Get CompTIA CySA+ Certified

The CompTIA Cybersecurity Analyst (CySA+) CS0-002 certification path teaches you how to use behavioral analytics to prevent, detect and combat cyber threats. You'll learn how to configure and use threat detection tools, perform data analysis to identify threats and secure applications and systems.

21 courses  //   91 videos  //   11 hours of training

Free training week — 1,200+ on-demand courses and hands-on labs

CompTIA CySA+ training

This learning path teaches you the tools and techniques used by cybersecurity analysts and prepares you for the CySA+ CS0-002 exam. Twenty-one courses build on your existing security knowledge and walk you through the key concepts covered in the five CySA+ CS0-002 certification exam objectives: threat and vulnerability management, software and systems security, security operations and monitoring, incident response, and compliance and assessment. Upon completion, you’ll be prepared to earn your CySA+ certification and validate your skills as a cybersecurity analyst.

Learning path components

CySA+ Custom Practice Exam
Practice Exam
CySA+ Custom Practice Exam

CySA+ Custom Practice Exam

Prepare for your CompTIA CySA+ exam and test your domain knowledge.

Number of questions: 150

CompTIA CySA+ Skill Assessment
Assessment
CompTIA CySA+ Skill Assessment

CompTIA CySA+ Skill Assessment

See how your skills stack up against other professionals in your field.

Number of questions: 20

The Importance of Threat Data and Intelligence
Course
The Importance of Threat Data and Intelligence

The Importance of Threat Data and Intelligence

This course discusses intelligence sources and confidence levels and introduces other important threat analysis concepts, such as threat indicators and threat trends.

4 videos
29 minutes of training

Threat Intelligence in Support of Organizational Security
Course
Threat Intelligence in Support of Organizational Security

Threat Intelligence in Support of Organizational Security

This course explains how threat intelligence contributes to organizational security. It covers the use of attack frameworks, threat research, and threat modeling.

3 videos
23 minutes of training

Vulnerability Management Activities
Course
Vulnerability Management Activities

Vulnerability Management Activities

This course walks through the vulnerability management process, from vulnerability identification and scanning to validation and remediation.

5 videos
33 minutes of training

Vulnerability Assessment Tools
Course
Vulnerability Assessment Tools

Vulnerability Assessment Tools

This course discusses different types and uses of vulnerability assessment tools, including Web application scanners, wireless and cloud assessment tools, and tools related to preventative measures.

11 videos
92 minutes of training

Threats and Vulnerabilities Associated with Specialized Technology
Course
Threats and Vulnerabilities Associated with Specialized Technology

Threats and Vulnerabilities Associated with Specialized Technology

This course discusses intelligence sources and confidence levels and introduces other important threat analysis concepts, such as threat indicators and threat trends.

4 videos
37 minutes of training

Threats and Vulnerabilities Associated with Operating in the Cloud
Course
Threats and Vulnerabilities Associated with Operating in the Cloud

Threats and Vulnerabilities Associated with Operating in the Cloud

This course discusses intelligence sources and confidence levels and introduces other important threat analysis concepts, such as threat indicators and threat trends.

3 videos
23 minutes of training

Mitigating Controls for Attacks and Software Vulnerabilities
Course
Mitigating Controls for Attacks and Software Vulnerabilities

Mitigating Controls for Attacks and Software Vulnerabilities

This course provides an overview of common attacks on applications, including injection and overflow attacks, and explains effective mitigation strategies.

5 videos
39 minutes of training

Security Solutions for Infrastructure Management
Course
Security Solutions for Infrastructure Management

Security Solutions for Infrastructure Management

This course covers important infrastructure security topics, including secure network architecture, physical security, identity and access management, and more.

4 videos
32 minutes of training

Software Assurance Best Practices
Course
Software Assurance Best Practices

Software Assurance Best Practices

This course describes common software architecture types, introduces the concept of DevSecOps, and provides and overview of secure software development process and secure coding practices.

