<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="25740" language="fr" source="https://portal.flane.ch/swisscom/fr/xml-course/25740" lastchanged="2026-01-21T14:59:47+01:00" parent="https://portal.flane.ch/swisscom/fr/xml-courses"><title>CompTIA Cybersecurity Analyst</title><productcode>CYSA+</productcode><vendorcode>CO</vendorcode><vendorname>CompTIA</vendorname><fullproductcode>CO-CYSA+</fullproductcode><version>1.0</version><objective>&lt;p&gt;On this accelerated CySA+ course you will focus on the following four cyber security domains:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Threat Management&lt;/li&gt;&lt;li&gt;Vulnerability Management&lt;/li&gt;&lt;li&gt;Cyber Incident Response&lt;/li&gt;&lt;li&gt;Security Architecture and Tool Sets&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;The training incorporates hands-on practical work in the form of virtual labs and software tools. This approach will accelerate your learning and will help retain your new found knowledge.&lt;/p&gt;</objective><essentials>&lt;p&gt;Prior to attending the CompTIA Cybersecurity Analyst (CySA+), you are expected to have:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The Network+ or Security+ certification - or equivalent knowledge&lt;/li&gt;&lt;li&gt;A minimum of 4 years of hands-on information security or related experience&lt;/li&gt;&lt;/ul&gt;</essentials><audience>&lt;p&gt;This course is aimed at cyber security professionals with at least two to three years of on-the-job experience.&lt;/p&gt;</audience><contents>&lt;h5&gt;Section 1: Threat Management&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Module 1: Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes&lt;/li&gt;&lt;li&gt;Module 2: Given a scenario, analyse the results of a network reconnaissance&lt;/li&gt;&lt;li&gt;Module 3: Given a network-based threat, implement or recommend the appropriate response and countermeasure&lt;/li&gt;&lt;li&gt;Module 4: Explain the purpose of practices used to secure a corporate environment&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Section 2: Vulnerability Management&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Module 1: Given a scenario, implement an information security vulnerability management process&lt;/li&gt;&lt;li&gt;Module 2: Given a scenario, analyse the output resulting from a vulnerability scan&lt;/li&gt;&lt;li&gt;Module 3: Compare and contrast common vulnerabilities found in the following targets&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Section 3: Cyber Incident Response&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Module 1: Given a scenario, distinguish threat data or behaviour to determine the impact of an incident&lt;/li&gt;&lt;li&gt;Module 2: Given a scenario, prepare a toolkit and use appropriate forensics tools during an investigation&lt;/li&gt;&lt;li&gt;Module 3: Explain the importance of communication during the incident response process&lt;/li&gt;&lt;li&gt;Module 4: Given a scenario, analyse common symptoms to select the best course of action to support incident response&lt;/li&gt;&lt;li&gt;Module 5: Summarise the incident recovery and post-incident response process&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Section 4: Security Architecture and Tool Sets&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Module 1: Explain the relationship between frameworks, common policies, controls, and procedures&lt;/li&gt;&lt;li&gt;Module 2: Given a scenario, use data to recommend remediation of security issues related to identity and access management&lt;/li&gt;&lt;li&gt;Module 3: Given a scenario, review security architecture and make recommendations to implement compensating controls&lt;/li&gt;&lt;li&gt;Module 4: Given a scenario, use application security best practices while participating in the Software Development Life Cycle (SDLC)&lt;/li&gt;&lt;li&gt;Module 5: Compare and contrast the general purpose and reasons for using various cybersecurity tools and technologies&lt;/li&gt;&lt;/ul&gt;</contents><outline>&lt;h5&gt;Section 1: Threat Management&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Module 1: Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes&lt;/li&gt;&lt;li&gt;Module 2: Given a scenario, analyse the results of a network reconnaissance&lt;/li&gt;&lt;li&gt;Module 3: Given a network-based threat, implement or recommend the appropriate response and countermeasure&lt;/li&gt;&lt;li&gt;Module 4: Explain the purpose of practices used to secure a corporate environment&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Section 2: Vulnerability Management&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Module 1: Given a scenario, implement an information security vulnerability management process&lt;/li&gt;&lt;li&gt;Module 2: Given a scenario, analyse the output resulting from a vulnerability scan&lt;/li&gt;&lt;li&gt;Module 3: Compare and contrast common vulnerabilities found in the following targets&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Section 3: Cyber Incident Response&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Module 1: Given a scenario, distinguish threat data or behaviour to determine the impact of an incident&lt;/li&gt;&lt;li&gt;Module 2: Given a scenario, prepare a toolkit and use appropriate forensics tools during an investigation&lt;/li&gt;&lt;li&gt;Module 3: Explain the importance of communication during the incident response process&lt;/li&gt;&lt;li&gt;Module 4: Given a scenario, analyse common symptoms to select the best course of action to support incident response&lt;/li&gt;&lt;li&gt;Module 5: Summarise the incident recovery and post-incident response process&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Section 4: Security Architecture and Tool Sets&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Module 1: Explain the relationship between frameworks, common policies, controls, and procedures&lt;/li&gt;&lt;li&gt;Module 2: Given a scenario, use data to recommend remediation of security issues related to identity and access management&lt;/li&gt;&lt;li&gt;Module 3: Given a scenario, review security architecture and make recommendations to implement compensating controls&lt;/li&gt;&lt;li&gt;Module 4: Given a scenario, use application security best practices while participating in the Software Development Life Cycle (SDLC)&lt;/li&gt;&lt;li&gt;Module 5: Compare and contrast the general purpose and reasons for using various cybersecurity tools and technologies&lt;/li&gt;&lt;/ul&gt;</outline><objective_plain>On this accelerated CySA+ course you will focus on the following four cyber security domains:


