CompTIA Cybersecurity Analyst (CySA+) (Thai) Exam Excluded

Date/Time: 10/03/2020 - 13/03/2020 All Day

Category(ies)


About this course

The CSA+ certification acronym has changed to CySA+. CompTIA and its partners will make the change by June 29th, 2018. The exam code will remain the same.

As attackers have learned to evade traditional signature-based solutions such as firewalls, an analytics-based approach within the IT security industry is increasingly important for most organizations. The behavioral analytics skills covered by CySA+ identify and combat malware, and advanced persistent threats (APTs), resulting in enhanced threat visibility across a broad attack surface. CompTIA CySA+ is for IT professionals looking to gain the following security analyst skills:

  • Configure and use threat detection tools.
  • Perform data analysis.
  • Interpret the results to identify vulnerabilities, threats and risks to an organization.

Course Objectives

After completing the CompTIA CySA+ course, delegates will have the skills and knowledge to:

  • Assess information security risk in computing and network environments
  • Analyse the cybersecurity threat landscape
  • Analyse reconnaissance threats to computing and network environments
  • Analyse attacks on computing and network environments
  • Analyse post-attack techniques on computing and network environments
  • Implement a vulnerability management program
  • Evaluate the organization’s security through penetration testing
  • Collect cybersecurity intelligence
  • Analyse data collected from security and event logs
  • Perform active analysis on assets and networks
  • Respond to cyber security incidents
  • Investigate cyber security incidents
  • Address security issues with the organization’s technology architecture

Course Content

Lesson 1: Assessing Information Security Risk

  • Topic A: Identify the Importance of Risk Management
  • Topic B: Assess Risk
  • Topic C: Mitigate Risk
  • Topic D: Integrate Documentation into Risk Management

Lesson 2: Analysing the Threat Landscape

  • Topic A: Classify Threats and Threat Profiles
  • Topic B: Perform Ongoing Threat Research

Lesson 3: Analysing Reconnaissance Threats to Computing and Network Environments

  • Topic A: Implement Threat Modeling
  • Topic B: Assess the Impact of Reconnaissance Incidents
  • Topic C: Assess the Impact of Social Engineering

Lesson 4: Analysing Attacks on Computing and Network Environments

  • Topic A: Assess the Impact of System Hacking Attacks
  • Topic B: Assess the Impact of Web-Based Attacks
  • Topic C: Assess the Impact of Malware
  • Topic D: Assess the Impact of Hijacking and Impersonation Attacks
  • Topic E: Assess the Impact of DoS Incidents
  • Topic F: Assess the Impact of Threats to Mobile Security
  • Topic G: Assess the Impact of Threats to Cloud Security

Lesson 5: Analysing Post-Attack Techniques

  • Topic A: Assess Command and Control Techniques
  • Topic B: Assess Persistence Techniques
  • Topic C: Assess Lateral Movement and Pivoting Techniques
  • Topic D: Assess Data Exfiltration Techniques
  • Topic E: Assess Anti-Forensics Techniques

Lesson 6: Managing Vulnerabilities in the Organization

  • Topic A: Implement a Vulnerability Management Plan
  • Topic B: Assess Common Vulnerabilities
  • Topic C: Conduct Vulnerability Scans

Lesson 7: Implementing Penetration Testing to Evaluate Security

  • Topic A: Conduct Penetration Tests on Network Assets
  • Topic B: Follow Up on Penetration Testing

Lesson 8: Collecting Cybersecurity Intelligence

  • Topic A: Deploy a Security Intelligence Collection and Analysis Platform
  • Topic B: Collect Data from Network-Based Intelligence Sources
  • Topic C: Collect Data from Host-Based Intelligence Sources

Lesson 9: Analysing Log Data

  • Topic A: Use Common Tools to Analyse Logs
  • Topic B: Use SIEM Tools for Analysis
  • Topic C: Parse Log Files with Regular Expressions

Lesson 10: Performing Active Asset and Network Analysis

  • Topic A: Analyse Incidents with Windows-Based Tools
  • Topic B: Analyse Incidents with Linux-Based Tools
  • Topic C: Analyse Malware
  • Topic D: Analyse Indicators of Compromise

Lesson 11: Responding to Cybersecurity Incidents

  • Topic A: Deploy an Incident Handling and Response Architecture
  • Topic B: Mitigate Incidents
  • Topic C: Prepare for Forensic Investigation as a CSIRT

Lesson 12: Investigating Cybersecurity Incidents

  • Topic A: Apply a Forensic Investigation Plan
  • Topic B: Securely Collect and Analyse Electronic Evidence
  • Topic C: Follow Up on the Results of an Investigation

Lesson 13: Addressing Security Architecture Issues

  • Topic A: Remediate Identity and Access Management Issues
  • Topic B: Implement Security During the SDLC

Exam Description

The CompTIA Cybersecurity Analyst (CySA+) certification verifies that successful candidates have the knowledge and skills required to configure and use threat detection tools, perform data analysis and interpret the results to identify vulnerabilities, threats and risks to an organization, with the end goal of securing and protecting applications and systems within an organization.

Number of Questions : Maximum of 85 questions (Multiple choice and performance-based)

Length of Test: 165 minutes

Passing Score: 750 (on a scale of 100-900)

Training info

Duration:  4 Days
Date:  March 10 – 13, 2020
Time:  9.30 am. – 16.30 pm.
Venue:  ACinfotec Training Center
16th Fl., Asia Centre Bldg., South Sathorn Rd.
Training Fees: 49,000 Baht (ex.vat7%)
Tel. 02 670 8980-3
E-mail.[email protected]

Course Registration


Terms & Conditions for Course Registration

Please read the following terms & conditions for course registration carefully. Upon clicking submit button, it is demonstrated that I/We understand and accept the registration and cancellation policies and procedures.

  • Full payment is required in advance prior to course commencement date.

Cancellation Policy

  • Payment is due upon registration
  • Delegates who cancel after registration, or who don’t attend, are liable to pay the full course fee and no refunds can be given
  • A replacement is always welcome

Disclaimer: ACinfotec reserves the right to change, postpone or cancel. Any part of its published programme due to unforeseen circumstances.