- Home
- Cybersecurity, Stronger Together
- Explore
-
-
CYBERSECURITY
Cybersecurity qualifications unlock careers, prove expertise, drive innovation, and will shape the digital frontier in tomorrow’s AI-driven threat landscape.
Learn More
-
HOMELAND SECURITY
Homeland Security qualifications empower leaders, safeguard nations, advance resilience, and shape the next generation of defenders in an evolving global threatscape.
- Leadership and Management
- Emerging Technologies
- Medical Management & Prehospital Considerations
- Capstone
-
CPS PROGRAMS
George Washington University’s College of Professional Studies offers dynamic, career-ready courses in leadership, cybersecurity, CBRNE, technology, and public service—transforming professionals worldwide.
Learn More
-
REVU EXCLUSIVES
GW RevU’s growing number of exclusive courses offer a range of learning opportunities, from student success and introductory courses to cutting-edge courses about what is happening in the world now.
Learn More
-
-
-
- Cybersecurity
-
-
CYBERSECURITY
Welcome to CyberForge.
MISSION — GW RevU aims to be a prime resource for lifelong learners and employers offering interdisciplinary, career-focused credentials that support up-skill, reskilling, and society advancement.VISION — GW RevU envisions delivering innovative, flexible education that meets evolving workforce needs and to empower professionals with current, market- and needs-based skills.
Learn More
-
PARTNERS
-
Cybersecurity (Coming Soon)
-
CISSP (Coming Soon)
- Homeland Security
-
-
HOMELAND SECURITY
Chemical. Biological. Radiological. Nuclear. Explosive. WMDs. Asymmetric Threats.
The CBRNE-WMD credentials program is a robust training series designed to prepare early and developing professionals for the complexities of a dynamic and evolving threat environment. Three interdependent certificates that deal with policy, mitigation, and emerging threats will propel you towards an immersive capstone in Washington, D.C. and the next steps in your career protecting our nation.
-
CBRNE-WMD Leadership and Management
Gain strategic leadership skills to manage CBRNE-WMD incidents through legal frameworks, interagency coordination, and real-world case studies.
CBRNE-WMD Hospital and Pre-Hospital Management
Learn medical response skills for CBRNE-WMD incidents, including triage, decontamination, PPE, and early threat detection in mass casualty events.
CBRNE-WMD Emerging Threats
Explore emerging CBRNE-WMD threats and technologies like AI and nanotech to enhance preparedness and response capabilities in complex environments.
CBRNE-WMD Capstone Event, Washington, D.C.
Experience an immersive, high-intensity, and multi-modal exercise that reflects the dynamic asymmetric threats of the modern world. The Capstone Experience is an annual event that is available to students that have completed the other CBRNE-WMD credentials.
-
- Degree Programs
-
-
CPS Programs
GW’s CPS bachelor programs empower working professionals with flexible, real-world education—launching impactful, leadership-focused, globally-oriented careers.
Learn More
-
BACHELORS DEGREES
GW’s CPS bachelor programs empower working professionals with flexible, real-world education—launching impactful, leadership-focused, globally-oriented careers.
Learn More
-
POSTGRADUATE DEGREES
CPS’s postgraduate programs transformed experienced professionals into visionary leaders through immersive, real-world learning, powerful networks, and practical rigor across critical fields.
- Cybersecurity Strategy & Information Management
- Homeland Security
- Legislative Affairs
- Paralegal Studies
- Political Management
- Public Relations & Communications
- Publishing
- Sustainable Urban Planning
-
REVU EXCLUSIVES
GW RevU’s growing number of exclusive courses offer a range of learning opportunities, from student success and introductory courses to cutting-edge courses about what is happening in the world now.
Learn More
-
- About RevU
Cybersecurity Analyst+ Boot Camp (6w) (2026)
Our CompTIA Cybersecurity Analyst (CySA+) exam preparation program is designed to build the analytical and operational skills required to earn the credential. Recognized as a key certification for professionals responsible for detecting, analyzing, and responding to cybersecurity threats, CySA+ emphasizes real-world security operations and continuous monitoring. This course guides participants through targeted practice and assessments to reinforce applied skills, ensuring they are well-prepared to succeed on the exam.
