NDG CySA+

The NDG CySA+ labs provide hands-on practice in behavioral analytics skills to identify vulnerabilities, threats, and risks to an organization. Learners gain the skills needed to identify and combat malware, configure and use threat-detection tools, and secure and protect the applications and systems within an organization.

See the Supported Labs table below.

NDG CySA+ labs are supported in NETLAB+ using the CySA+ Pod.

Certification Resources: Please see the table below for details on how the labs map to the CompTIA Cybersecurity Analyst (CySA+) Certification Exam Objectives and the CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide, Second Edition (Exam CS0-002).

Supported Labs

Lab Title CompTIA CySA+ (CS0-002)
Exam Objectives
All-In-One CompTIA CySA+ Second Edition
ISBN-13: 978-1260464306
Chapters
1 Network Enumeration 1.0 - Threat and Vulnerability Management
1.2 - Given a scenario, utilize threat intelligence to support organizational security
1.3 - Given a scenario, perform vulnerability managemenactivitieses
1.4 - Given a scenario, analyze the output from commvulnerabilitylty tools
1.7 - Given a scenario, implement controls to mitigate attacks and software vulnerabilities
Chapter 2,3,4,7
2 Web Application Scanning 1.0 - Threat and Vulnerability Management
1.2 - Given a scenario, utilize threat intelligence to support organizational security
1.3 - Given a scenario, perform vulnerability managemenactivitieses
1.6 - Explain the threats and vulnerabilities associated with operating in the cloud
1.7 - Given a scenario, implement controls to mitigate attacks and software vulnerabilities
2.0 - Software and Systems Security
2.1 - Given a scenario, apply security solutions for infrastructure management
4.0 - Incident Response
4.1 - Explain the importance of the incident response process
4.3 - Given an incident, analyze potential indicators of compromise
4.4 - Given a scenario, utilize basic digital forensics techniques
Chapter 2,3,6,7,8,15,17,18
3 Windows CLI Tools 1.0 - Threat and Vulnerability Management
1.4 - Given a scenario, analyze the output from common vulnerability tools
2.0 - Software and Systems Security
2.1 - Explain software assurance best practices
Chapter 4,9
4 Linux Command Line Tools 1.0 - Threat and Vulnerability Management
1.4 - Given a scenario, analyze the output from commonn vulnerabilityy tools
2.0 - Software and Systems Security
2.1 - Explain software assurance best practices
Chapter 4,9
5 Vulnerability Scanning 1.0 - Threat and Vulnerability Management
1.1 - Explain the importance of threat data and intelligence
1.2 - Given a scenario, utilize threat intelligence to support organizational security
1.3 - Given a scenario, perform vulnerability managemeactivitiesies
1.4 - Given a scenario, analyze the output from comvulnerabilityilty tools
1.6 - Explain the threats and vulnerabilities associated with operating in the cloud
1.7 - Given a scenario, implement controls to mitigate attacks and software vulnerabilities
3.0 - Security Operations and Monitoring
3.3 - Explain the importance of proactive threat hunting
Chapter 1,2.3,4,6,7,13
6 Packet Analysis 1.0 - Threat and Vulnerability Management
1.2 - Given a scenario, utilize threat intelligence to support organizational security
1.3 - Given a scenario, perform vulnerability managemenactivitieses
1.4 - Given a scenario, analyze the output from common vulnerability tools
3.0 - Security Operations and Monitoring
3.1 - Given a scenario, analyze data as part of security monitoring activities
3.2 - Given a scenario, implement configuration changes to existing controls to improve security
3.3 - Explain the importance of proactive threat hunting
4.0 - Incident Response
4.4 - Given a scenario, utilize basic digital forensics techniques
Chapter 2,3,4,11,12,13,18
7 Host Hardening 1.0 - Threat and Vulnerability Management
1.3 - Given a scenario, perform vulnerability management activities
1.4 - Given a scenario, analyze the output from common vulnerability tools
1.7 - Given a scenario, implement controls to mitigate attacks and software vulnerabilities
2.0 - Software and Systems Security
2.1 - Explain software assurance best practices
