Skip to main content

Cybersecurity Analyst+ 1-week Bootcamps

Our CompTIA Cybersecurity Analyst (CySA+) exam preparation program is designed to build the analytical and operational skills required to earn the credential. Recognized as a key certification for professionals responsible for detecting, analyzing, and responding to cybersecurity threats, CySA+ emphasizes real-world security operations and continuous monitoring. This course guides participants through targeted practice and assessments to reinforce applied skills, ensuring they are well-prepared to succeed on the exam.

Designed for IT professionals with foundational security knowledge seeking to advance into analytical and operational cybersecurity roles, CompTIA Cybersecurity Analyst (CySA+) builds the skills needed to detect, analyze, and respond to cybersecurity threats. This certification strengthens confidence in applying data-driven security practices and communicating findings to technical teams, leadership, and organizational stakeholders.

CySA+ validates intermediate, vendor-neutral cybersecurity expertise across key domains, including threat and vulnerability management, security operations, incident response, and continuous monitoring.

Content in this course is:

  • Aligned with the CompTIA CySA+ exam objectives (CS0-003)1;
  • Designed around real-world, hands-on threat analysis and response scenarios;
  • Reviewed and informed by subject matter experts with industry and instructional experience; and
  • Structured to support learners preparing for intermediate-level cybersecurity analyst and security operations roles.

CompTIA certifications are globally recognized across industry, government, and academia. CySA+ is approved for U.S. Department of Defense (DoD) 8140/8570 compliance and aligned with the Cyber Workforce Framework (CWF), making it a key credential for professionals supporting operational cybersecurity and defense-related missions.

You should expect to dedicate an entire week full-time to this course.

Overview

Modalities

Online

Formats

Instructor-Led

Price

$2,399.00

Partners

RevU

Course Dates

See Available Sections

Topics

Information Technology and Engineering

This Course Offered By

Red text "CompTIA" and registered trademark

There are no formal prerequisites for this certification. However, candidates must complete the following steps to earn and maintain the CompTIA Cybersecurity Analyst (CySA+) certification:

  • Pass the CompTIA CySA+ certification examination1;
  • Earn the certification upon successful completion of the exam2;
  • Maintain the certficiation through CompTIA’s Continuing Education (CE) Program;
  • Complete 60 Conintuing Education Units (CEUs) withiin each three-year renewal cycle; and
  • Submit CEUs and applicable renewal fees through the CompTIA certification portal before the certification expiration date.

1 – Current exam, CS0-003.

2 – No separation application is required.

Note: While not required, CompTIA recommends that candidates have Security+ (or equivalent knowledge) and approximately 3–4 years of hands-on cybersecurity or IT experience.

Schedule

Classes Start
Jan 01, 2026

Classes End
Mar 12, 2026

Meeting Times
W 7:00PM to 8:00PM

Instruction

Format
Instructor-Led

Instructors

Dr. Scott White

Dr. Scott White

Program Director – Cybersecurity Bachelor Completion Program

Fees

Cost
$2,399.00

Schedule

Classes Start
Jan 01, 2026

Classes End
Apr 16, 2026

Meeting Times
W 7:00PM to 8:00PM

Instruction

Format
Instructor-Led

Instructors

Dr. Scott White

Dr. Scott White

Program Director – Cybersecurity Bachelor Completion Program

Fees

Cost
$2,399.00

Schedule

Classes Start
Jan 01, 2026

Classes End
May 14, 2026

Meeting Times
W 7:00PM to 8:00PM

Instruction

Format
Instructor-Led

Instructors

Dr. Scott White

Dr. Scott White

Program Director – Cybersecurity Bachelor Completion Program

Fees

Cost
$2,399.00

Schedule

Classes Start
Jan 01, 2026

Classes End
Jun 11, 2026

Meeting Times
W 7:00PM to 8:00PM

Instruction

Format
Instructor-Led

Instructors

Dr. Scott White

Dr. Scott White

Program Director – Cybersecurity Bachelor Completion Program

Fees

Cost
$2,399.00

Schedule

Classes Start
Jan 01, 2026

Classes End
Jul 19, 2026

Meeting Times
W 7:00PM to 8:00PM

Instruction

Format
Instructor-Led

Instructors

Dr. Scott White

Dr. Scott White

Program Director – Cybersecurity Bachelor Completion Program

Fees

Cost
$2,399.00

Schedule

Classes Start
Jan 01, 2026

Classes End
Aug 13, 2026

Meeting Times
W 7:00PM to 8:00PM

Instruction

Format
Instructor-Led

Instructors

Dr. Scott White

Dr. Scott White

Program Director – Cybersecurity Bachelor Completion Program

Fees

Cost
$2,399.00

Security operations (33%:)

  • System and network architecture: explaining log ingestion, operating system (OS) concepts, infrastructure, network architecture, identity and access management (IAM), encryption, and sensitive data protection.
  • Malicious activity indicators: analyzing network anomalies like bandwidth spikes and rogue devices, host issues like unauthorized software and data exfiltration, application irregularities like unexpected communication and service interruptions, and threats like social engineering attacks.
  • Tools and technqiues: deletectig malicious activity using tools like Wireshark, security information and event management (SIEM), and VirusTotal, along with techniques like pattern recognition and email analysis, supported by scripting languages like Python and PowerShell.
  • Process improvement: standardizing proceses, streamlining operations, integrating tools, and using a single pane of glass.

Vulernability management (30%):

  • Vulnerability scanning: implementing asset discovery, internal vs. external scanning, agent vs. agentless, credentialed vs. non-credentialed, passive vs. active, static vs. dynamic, and critical infrastructure scanning.
  • Assessment tool output: analyzing network scanning, web applications scanners, vulnerability scanners, debuggers, multipurpose tools, and cloud infrastructure assessments.
  • Vulnerability prioritization: interpreting common vulnerability scoring systems (CVSS), validating findings, assessing exploitability, and considering asset value and zero-day vulnerabilities.
  • Mitigation controls: recommending controls for cross-site scipting (XSS), overflow vulnerabilities, and data poisoning.
  • Vulnerability response: explaining compensating controls, patching, configuration management, maintenance windows, exceptions, governance, service-level objectives (SLOs), secure software development life cycle (SDLC), and threat modeling.

Incident response management (20%):

  • Attack methodology frameworks: explaining cyber kill chains, diamond model of intrusion analysis, MITRE ATT&CK, Open Source Security Testing Methodology Manual (OSSTMM), and OWASP testing guide.
  • Incident response activities: performing detection, analysis, containment, eradication, and recovery.
  • Incident response management lifecycle: explaining incident response plans, tools, playbooks, tabletop exercises, training, business continuity (BC), disaster recovery (DR), forensic analysis, and root cause analysis.

Reporting and communication (17%):

  • Vulnerability management and reporting: explaining compliance reports, action plans, inhibitors to remediation, metrics, key performance indicators (KPIs), and stakeholder communication.
  • Incident response reporting: explaining incident declaration, escalation, reporting, communication, root cause analysis, lessons learned, and metrics and KPIs.

  • Enhance security operations, differentiate threat intelligence and threat hunting, and identify malicious activity using appropriate tools. 
  • Conduct vulnerability management assessments, prioritize vulnerabilities, and recommend effective mitigation strategies for vulnerability management. 
  • Apply attack methodology frameworks, perform incident response, and understand the incident management lifecycle to handle security incidents effectively. 
  • Utilize communication best practices to report on vulnerability management and incident response, providing stakeholders with actionable plans and meaningful metrics.