ABOUT THIS COURSE
Designed for IT professionals with foundational security knowledge seeking to advance into analytical and operational cybersecurity roles, CompTIA Cybersecurity Analyst (CySA+) builds the skills needed to detect, analyze, and respond to cybersecurity threats. This certification strengthens confidence in applying data-driven security practices and communicating findings to technical teams, leadership, and organizational stakeholders.
CySA+ validates intermediate, vendor-neutral cybersecurity expertise across key domains, including threat and vulnerability management, security operations, incident response, and continuous monitoring.
Content in this course is:
- Aligned with the CompTIA CySA+ exam objectives (CS0-003);
- Designed around real-world, hands-on threat analysis and response scenarios;
- Reviewed and informed by subject matter experts with industry and instructional experience; and
- Structured to support learners preparing for intermediate-level cybersecurity analyst and security operations roles.
CompTIA certifications are globally recognized across industry, government, and academia. CySA+ is approved for U.S. Department of Defense (DoD) 8140/8570 compliance and aligned with the Cyber Workforce Framework (CWF), making it a key credential for professionals supporting operational cybersecurity and defense-related missions.

Overview
Modality
Online
Format
Asynchronous
Pricing
$2399.00
Partner
RevU
Topic
CompTIA
Featured Courses
General
Information Technology and Engineering
Course Dates
- Dates: 03/30-04/10, 2026
Why Choose GW RevU for CySA+ Prep?
- Join the GW Brand – Learn with the credibility and reputation of The George Washington University.
- Expert-Led Instruction – Courses taught by GW faculty with real-world industry experience.
- Interactive Learning – Live, synchronous sessions paired with dedicated exam prep time.
- Flexible Support – Personalized office hours scheduled around your availability.
- Expand Your Network – Connect with peers and professionals in the field.
- Direct Support – Connect with our Cybersecurity experts for one-on-one assistance.
COURSE REQUIREMENTS
CompTIA Cybersecurity Analyst (CySA+) Certification Requirements
There are no formal prerequisites for this certification. However, candidates must complete the following steps to earn and maintain the CompTIA Cybersecurity Analyst (CySA+) certification:
- Pass the CompTIA CySA+ certification examination (current exam: CS0-003);
- Earn the certification upon successful completion of the exam (no separate application process is required);
- Maintain the certification through CompTIA’s Continuing Education (CE) Program;
- Complete 60 Continuing Education Units (CEUs) within each three-year renewal cycle; and
- Submit CEUs and applicable renewal fees through the CompTIA certification portal before the certification expiration date.
Note: While not required, CompTIA recommends that candidates have Security+ (or equivalent knowledge) and approximately 3–4 years of hands-on cybersecurity or IT experience.
COURSE SYLLABUS
Security operations (33%)
- System and network architecture: explaining log ingestion, operating system (OS) concepts, infrastructure, network architecture, identity and access management (IAM), encryption, and sensitive data protection.
- Malicious activity indicators: analyzing network anomalies like bandwidth spikes and rogue devices, host issues like unauthorized software and data exfiltration, application irregularities like unexpected communication and service interruptions, and threats like social engineering attacks.
- Tools and techniques: detecting malicious activity using tools like Wireshark, security information and event management (SIEM), and VirusTotal, along with techniques like pattern recognition and email analysis, supported by scripting languages like Python and PowerShell.
- Threat intelligence and hunting: comparing threat actors, tactics, techniques, and procedures (TTP); confidence levels; collection methods; intelligence sharing; and hunting techniques.
- Process improvement: standardizing processes, streamlining operations, integrating tools, and using a single pane of glass.
Vulnerability management (30%)
- Vulnerability scanning: implementing asset discovery, internal vs. external scanning, agent vs. agentless, credentialed vs. non-credentialed, passive vs. active, static vs. dynamic, and critical infrastructure scanning.
- Assessment tool output: analyzing network scanning, web application scanners, vulnerability scanners, debuggers, multipurpose tools, and cloud infrastructure assessments.
- Vulnerability prioritization: interpreting common vulnerability scoring system (CVSS), validating findings, assessing exploitability, and considering asset value and zero-day vulnerabilities.
- Mitigation controls: recommending controls for cross-site scripting (XSS), overflow vulnerabilities, and data poisoning.
- Vulnerability response: explaining compensating controls, patching, configuration management, maintenance windows, exceptions, governance, service-level objectives (SLOs), secure software development life cycle (SDLC), and threat modeling.