4 videos
28 minutes of training

Hardware Assurance Best Practices
Course
Hardware Assurance Best Practices

Hardware Assurance Best Practices

This course discusses important topics related to hardware security, including trusted hardware, hardware encryption, secure processing, trusted foundry, and anti-tamper techniques.

3 videos
22 minutes of training

Data Analysis in Security Monitoring Activities
Course
Data Analysis in Security Monitoring Activities

Data Analysis in Security Monitoring Activities

This course goes into detail on security data sources, collection tools, and analysis techniques.

9 videos
75 minutes of training

Implement Configuration Changes to Existing Controls to Improve Security
Course
Implement Configuration Changes to Existing Controls to Improve Security

Implement Configuration Changes to Existing Controls to Improve Security

This course provides an overview of best practices for configuring file and resource permissions, firewalls and intrusion prevention systems, and endpoint security solutions.

4 videos
27 minutes of training

The Importance of Proactive Threat Hunting
Course
The Importance of Proactive Threat Hunting

The Importance of Proactive Threat Hunting

This course explains the concept of threat hunting and walks through the process and effective application of the results.

3 videos
18 minutes of training

Compare and Contrast Automation Concepts and Technologies
Course
Compare and Contrast Automation Concepts and Technologies

Compare and Contrast Automation Concepts and Technologies

This course explains the importance of automation in security and explains its common uses, including malware signature creation, analyzing threat feeds, and others.

4 videos
26 minutes of training

The Importance of the Incident Response Process
Course
The Importance of the Incident Response Process

The Importance of the Incident Response Process

This course highlights the importance of Incident Response, explaining roles and responsibilities and active preparation.

2 videos
18 minutes of training

Appropriate Incident Response Procedures
Course
Appropriate Incident Response Procedures

Appropriate Incident Response Procedures

This course walks through the phases of Incident Response and highlights the three key components: communication, analysis, and reporting.

1 video
7 minutes of training

Analyze Potential Indicators of Compromise
Course
Analyze Potential Indicators of Compromise

Analyze Potential Indicators of Compromise

This course explores the common network, host, and application symptoms that may indicate a compromise.

3 videos
16 minutes of training

Utilize Basic Digital Forensic Techniques
Course
Utilize Basic Digital Forensic Techniques

Utilize Basic Digital Forensic Techniques

This course discusses digital forensics, from the key principles, procedures and tools to the process of forensic analysis and mobile and cloud forensics.

7 videos
54 minutes of training

The Importance of Data Privacy and Protection
Course
The Importance of Data Privacy and Protection

The Importance of Data Privacy and Protection

This course explains the concept of data privacy and provides an overview of common technical and non-technical data security controls.

3 videos
23 minutes of training

Security Concepts in Support of Organizational Risk Mitigation
Course
Security Concepts in Support of Organizational Risk Mitigation

Security Concepts in Support of Organizational Risk Mitigation

This course explains important risk management topics, including Business Impact Analysis (BIA), risk identification, and the role of training and supply chain assessment.

5 videos
24 minutes of training

The Importance of Frameworks, Policies, Procedures, and Controls
Course
The Importance of Frameworks, Policies, Procedures, and Controls

The Importance of Frameworks, Policies, Procedures, and Controls

This course provides an overview of common cybersecurity frameworks, explains different types of security policies, procedures, and controls.

4 videos
31 minutes of training

 

What you’ll learn.

The CompTIA CySA+ certification exam includes five primary objectives:

  • Threat and vulnerability management
  • Software and systems security
  • Security operations and monitoring
  • Incident response
  • Compliance and assessment

Who is this for?

Three to four years of hands-on information security experience is recommended, as well as a Security+ or equivalent knowledge. This certification path is designed for:

  • Cybersecurity analysts
  • Cybersecurity specialists
  • Information security managers
  • Anyone looking to improve their analytics skills and earn an intermediate-level certification!

Meet the author

Michael G. Solomon

Michael G. Solomon, Ph.D., CISSP, PMP, CISM, is a security, privacy, blockchain, and data science author, consultant, and speaker who specializes in leading teams in achieving and maintaining secure and effective IT environments. Dr. Solomon has led project teams for many Fortune 500 companies and has authored and contributed to over 20 books and numerous served training courses.