3.0 - Security Operations and Monitoring
3.2 - Given a scenario, implement configuration changes to existing controls to improve security
Chapter 3,4,7,8,12
8 Understanding ACL's and Host-Based Firewalls 1.0 - Threat and Vulnerability Management
1.7 - Given a scenario, implement controls to mitigate attacks and software vulnerabilities
2.0 - Software and Systems Security
2.1 - Explain software assurance best practices
3.0 - Security Operations and Monitoring
3.2 - Given a scenario, implement configuration changes to existing controls to improve security
Chapter 7,8,12
9 Working with Log Data 1.0 - Threat and Vulnerability Management
1.6 - Explain the threats and vulnerabilities associated with operating in the cloud
3.0 - Security Operations and Monitoring
3.1 - Given a scenario, analyze data as part of security monitoring activities
4.0 - Incident Response
4.3 - Given an incident, analyze potential indicators of compromise
4.4 - Given a scenario, utilize basic digital forensics techniques
Chapter 6,11,17,18
10 Memory Forensic Analysis 1.0 - Threat and Vulnerability Management
1.7 - Given a scenario, implement controls to mitigate attacks and software vulnerabilities
4.0 - Incident Response
4.3 - Given an incident, analyze potential indicators of compromise
4.4 - Given a scenario, utilize basic digital forensics techniques
Chapter 7,17,18
11 Digital Forensic Analysis 4.0 - Incident Response
4.3 - Given an incident, analyze potential indicators of compromise
4.4 - Given a scenario, utilize basic digital forensics techniques
5.0 - Compliance and Assessment
5.2 - Given a scenario, apply security concepts in support of organizational risk mitigation
Chapter 17,18,20
12 Extracting Data from a Compromised Machine 1.0 - Threat and Vulnerability Management
1.1 - Explain the importance of threat data and intelligence
4.0 - Incident Response
4.1 - Explain the importance of the incident response process
4.2 - Given a scenario, apply the appropriate incident response procedure
4.3 - Given an incident, analyze potential indicators of compromise
Chapter 1,15,16,17
13 Password Cracking 1.0 - Threat and Vulnerability Management
1.4 - Given a scenario, analyze the output from common vulnerability tools
2.0 - Security and Systems Security
2.1 - Explain software assurance best practices
4.0 - Incident Response
4.4 - Given a scenario, utilize basic digital forensics techniques
5.0 - Compliance and Assessment
5.3 - Explain the importance of frameworks, policies, procedures and controls
Chapter 4,8,18,21
14 Packet Crafting 2.0 - Security and Systems Security
2.1 - Explain software assurance best practices
3.0 - Security Operations and Monitoring
3.1 - Given a scenario, analyze data as part of security monitoring activities
3.3 - Explain the importance of proactive threat hunting
3.4 - Compare and Contrast automation concepts and technologies
Chapter 8,11,13,14
15 Log Analysis with Bash Scripting 3.0 - Security Operations and Monitoring 3.1 - Given a scenario, analyze data as part of security monitoring activities 3.4 - Compare and Contrast automation concepts and technologies 4.0 - Incident Response 4.3 - Given an incident, analyze potential indicators of compromise Chapter 11,14,17
16 Configuring a Firewall 1.0 - Threat and Vulnerability Management
1.3 - Given a scenario, perform vulnerability management activities
2.0 - Software and Systems Security
2.1 - Explain software assurance best practices
3.0 - Security Operations and Monitoring
3.1 - Given a scenario, analyze data as part of security monitoring activities
3.2 - Given a scenario, implement configuration changes to existing controls to improve security
3.3 - Explain the importance of proactive threat hunting
Chapter 3,8,11,12,13
17 Incident Response Procedures 1.0 - Threat and Vulnerability Management
1.2 - Given a scenario, utilize threat intelligence to support organizational security
4.0 - Incident Response
4.2 - Given a scenario, apply the appropriate incident response procedure
4.3 - Given an incident, analyze potential indicators of compromise
4.4 - Given a scenario, utilize basic digital forensics techniques
5.0 - Compliance and Acceptance
