Skype | Facebook | Google+ | Home | Sitemap | Contact us | +92 321 3499131 | +971 4 221 6756

ICT Offers
Online Training

Cyber Security

Cyber Security Course Outline

[Download Outline]

CompTIA Cybersecurity Analyst CSA+

This course can help you prepare for the CompTIA CSA+ certification exam with hands-on, scenario-based training, so you'll be ready to meet Advanced Persistent Threats (APTs) head on.

Threat Management

Cybersecurity Analysts

  • Cybersecurity roles and responsibilities
  • Frameworks and security controls
  • Risk evaluation
  • Penetration testing processes

Reconnaissance techniques

  • The kill chain
  • Open source intelligence
  • Social engineering
  • Topology discovery
  • Service discovery
  • OS fingerprinting

Security appliances

  • Configuring firewalls
  • Intrusion detection and prevention
  • Configuring IDS
  • Malware threats
  • Configuring anti-virus software
  • Sysinternals
  • Enhanced mitigation experience toolkit

Logging and analysis

  • Packet capture
  • Packet capture tools
  • Monitoring tools
  • Log review and SIEM
  • SIEM data outputs
  • SIEM data analysis
  • Point-in-time data analysis

Vulnerability Management

Managing vulnerabilities

  • Vulnerability management requirements
  • Asset inventory
  • Data classification
  • Vulnerability management processes
  • Vulnerability scanners
  • Microsoft baseline security analyzer
  • Vulnerability feeds and SCAP
  • Configuring vulnerability scans
  • Vulnerability scanning criteria
  • Exploit frameworks

Remediating vulnerabilities

  • Analyzing vulnerability scans
  • Remediation and change control
  • Remediating host vulnerabilities
  • Remediating network vulnerabilities
  • Remediating virtual infrastructure vulnerabilities

Secure software development

  • Software development life cycle
  • Software vulnerabilities
  • Software security testing
  • Interception proxies
  • Web application firewalls
  • Source authenticity
  • Reverse engineering

Cyber Incident Response

Incident response

  • Incident response processes
  • Threat classification
  • Incident severity and prioritization
  • Types of data

Forensics tools

  • Digital forensics investigations
  • Documentation and forms
  • Digital forensics crime scenes
  • Digital forensics kits
  • Image acquisition
  • Password cracking
  • Analysis utilities

Incident analysis and recovery

  • Analysis and recovery frameworks
  • Analyzing network symptoms
  • Analyzing host symptoms
  • Analyzing data exfiltration
  • Analyzing application symptoms
  • Using sysinternals
  • Containment techniques
  • Eradication techniques
  • Validation techniques
  • Corrective actions

Security Architecture

Secure network design

  • Network segmentation
  • Blackholes, sinkholes, and honeypots
  • System hardening
  • Group policies and MAC
  • Endpoint security

Managing identities and access

  • Network access control
  • Identity management
  • Identity security issues
  • Identity repositories
  • Context-based authentication
  • Single sign on and federation
  • Exploiting identities
  • Exploiting web browsers and applications

Security frameworks and policies

  • Frameworks and compliance
  • Reviewing security architecture
  • Procedures and compensating controls
  • Verifications and quality control
  • Security policies and procedures
  • Personnel policies and training


Final Project


Practical Approach

The real-time examples will be given throughout the lectures, starting from design, analysis, implementation and maintenance.


Training Schedule
Download Full Calendar

21 Feb 2019

Graphics Designing
Thu-Fri-Sat 05:00 PM-06:30 PM

Quick Links
Web Designing & Development Android Mobile App Development SEO Internet Marketing MCSE CCNA CCNP


Web Development

Java Android


Graphics Designing






Spoken English

Ms Office

ICT Trainings facebook Icon ICT Trainings Twitter Icon ICT Google Plus Icon ICT Trainings Google Plus Icon ICT Trainings linkedin Icon
Download ICT Trainings App!
ICT Trainings - iTunes App ICT Trainings - Google Play App

© Copyright 2007-2019 - ICT Trainings - All rights reserved.
Designed by Innovative.