CompTIA Cybersecurity Analyst (CySA+)

Grow your cybersecurity skills with this CompTIA Cybersecurity Analyst (CySA+) course. 

Learn More

Docnito's 3 Month Course

Ready for a new start? This course includes 180 hours of training and is worth 12 credits. This training course is designed to equip you with the skills needed to begin your career in the cyber security field.

Why Take a Cyber security Course?

This program was built to help individuals learn how to apply cybersecurity practices to protect systems, data, and networks. As cyber threats evolve daily, it is more crucial than ever for organizations to successfully integrate strong security measures.

Why Choose Docnito?

- This is a transferable Pathway Course. Our partner college, the award winning CanScribe College accepts Docnito course credits allowing you to use this course as a transfer credit to CanScribe College.

- Docnito courses are also asynchronous allowing you to complete the course as fast as you would like and at whatever times you'd like.

- Our courses are 100% online, which means you never have to leave home to attend classes!

About This Course

Learn the Fundamentals in Just 3 Months!

WHAT YOU WILL LEARN

Upon successful completion of this course, the students will be able to explain core concepts of system and network architecture, including log ingestion, OS functions, IAM, encryption, and data protection. Students will identify indicators of malicious activity across networks, hosts, applications, and social engineering threats. Students will detect threats using tools like Wireshark, SIEM, and VirusTotal, apply analysis techniques, and use scripting languages for support. They will evaluate threat intelligence sources, improve processes, and conduct vulnerability scanning and assessment using various methods and tools. They will prioritize vulnerabilities, recommend appropriate mitigation controls, and explain response strategies, including patching and secure development practices. Students will apply frameworks such as MITRE ATT&CK and OWASP, perform incident response activities, and manage the full incident lifecycle. They will also produce clear reports on vulnerabilities and incidents, focusing on communication, analysis, and continuous improvement.

Check out our tuition page to see how our credits and tuition work.

This program follows an open admission policy and does not require specific academic prerequisites. Applicants are expected to possess basic literacy, numeracy, and computer skills sufficient to participate in course activities. Enrollment is finalized upon completion of the application process and payment of applicable fees.

Chapter 1: Understanding Vulnerability Response, Handling, and Management

Chapter 2:  Exploring Threat Intelligence and Threat Hunting Concepts

Chapter 3: Explain Important System and Network Architecture Concepts

Chapter 4: Understanding Process Improvement in Security Operations

Chapter 5: Implementing Vulnerability Scanning Models

Chapter 6: Performing Vulnerability Analysis

Chapter 7: Communicating Vulnerability Information

Chapter 8: Explaining Incident Response Activities

Chapter 9: Demonstrating Incident Response Communication

Chapter 10: Applying Tools to Identify Malicious Activity

Chapter 11: Analyzing Potentially Malicious Activity

Chapter 12: Understanding Application Vulnerability Assessment

Chapter 13: Exploring Scripting Tools and Analysis Concepts

Chapter 14: Understanding Application Security and Attack Mitigation Best Practices

Chapter 15: Final Exam

Start Your Training Today!