CompTIA Cybersecurity Analyst Bootcamp (CYSA+)

An advanced level course with CompTIA CYSA+ certification for IT and cybersecurity professionals.

Welcome to Moringa School

2025 Intake in Progress

Part-time Remote

Start Date:
2025 Intake in progress
Course Duration:
20 Weeks
Mode of Learning:
100% Online Classes | Mon - Fri 6 pm - 9 pm E.A.T
Tuition Fee:
Ksh 230,000
Exam Fee:
$181

Cybersecurity is a fast-growing career with 32% growth expected by 2032

The CompTIA Cybersecurity Analyst Bootcamp (CYSA+) is a certification for IT and cyber professionals tasked with incident detection, prevention, and response through continuous security monitoring.

You’ll develop a deep understanding of vulnerability management strategies, and expertise in incident response and recovery procedures. You will also master security architecture principles and tools that will enable you to design secure systems that protect against cyberattacks. Additionally, you’ll learn how to navigate compliance and regulatory frameworks, ensuring that security practices align with industry standards and legal requirements. By the end of the course, learners will earn a certificate of completion from Moringa and a CompTIA CYSA+ certification.

Course Details

Cybersecurity refers to the practice of protecting systems, networks, and programs from digital attacks, unauthorized access, damage, or theft. It encompasses a wide range of technologies, processes, and practices designed to safeguard computers, servers, mobile devices, electronic systems, networks, and data from cyber threats.

This course is tailored for IT/Networking/Cybersecurity professionals with 2+ years of experience who are ready to take their careers to the next level.

  1. Have knowledge and Network+, and Security+ certifications or equivalent knowledge.
  2. Have a minimum of 2+ years of IT work experience.
  3. Proficiency in English
  4. Have a computer or laptop ( core i5 – i7, 8GB RAM, 500GB memory).
  5. Have access to stable internet.

  1. Cybersecurity Analytics Focus: Unlike more general certifications, CySA+ targets cybersecurity analytics, helping you gain expertise in proactive security measures, threat hunting, and identifying advanced persistent threats (APTs).
  2. High Demand for Cybersecurity Analysts: Organizations are increasingly seeking professionals with skills in threat detection and vulnerability management. CySA+ qualifies you for roles such as security analyst, SOC analyst, and vulnerability analyst, which are in high demand across industries.
  3. Intermediate-Level Certification: CySA+ is an excellent stepping stone between foundational certifications like Security+ and more advanced ones like Certified Information Systems Security Professional (CISSP). It’s perfect for those looking to deepen their cybersecurity expertise.
  4. Compliance with Industry Standards: The CySA+ certification aligns with government and industry standards like the Department of Defense (DoD) 8570 framework, which makes it particularly valuable for professionals working in regulated environments or aiming to work in government-related cybersecurity roles.

If you are in search of a unique learning experience this is the place for you. We guarantee you will learn market-aligned skills through our practical and comprehensive curriculum.

  1. Practical & project-based learning
  2. Access to industry-relevant cybersecurity labs & projects on Try Hack Me Labs
  3. Dedicated Technical mentor support
  4. Highly Discounted Exam vouchers to sit for the certification exam in comparison to the market price
  5. Dual certification – A certificate of completion from Moringa & CYSA+ from CompTIA

By obtaining CySA+, you'll strengthen your knowledge in critical areas of cybersecurity and open doors to advanced roles that involve protecting organizations from ever-evolving cyber threats.

Get Started - Apply Now

Curriculum Overview

  • Course Overview
  • System configurations and installations

  • Cybersecurity Leadership Concepts
  • Assisted Lab: Exploring The Lab Environment
  • Control Types and Methods
  • Assisted Lab: Configuring Controls
  • Patch Management Concepts

  • Threat Actor Concepts
  • Active Threats
  • Assisted Lab: Reviewing IoC and Threat Intelligence Sources
  • Threat-Hunting Concepts
  • PBQ: Performing Threat Intelligence
  • Assisted Lab: Performing Threat-hunting

  • System and Network Architecture Concepts
  • PBQ: Analyzing Network Infrastructures
  • