CompTIA CySA+ Self-Study Online Labs

No Comments


  • Practice makes perfect Improve practical IT skills
  • Certification ready Significantly increase chances of certification success
  • No hardware or software needed No complicated software installation
  • 24×7 access Accessible through the internet, from anywhere, 24×7

Self-Study Online Labs are provided by Practice Labs.

In Stock


The CompTIA CySA+ Self-Study Online Labs will provide you with a platform to gain hands on skills in information security.

By completing the lab tasks you will improve your practical skills in configuring and using threat detection tools, data analysis, identifying vulnerabilities, identifying threats, and risks, and securing and protecting applications and systems within an organization. These same tasks will help you understand the objectives and competencies required by the CompTIA CySA+ certification exam (CS0-001).

CompTIA CySA+ Cybersecurity Analyst is an intermediate certificate aimed at IT security analysts, vulnerability analysts, threat intelligence analysts, or IT professionals seeking to advance into the industry.

This Self-Study Online Lab focuses on the practical aspects of the exam objectives. It is therefore advised to refer to your own course materials to gain a deeper understanding of any theoretical aspects of the exam objectives. It is also recommended that you have taken and passed the CompTIA Security+ SY0-401/SY0-501 certification exam before beginning your CySA+ studies.

No prior hands-on experience is required to use or complete this Self-Study Online Lab, however we have assumed that you know how to use a computer and that you are familiar with basic networking technologies and information security concepts.

The following topics are covered by CompTIA CySA+ CS0-001 Self-Study Online Labs:

  • Topology Discovery Part 1 :: Basic Scanning :: Discovering Network Topologies :: Topology Discovery against Firewalls
  • Topology Discovery Part 2 :: OS Fingerprinting :: Output Logs :: Zenmap the Nmap GUI
  • DNS Harvesting :: DNS Harvesting with Application Software :: DNS Harvesting Online :: ICANN Website
  • Social Engineering Reconnaissance :: Social Engineering Reconnaissance
  • Windows Command Line Tools :: IPconfig :: Netstat :: Ping :: Tracert and Route :: ARP and Whoami
  • Vulnerability Scanner Nessus :: Downloading and Installing Nessus :: Configuring Nessus :: Scanning with Nessus :: Reviewing a Nessus Scan :: Saving Nessus Reports
  • Vulnerability Scanner MBSA :: Introduction to Microsoft Baseline Security Analyser :: Implementing Recommendations :: Saving Microsoft Security Baseline Analyzer Reports :: Reviewing Configuration Changes
  • Encryption and Hashing :: Cryptographic Basics :: Hash Algorithms Compared :: Comparing Hash Values
  • Passive Topology Discovery :: Packet Capture with Wireshark :: Output Logs :: Packet Analysis Part 1 :: Packet Analysis Part 2
  • Packet Sniffing :: Packet Sniffing for Passwords :: Packet Sniffing for Image Capture and Extraction
  • Compliance Patching :: Install and Configure WSUS :: WSUS Server Certificates Security :: Create Computer Groups for WSUS :: Configure GPO Policy for WSUS
  • Introduction to Syslog :: Syslog Forwarder :: Syslog Collector :: Syslog Analysis
  • Monitoring Servers :: Data Collector Sets :: Configuring Alerts for Data Collector Sets :: Configure Event Subscription
  • Alienvault Monitoring – SIEM and Netflow :: AlienVault Exploration and Configuration :: Netflow Monitoring :: Traffic Capture with AlienVault :: NMAP vs AlienVault :: AlienVault SIEM Analysis and Tickets
  • Alienvault Monitoring – Threats Vulnerabilities and Reporting :: Adding AlienVault Users :: Vulnerability Scanning for Threats Through AlienVault :: Viewing the Threat Results :: File Reporting :: Dashboard Events and SIEM Analysis
  • DVWA – Manual SQL Injection and Password Cracking :: DVWA Usage :: Performing an SQL Injection Attack :: Password Cracking with John
  • IPv4 and IPv6 Access Lists for Traffic Filtering :: Configuring Standard and Extended Access Lists using IPv4 :: Configuring Named Access Lists Using IPv4 :: Creating Access-Lists in IPv6
  • Configure Verify and Troubleshoot Port Security :: Static and Dynamic Port Security :: Additional Port Security Configuration Settings :: Configuring Err-disable Recovery
  • Implement IOS Features to Mitigate Threats :: Implementing ACLs using the CLI to Mitigate Address Spoofing :: Implementing ACLs using the CLI to Mitigate Against ICMP Reconnaissance Attacks :: Using TCP Intercept to Help Prevent DOS Attacks :: Configure and Verify VACLs
  • Securing the Management Plane on Cisco Routers :: Securing In-Band Remote Access using SSH :: Configuring Custom Privilege Levels and Views :: Cisco IOS and Key Network Services
  • Configure Verify and Troubleshoot GRE Tunnel Connectivity :: Configuring a GRE Tunnel
  • Implement SSL VPN using ASA Device Manager :: Implement a Clientless SSL VPN using the Cisco ASA Device Manager :: Implement AnyConnect using the Cisco ASA Device Manager
  • Implement the Cisco Adaptive Security Appliance :: Configuring Core ASA Features :: Configuring NAT :: Configuring a Security Policy :: Modular Policy Framework
  • Forensics – E-mail and Social Media Investigations :: Using OSForensics to Recover E-mail :: Email Examination Example :: Image Examination Example :: FaceBook Forensics
  • Forensics – Understanding the Digital Forensics Profession and Investigations :: Acquiring an Image of Evidence Media :: Analyzing Your Digital Evidence :: Analysis Example :: Report Example :: Keyword Search Example

To ensure you’re well on track and to compliment your learning, we recommend that you also purchase the online learning course below.

You may also like…

Posted by Pippa Russell in .

Leave a Comment

Your email address will never be published or shared and required fields are marked with an asterisk (*).