User Tools

Site Tools


CompTIA CSA+ (Cybersecurity Analyst)

Track Room Location: Heritage Hall, 123

The “CompTIA CSA” track is now closed, but you can be added to the WAIT LIST by selecting that track as your primary choice. You'll be placed into your alternate track choice. If space opens up in “CompTIA CSA,” you will be notified.


This intermediate-level Cyber Security Course will provide students the opportunity to gain immeasurable hands-on experience with current and emerging security tools. Students will learn about the latest threats, vulnerabilities, analysis, and counter-measures in a controlled classroom environment. Students will gain valuable knowledge as applied to both academic and production environments.


Network+, Security+ or equivalent knowledge. Minimum of 3-4 years of hands-on information security or related experience. While there is no required prerequisite, CSA+ is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus.


Andrew Hurd is the Faculty Program Director for Cybersecurity at Excelsior College. Andrew is responsible for curriculum development and degree requirements for the Bachelors and Master degrees in Cybersecurity. Prior to joining Excelsior, Andrew worked at Hudson Valley CC and SUNY Albany. He holds dual Bachelors of Arts in Computer Science and Mathematics, a Masters in the Science of teaching mathematics, and a PhD in Information Sciences specialized in Information Assurance and Online Learning. Andrew won the SUNY Chancellors award for Excellence in Teaching in 2012 while working at HVCC.

Three Objectives
1. Students will be able to configure and use threat detection tools.
2. Students will be able to collect data samples and perform data analysis.
3. Students will be able interpret the results to identify vulnerabilities, threats and risks to an organization.


Day 1 (Monday)
Course Introduction – CSA+ Overview and Certification Objectives
Network+ and Security+ Review
Module 1 – Domain 1 – Threat Management
Objective 1.1 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes
Objective 1.2 Given a scenario, analyze the results of a network reconnaissance.
Objective 1.3 Given a network-based threat, implement or recommend the appropriate response and countermeasure.
Objective 1.4 Explain the purpose of practices used to secure a corporate environment.

Day 2 (Tuesday)
Review – Day 1
Module 1 Completion
Objective 1.4 Explain the purpose of practices used to secure a corporate environment.
Module 2 – Domain2 Vulnerability Management
Objective 2.1 Given a scenario, implement an information security vulnerability management process.
Objective 2.2 Given a scenario, analyze the output resulting from a vulnerability scan.
Objective 2.3 Compare and contrast common vulnerabilities found in the following targets within an organization.

Day 3 (Wednesday)
Review – Day 2
Module 3 – Domain 3 – Cyber Incident Response
Objective 3.1 Given a scenario, distinguish threat data or behavior to determine the impact of an incident.
Objective 3.2 Given a scenario, prepare a toolkit and use appropriate forensics tools during an investigation.
Objective 3.3 Explain the importance of communication during the incident response process.
Objective 3.4 Given a scenario, analyze common symptoms to select the best course of action to support incident response.
Objective 3.5 Summarize the incident recovery and post-incident response process.

Day 4 (Thursday)
Review – Day 3
Module 4 – Domain 4 – Security Architecture and Tool Sets
Objective 4.1 Explain the relationship between frameworks, common policies, controls, and procedures.
Objective 4.2 Given a scenario, use data to recommend remediation of security issues related to identity and access management.
Objective 4.3 Given a scenario, review security architecture and make recommendations to implement compensating controls.
Objective 4.4 Given a scenario, use application security best practices while participating in the Software Development Life Cycle (SDLC).
Objective 4.5 Compare and contrast the general purpose and reasons for using various cybersecurity tools and technologies.

Day 5 (Friday)
Module 4 Completion
Course Review
Final Exam


CSA+ exam vouchers will be provided to all participants that qualify. To qualify, you must 1) attend the class, 2) register your school as a CompTIA Academic partner (if you are not already), 3) register for the CompTIA Instructor Network.

Please note that content is subject to change or modification based on the unique needs of the track participants in attendance.

csa.txt · Last modified: 2018/11/08 16:24 by admin