CompTIA CySA+ Certification Prep - Cybersecurity Analyst Training in South Africa

  • Learn via: Classroom
  • Duration: 5 Days
  • Price: From €4,023+VAT
We can host this training at your preferred location. Contact us!

Exclusive - Learn how to analyze, monitor, and protect critical infrastructures using threat-detection and threat-analysis tools.

Gain the tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate an organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur. This is a comprehensive approach to security aimed toward those on the front lines of defense.
This course is designed to assist students in preparing for the CompTIA CySA+ - Cybersecurity Analyst+ (CS0-003) certification exam and includes an exam voucher, study guide, and practice exams.

CompTIA’s CySA+ is a global, vendor-neutral certification covering intermediate-level knowledge and skills required by information security analyst job roles. It helps identify a cybersecurity professional’s ability to proactively defend an organization using secure monitoring, threat identification, incident response and teamwork. The CompTIA CySA+ CS0-003 certification exam ensures the candidate has the knowledge and skills required to:

  • Detect and analyze indicators of malicious activity
  • Understand threat hunting and threat intelligence concepts
  • Use appropriate tools and methods to manage, prioritize and respond to attacks and vulnerabilities
  • Perform incident response processes
  • Understand reporting and communication concepts related to vulnerability management and incident response activities


Is This The Right Course?

To ensure your success in this course, you should meet the following requirements:

  • At least two years (recommended) of experience in computer network security technology or a related field.
  • The ability to recognize information security vulnerabilities and threats in the context of risk management.
  • Foundation-level operational skills with some of the common operating systems for computing environments.
  • Foundational knowledge of the concepts and operational framework of common assurance safeguards in computing environments. Safeguards include, but are not limited to, basic authentication and authorization, resource permissions, and anti-malware mechanisms.
  • Foundation-level understanding of some of the common concepts for network environments, such as routing and switching.
  • Foundational knowledge of major TCP/IP networking protocols including, but not limited to, TCP, IP, UDP, DNS, HTTP, ARP, ICMP, and DHCP.
  • Foundational knowledge of the concepts and operational framework of common assurance safeguards in network environments. Safeguards include, but are not limited to, firewalls, intrusion prevention systems, and VPNs.

Who Should Attend?

  • IT Security Analyst
  • Security Operations Center (SOC) Analyst
  • Vulnerability Analyst
  • Cybersecurity Specialist
  • Threat Intelligence Analyst
  • Security Engineer

To ensure your success in this course, you should meet the following requirements:

  • At least two years (recommended) of experience in computer network security technology or a related field.
  • The ability to recognize information security vulnerabilities and threats in the context of risk management.
  • Foundation-level operational skills with some of the common operating systems for computing environments.
  • Foundational knowledge of the concepts and operational framework of common assurance safeguards in computing environments. Safeguards include, but are not limited to, basic authentication and authorization, resource permissions, and anti-malware mechanisms.
  • Foundation-level understanding of some of the common concepts for network environments, such as routing and switching.
  • Foundational knowledge of major TCP/IP networking protocols including, but not limited to, TCP, IP, UDP, DNS, HTTP, ARP, ICMP, and DHCP.
  • Foundational knowledge of the concepts and operational framework of common assurance safeguards in network environments. Safeguards include, but are not limited to, firewalls, intrusion prevention systems, and VPNs.

  • Explain the Importance of Security Controls and Security Intelligence
  • Utilize Threat Data and Intelligence
  • Analyze Security Monitoring Data
  • Collect and Query Security Monitoring Data
  • Utilize Digital Forensics and Indicator Analysis Techniques
  • Apply Incident Response Procedures
  • Apply Risk Mitigation and Security Frameworks
  • Perform Vulnerability Management
  • Apply Security Solutions for Infrastructure Management
  • Understand Data Privacy and Protection
  • Apply Security Solutions for Software Assurance
  • Apply Security Solutions for Cloud and Automation

  • Lesson 1: Understanding Vulnerability Response, Handling, and Management
  • Lesson 2: Exploring Threat Intelligence and Threat Hunting Concepts
  • Lesson 3: Explaining Important System and Network Architecture Concepts
  • Lesson 4: Understanding Process Improvement in Security Operations
  • Lesson 5: Implementing Vulnerability Scanning Methods
  • Lesson 6: Performing Vulnerability Analysis
  • Lesson 7: Communicating Vulnerability Information
  • Lesson 8: Explaining Incident Response Activities
  • Lesson 9: Demonstrating Incident Response Communication
  • Lesson 10: Applying Tools to Identify Malicious Activity
  • Lesson 11: Analyzing Potentially Malicious Activity
  • Lesson 12: Understanding Application Vulnerability Assessment
  • Lesson 13: Exploring Scripting Tools and Analysis Concepts
  • Lesson 14: Understanding Application Security and Attack Mitigation Best Practices
  • Appendix A: Mapping Course Content to CompTIA CySA+ (CS0-003)


Contact us for more detail about our trainings and for all other enquiries!

Upcoming Trainings

Join our public courses in our South Africa facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

Classroom / Virtual Classroom
05 February 2025
Cape Town, Durban, Johannesburg
5 Days
Classroom / Virtual Classroom
20 February 2025
Cape Town, Durban, Johannesburg
5 Days
Classroom / Virtual Classroom
25 February 2025
Cape Town, Durban, Johannesburg
5 Days
Classroom / Virtual Classroom
26 February 2025
Cape Town, Durban, Johannesburg
5 Days
Classroom / Virtual Classroom
05 February 2025
Cape Town, Durban, Johannesburg
5 Days
Classroom / Virtual Classroom
14 March 2025
Cape Town, Durban, Johannesburg
5 Days
Classroom / Virtual Classroom
20 February 2025
Cape Town, Durban, Johannesburg
5 Days
Classroom / Virtual Classroom
25 February 2025
Cape Town, Durban, Johannesburg
5 Days
CompTIA CySA+ Certification Prep - Cybersecurity Analyst Training Course in South Africa

Formerly known as Union of South Africa, now officially known as Republic of South Africa is the Southernmost country in Africa. South Africa's population is over 60 million people, which makes the country the world's 23rd-most populous nation. South Africa has three capital cities: executive Pretoria, judicial Bloemfontein and legislative Cape Town, while the largest city is Johannesburg. The official languages of South Africa are Afrikaans, English, Ndebele, Pedi, Sotho, Swati, Tsonga, Tswana, Venda, Xhosa and Zulu.

South Africa can be rainy from November to February, so the best time to visit South Africa is from May to September. Despite the rainy season South Africa is a year-round destination, with varying regional climates. Blyde River Canyon, Durban, Drakensberg, Kruger National Park and of course, Cape Town are the tourist attractions of the country.

Expand your IT knowledge with our comprehensive range of courses, including programming, software development, business skills, data science, cybersecurity, cloud computing and virtualization. Our skilled instructors will facilitate hands-on training and share practical insights, all conveniently conducted at your preferred location within South Africa.
By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.