5.2 - Given a scenario, apply security concepts in support of organizational risk mitigation
Chapter 2,16,17,18,20
18 Securing Data Using Encryption Software 2.0 - Software and Systems Security
2.1 - Explain software assurance best practices
5.0 - Compliance and Acceptance
5.1 - Understand the importance of data privacy and protection
Chapter 8,19
19 Creating Rules and Testing Snort IDS 1.0 - Threat and Vulnerability Management
1.3 - Given a scenario, perform vulnerability management activities
1.4 - Given a scenario, analyze the output from common vulnerability tools
1.7 - Given a scenario, implement controls to mitigate attacks and software vulnerabilities
3.0 - Security Operations and Monitoring
3.1 - Given a scenario, analyze data as part of security monitoring activities
3.2 - Given a scenario, implement configuration changes to existing controls to improve security
3.4 - Compare and Contrast automation concepts and technologies
4.0 - Incident Response
4.2 - Given a scenario, apply the appropriate incident response procedure
4.3 - Given an incident, analyze potential indicators of compromise
4.4 - Given a scenario, utilize basic digital forensics techniques
5.0 - Compliance and Acceptance
5.2 - Given a scenario, apply security concepts in support of organizational risk mitigation
Chapter 3,4,7,11,12,14,16,17,18,20
20 Network Intrusion Detection with OSSIM 1.0 - Threat and Vulnerability Management
1.3 - Given a scenario, perform vulnerability management activities
1.4 - Given a scenario, analyze the output from common vulnerability tools
1.7 - Given a scenario, implement controls to mitigate attacks and software vulnerabilities
3.0 - Security Operations and Monitoring
3.1 - Given a scenario, analyze data as part of security monitoring activities
3.2 - Given a scenario, implement configuration changes to existing controls to improve security
3.4 - Compare and Contrast automation concepts and technologies
4.0 - Incident Response
4.2 - Given a scenario, apply the appropriate incident response procedure
4.3 - Given an incident, analyze potential indicators of compromise
5.0 - Compliance and Acceptance
5.2 - Given a scenario, apply security concepts in support of organizational risk mitigation
Chapter 3,4,7,11,12,14,16,17,20
21 Host Intrusion Detection with OSSIM 1.0 - Threat and Vulnerability Management
1.3 - Given a scenario, perform vulnerability management activities
1.4 - Given a scenario, analyze the output from common vulnerability tools
1.7 - Given a scenario, implement controls to mitigate attacks and software vulnerabilities
3.0 - Security Operations and Monitoring
3.1 - Given a scenario, analyze data as part of security monitoring activities
3.2 - Given a scenario, implement configuration changes to existing controls to improve security
3.4 - Compare and Contrast automation concepts and technologies
4.0 - Incident Response
4.2 - Given a scenario, apply the appropriate incident response procedure
4.3 - Given an incident, analyze potential indicators of compromise
5.0 - Compliance and Acceptance
5.2 - Given a scenario, apply security concepts in support of organizational risk mitigation
Chapter 3,4,7,11,12,14,16,17,20

Academic Book List

The book listed below is a recommended resource to accompany the NDG CySA+ labs.

CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide
Second Edition (Exam CS0-002) 2nd Edition
by Brent Chapman (Author), Fernando Maymi (Author)
ISBN-13: 978-1260464306
ISBN-10: 126046430X
Enabling the Labs

To enable the NDG CySA+ labs, install the CySA+ course using the Course Manager. See the Course Manager section of the NETLAB+ VE Admin Guide for details. The course content will then be available to be added to classes.

CySA+ Pod
Using the Labs

Always select the correct lab exercise for the lab being performed. Students or teams should schedule the correct lab exercise from the catalog. NETLAB+ will only show those labs for which the required pod type is available. A lab that works on different pod types may appear more than once if your system is so equipped. Instructors should select the correct lab from the Exercise tab during instructor-led lab reservations. This can be done as many times as needed during the reservation.