- Threat Management
- Vulnerability Management
- Cyber Incident Response
- Security Architecture and Tool Sets
The training incorporates hands-on practical work in the form of virtual labs and software tools. This approach will accelerate your learning and will help retain your new found knowledge.</objective_plain><essentials_plain>Prior to attending the CompTIA Cybersecurity Analyst (CySA+), you are expected to have:


- The Network+ or Security+ certification - or equivalent knowledge
- A minimum of 4 years of hands-on information security or related experience</essentials_plain><audience_plain>This course is aimed at cyber security professionals with at least two to three years of on-the-job experience.</audience_plain><contents_plain>Section 1: Threat Management


- Module 1: Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes
- Module 2: Given a scenario, analyse the results of a network reconnaissance
- Module 3: Given a network-based threat, implement or recommend the appropriate response and countermeasure
- Module 4: Explain the purpose of practices used to secure a corporate environment
Section 2: Vulnerability Management


- Module 1: Given a scenario, implement an information security vulnerability management process
- Module 2: Given a scenario, analyse the output resulting from a vulnerability scan
- Module 3: Compare and contrast common vulnerabilities found in the following targets
Section 3: Cyber Incident Response


- Module 1: Given a scenario, distinguish threat data or behaviour to determine the impact of an incident
- Module 2: Given a scenario, prepare a toolkit and use appropriate forensics tools during an investigation
- Module 3: Explain the importance of communication during the incident response process
- Module 4: Given a scenario, analyse common symptoms to select the best course of action to support incident response
- Module 5: Summarise the incident recovery and post-incident response process
Section 4: Security Architecture and Tool Sets


- Module 1: Explain the relationship between frameworks, common policies, controls, and procedures
- Module 2: Given a scenario, use data to recommend remediation of security issues related to identity and access management
- Module 3: Given a scenario, review security architecture and make recommendations to implement compensating controls
- Module 4: Given a scenario, use application security best practices while participating in the Software Development Life Cycle (SDLC)
- Module 5: Compare and contrast the general purpose and reasons for using various cybersecurity tools and technologies</contents_plain><outline_plain>Section 1: Threat Management


- Module 1: Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes
- Module 2: Given a scenario, analyse the results of a network reconnaissance
- Module 3: Given a network-based threat, implement or recommend the appropriate response and countermeasure
- Module 4: Explain the purpose of practices used to secure a corporate environment
Section 2: Vulnerability Management


- Module 1: Given a scenario, implement an information security vulnerability management process
- Module 2: Given a scenario, analyse the output resulting from a vulnerability scan
- Module 3: Compare and contrast common vulnerabilities found in the following targets
Section 3: Cyber Incident Response


- Module 1: Given a scenario, distinguish threat data or behaviour to determine the impact of an incident
- Module 2: Given a scenario, prepare a toolkit and use appropriate forensics tools during an investigation
- Module 3: Explain the importance of communication during the incident response process
- Module 4: Given a scenario, analyse common symptoms to select the best course of action to support incident response
- Module 5: Summarise the incident recovery and post-incident response process
Section 4: Security Architecture and Tool Sets


- Module 1: Explain the relationship between frameworks, common policies, controls, and procedures
- Module 2: Given a scenario, use data to recommend remediation of security issues related to identity and access management
- Module 3: Given a scenario, review security architecture and make recommendations to implement compensating controls
- Module 4: Given a scenario, use application security best practices while participating in the Software Development Life Cycle (SDLC)
- Module 5: Compare and contrast the general purpose and reasons for using various cybersecurity tools and technologies</outline_plain><duration unit="d" days="5">5 jours</duration><pricelist><price country="DE" currency="EUR">2490.00</price><price country="AT" currency="EUR">2490.00</price><price country="IT" currency="EUR">2490.00</price><price country="FR" currency="EUR">3370.00</price><price country="IL" currency="ILS">8640.00</price><price country="MK" currency="EUR">1750.00</price><price country="GR" currency="EUR">1750.00</price><price country="BE" currency="EUR">2495.00</price><price country="NL" currency="EUR">2495.00</price><price country="HU" currency="EUR">1750.00</price><price country="SI" currency="EUR">2490.00</price><price country="US" currency="USD">2495.00</price><price country="CA" currency="CAD">3445.00</price><price country="CH" currency="CHF">2615.00</price></pricelist><miles/></course>