CompTIA Cybersecurity Analyst (CySA+)
Grow your cybersecurity skills with this CompTIA Cybersecurity Analyst (CySA+) course.
Learn More
Docnito's 3 Month Course
Ready for a new start? This course includes 180 hours of training and is worth 12 credits. This training course is designed to equip you with the skills needed to begin your career in the cyber security field.
Why Take a Cyber security Course?
This program was built to help individuals learn how to apply cybersecurity practices to protect systems, data, and networks. As cyber threats evolve daily, it is more crucial than ever for organizations to successfully integrate strong security measures.
Why Choose Docnito?
- This is a transferable Pathway Course. Our partner college, the award winning CanScribe College accepts Docnito course credits allowing you to use this course as a transfer credit to CanScribe College.
- Docnito courses are also asynchronous allowing you to complete the course as fast as you would like and at whatever times you'd like.
- Our courses are 100% online, which means you never have to leave home to attend classes!
About This Course
Learn the Fundamentals in Just 3 Months!
Program Details
WHAT YOU WILL LEARN
Upon successful completion of this course, the students will be able to explain core concepts of system and network architecture, including log ingestion, OS functions, IAM, encryption, and data protection. Students will identify indicators of malicious activity across networks, hosts, applications, and social engineering threats. Students will detect threats using tools like Wireshark, SIEM, and VirusTotal, apply analysis techniques, and use scripting languages for support. They will evaluate threat intelligence sources, improve processes, and conduct vulnerability scanning and assessment using various methods and tools. They will prioritize vulnerabilities, recommend appropriate mitigation controls, and explain response strategies, including patching and secure development practices. Students will apply frameworks such as MITRE ATT&CK and OWASP, perform incident response activities, and manage the full incident lifecycle. They will also produce clear reports on vulnerabilities and incidents, focusing on communication, analysis, and continuous improvement.
Tuition
Check out our tuition page to see how our credits and tuition work.
Requirements
This program follows an open admission policy and does not require specific academic prerequisites. Applicants are expected to possess basic literacy, numeracy, and computer skills sufficient to participate in course activities. Enrollment is finalized upon completion of the application process and payment of applicable fees.
Curriculum
Chapter 1: Understanding Vulnerability Response, Handling, and Management
Chapter 2: Exploring Threat Intelligence and Threat Hunting Concepts
Chapter 3: Explain Important System and Network Architecture Concepts
Chapter 4: Understanding Process Improvement in Security Operations
Chapter 5: Implementing Vulnerability Scanning Models
Chapter 6: Performing Vulnerability Analysis
Chapter 7: Communicating Vulnerability Information
Chapter 8: Explaining Incident Response Activities
Chapter 9: Demonstrating Incident Response Communication
Chapter 10: Applying Tools to Identify Malicious Activity
Chapter 11: Analyzing Potentially Malicious Activity
Chapter 12: Understanding Application Vulnerability Assessment
Chapter 13: Exploring Scripting Tools and Analysis Concepts
Chapter 14: Understanding Application Security and Attack Mitigation Best Practices
Chapter 15: Final Exam