore more about security architecture with this course on frameworks, policies, controls and procedures.

8 videos
37 minutes of training

Security Architecture Review and Compensating Controls
Course
Security Architecture Review and Compensating Controls

Security Architecture Review and Compensating Controls

Seven videos take you through the details of security architecture review and compensating controls, including common issues, separation of duties, trend analysis and more.

7 videos
33 minutes of training

Identity and Access Management Security
Course
Identity and Access Management Security

Identity and Access Management Security

Eleven videos reintroduce you to the details of identity and access management security.

11 videos
60 minutes of training

Implementing Security Best Practices in SDLC
Course
Implementing Security Best Practices in SDLC

Implementing Security Best Practices in SDLC

Review and update your knowledge of implementing best practices in software development with six videos on coding for security, software development models and more.

6 videos
45 minutes of training

CySA+ Conclusion
Course
CySA+ Conclusion

CySA+ Conclusion

Top off your CySA+ study with a review of performance-based questions.

2 videos
19 minutes of training

 

What you’ll learn.

The CompTIA CySA+ certification exam includes four primary objectives:

  • Threat management
  • Vulnerability management
  • Cyber incident response
  • Security architecture and tool sets

Who is this for?

Three to four years of hands-on information security experience is recommended, as well as a Security+ or equivalent knowledge. This certification path is designed for:

  • Cybersecurity analysts
  • Cybersecurity specialists
  • Information security managers
  • Anyone looking to improve their analytics skills and earn an intermediate-level certification!

You're in good company

"Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I’ve had." 

James Coyle

FireEye, Inc.

"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."

Julian Tang

Chief Information Officer

"I’ve taken five boot camps with Infosec and all my instructors have been great."

Jeffrey Coa

Information Security Systems Officer

Plans & Pricing

Personal

$299

Annually

Teams

$599 / license

Annually. Volume discounts available. 10 license minimum.