Incident response management (20%)
- Attack methodology frameworks: explaining cyber kill chains, diamond model of intrusion analysis, MITRE ATT&CK, Open Source Security Testing Methodology Manual (OSSTMM), and OWASP testing guide.
- Incident response activities: performing detection, analysis, containment, eradication, and recovery.
- Incident management life cycle: explaining incident response plans, tools, playbooks, tabletop exercises, training, business continuity (BC), disaster recovery (DR), forensic analysis, and root cause analysis.
Reporting and communication (17%)
- Vulnerability management reporting: explaining compliance reports, action plans, inhibitors to remediation, metrics, key performance indicators (KPIs), and stakeholder communication.
- Incident response reporting: explaining incident declaration, escalation, reporting, communication, root cause analysis, lessons learned, and metrics and KPIs.
RELATED COURSES
Come Explore What GW RevU Can Offer You
Artificial Intelligence Fundamentals by ISACA
Offering Partner: RevU
Modalities Available: Online
CBNRE-2: Emerging Threats and Technology (0226)
Offering Partner: CBRNE
Modalities Available: Online
CBRNE Capstone Experience 2026 (0426)
Offering Partner: CBRNE
Modalities Available: In-Person
CBRNE-1: Leadership and Management (0126)
Offering Partner: CBRNE
Modalities Available: Online
CBRNE-1: Leadership and Management (0226)
Offering Partner: CBRNE
Modalities Available: Online
CBRNE-1: Leadership and Management (0326)
Offering Partner: CBRNE
Modalities Available: Online
CBRNE-2: Emerging Threats and Technology (0126)
Offering Partner: CBRNE
Modalities Available: Online
CBRNE-2: Emerging Threats and Technology (0326)
Offering Partner: CBRNE
Modalities Available: Online
CBRNE-3: Medical Management (0226)
Offering Partner: CBRNE
Modalities Available: Online
CBRNE-3: Medical Management (0326)
Offering Partner: CBRNE
Modalities Available: Online
CBRNE-WMD 2: Emerging Threats and Technology
Offering Partner: CBRNE
Modalities Available: Online
CBRNE-WMD: 2: Emerging Threats and Technology (Cohort 2)
Offering Partner: CBRNE
Modalities Available: Online
Certified in Risk and Information Systems Control (CRISC) by ISACA
Offering Partner: RevU
Modalities Available: Online
Certified Information Security Manager (CISM) by ISACA
Offering Partner: RevU
Modalities Available: Online
Certified Information Systems Auditor (CISA) by ISACA
Offering Partner: RevU
Modalities Available: Online
Cybersecurity Analyst+ Boot Camp (1w) 2026
Offering Partner: RevU
Modalities Available: Online
Information Technology Bachelor’s Degree Completion Program
Offering Partner: RevU
Modalities Available: Online
Instructor-Led CISM by GW RevU (1w)
Offering Partner: RevU
Modalities Available: Online
Instructor-Led CISM by GW RevU (6w)
Offering Partner: RevU
Modalities Available: Online
Internet of Things Fundamentals by ISACA
Offering Partner: RevU
Modalities Available: Online
IT Audit Fundamentals Certificate by ISACA
Offering Partner: RevU
Modalities Available: Online
IT Risk Fundamentals Certificate by ISACA
Offering Partner: RevU
Modalities Available: Online
Leadership and Management of CBRNE-WMD Organization and Teams (Cohort 3)
Offering Partner: CBRNE
Modalities Available: Online
Leadership and Management of CBRNE-WMD Organizations and Teams-Cohort 1
Offering Partner: CBRNE
Modalities Available: Online
Leadership and Management of CBRNE-WMD Organizations and Teams-Cohort 2
Offering Partner: CBRNE
Modalities Available: Online
Master’s of Cybersecurity Strategy & Information Management
Offering Partner: RevU
Modalities Available: online
Thank you for your interest in the George Washington University’s College of Professional Studies. Please fill out the request for information form below, and we will be in touch shortly.
Loading…Request Information
Georgie
This AI chatbot provides automated responses, which may not always be accurate. By continuing with this conversation, you agree that the contents of this chat session may be transcribed and retained. You also consent that this chat session and your interactions, including cookie usage, are subject to our privacy policy.
-
-
-