Cybersecurity Analyst (CySA+) CSA-002

Security Monitoring Screens

Cybersecurity Analyst (CySA+) certification verifies that successful candidates have the knowledge and skills required to leverage intelligence and threat detection techniques, analyze and interpret data, identify and address vulnerabilities, suggest preventative measures, and effectively respond to and recover from incidents.

The Cybersecurity Career Pathway helps technical specialists achieve cybersecurity mastery, from beginning to end.

SKILLS OF COMPETENCIES

Threat and Vulnerability Management | Software and Systems Security | Security Operations and Monitoring | Incident Response | Compliance and Assessment

CySA+ JOB ROLES

  • Security Analyst

      * Tier II SOC analyst
      * Security monitoring

  • Threat intelligence analyst

  • Security engineer

  • Application security analyst

  • Incident response or handler

  • Compliance analyst

  • Threat hunter

ORGANIZATIONS THAT USE CySA+

  • US Defense of Defense (DoD)

  • U.S. Department of Veterans Affairs

  • U.S. Navy

  • Northrop Grumman

  • Target

  • RICOH USA

  • Japan Business Systems (JBS)

  • Federal Reserve Bank of Chicago

  • Security BlacKnight Cyber Security

  • KirkpatrickPrice

  • Integra

  • Dell SecureWorks

  • Linux Professional Institution

  • Boulder Community Health

  • Western Governors University

  • Washington State Patrol

  • Summit Credit Union

Analysing data

So much has been written about cybersecurity that it’s sometimes easy to forget exactly why it’s important in the first place.

 

Cybersecurity is important for two very human reasons:

  • Our identities are increasingly online. From credit agencies to our workplaces and to the social media networks that we use every day, we are living online.

  • The supply chains that keep us fed and clothed are all managed through information technology.

  •  

    Last year, Risk Based Security reported that in the first six months of 2019, 4.1 billion records were exposed via data breaches. The impact of major data breaches involving organizations such as EquifaxAmazonMarriott and Microsoft means something more than just having to change your password.

    It means that individuals and groups are targeting the technology that, basically, defines and supports you in the modern world. They are targeting systems that contain your personal data. In other words, attackers worldwide are targeting you. That said, we must protect information systems.

    Power, Presence and Privacy: Three Essential Factors

    Information security is all about three factors: power, presence and privacy. Today’s tech is incredibly powerful. Just last year, the typical mobile device became more powerful than a traditional PC.

    Additionally, tech is everywhere. We’re now wearing technology that has the ability to gather sensitive data wherever we go. Cybercriminals love to obtain this information. As a result, organizations that collect this data are held to strict standards.

    Information: What is at stake?

    We love our Internet of Things (IoT) devices. But they gather sensitive information. Some of this information is called primary information, because it’s directly about you and your identity.

    Examples of primary information include:

  • Username

  • Passwords

  • Bank account information

  • Credit card information

  • Social security numbers

  • Your weight

  • Your purchasing choices

  • And so much more

  •  

    Protecting secured information is why we provide this Bootcamp!