From 1998 until 2001, he a Computer Science instructor in the Kennesaw State University’s Computer Science and Information Sciences (CSIS) department, is a Professor of Cyber Security and IT at the University of the Cumberlands and holds a Ph.D. in Computer Science and Informatics from Emory University.

Meet the author

Brent Chapman

Brent Chapman is the co-author of McGraw-Hill's CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide. He is an information security engineer with over 15 years of experience in information technology and cybersecurity.

Brent spent over ten years on active duty in the United States Army, where he served as an intelligence analyst, communications officer, network engineer, and cyber operations officer. As a researcher at the Army Cyber Institute (ACI), Brent explored emerging information security and cyber warfare issues with a focus on field-expedient solutions and countermeasures.

He held a number of unique assignments to include researcher and instructor at West Point. He was formerly assigned as a project manager at the Secretary of Defense's Defense Innovation Unit Experiment (DIUx) in Silicon Valley.

Plans & pricing

Personal
Teams

Infosec Skills subscription

Monthly
Annually
  • 140+ role-based learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support
  • Create custom learning paths from 100s of courses

Live boot camp

Request a quote for pricing

 

Request Quote Browse Boot Camps
  • Exam Pass Guarantee
    If you don’t pass your exam on the first attempt, you'll get a second attempt for free. Includes the ability to re-sit the course for free for up to one year.
  • 100% Satisfaction Guarantee
    If you’re not 100% satisfied with your training at the end of the first day, you may withdraw and enroll in a different online or in-person course.
  • Live, instructor-led training (in-person or live online)
  • 90 day extended access to recordings of daily lessons
  • Certification exam voucher
  • Learn by doing with hundreds of additional hands-on courses and labs

Infosec Skills Teams subscription

Annual

$599 per learner / year

Request Team Quote Free Team Trial
  • Team administration and reporting
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 140+ role-based learning paths (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Skill assessments
  • Create and assign custom learning paths
  • Dedicated client success manager

Live team boot camp

Request a quote for pricing

 

Request Team Quote Browse Boot Camps
  • Team boot camp administration and reporting
  • Exam Pass Guarantee
    If you don’t pass your exam on the first attempt, you'll get a second attempt for free. Includes the ability to re-sit the course for free for up to one year.
  • 100% Satisfaction Guarantee
    If you’re not 100% satisfied with your training at the end of the first day, you may withdraw and enroll in a different online or in-person course.
  • Knowledge Transfer Guarantee
    If an employee leaves within three months of obtaining certification, Infosec will train a different employee at the same organization tuition-free for up to one year.
  • Certification exam vouchers
  • Live, instructor-led training (onsite, in-person or live online)
  • 90 days extended access to recordings of daily lessons
  • Build your team's skills with hundreds of additional hands-on courses and labs

Award-winning training that you can trust

Technical Skills Development, Online Course Providers & eLearning Content

Technical Skills Development, Online Course Providers & eLearning Content

Infosec Skills

eLearning Content

eLearning Content

Infosec Skills

Best Product - Cybersecurity Training for Infosec Professionals

Best Product - Cybersecurity Training for Infosec Professionals

Infosec Skills

Security Education & Platform

Security Education & Platform

Infosec Skills

Ranked #52 in Top 100 Global Software Sellers

Ranked #52 in Top 100 Global Software Sellers

Infosec

Exceptional learning experiences powered by LX Labs cyber expertise

Infosec Skills courses and labs are powered by LX Labs — our elite team of cyber SMEs, learning specialists and community of top-ranked security instructors, published authors and sought-after industry leaders. We rigorously vet all Infosec Skills training resources to guarantee they meet certification and compliance requirements and align with recognized guidelines like the NICE Workforce Framework for Cybersecurity.

LX Labs

SC Media names Infosec Skills Best IT Security Training

See for yourself why Infosec Skills leads the cybersecurity training industry.