What is in CompTIA CySA
Outline
Outline for this course
Module 1: Explaining the Importance of Security Controls and Security IntelligenceModule 2: Utilizing Threat Data and Intelligence
Module 3: Analyzing Security Monitoring Data
Module 4: Collecting and Querying Security Monitoring Data
Module 5: Utilizing Digital Forensics and Indicator Analysis Techniques
Module 6: Applying Incident Response Procedures
Module 7: Applying Risk Mitigation and Security Frameworks
Module 8: Performing Vulnerability Management
Module 9: Applying Security Solutions for Infrastructure Management
Module 10: Understanding Data Privacy and Protection
Module 11: Applying Security Solutions for Software Assurance
Module 12: Applying Security Solutions for Cloud and Automation
Get Register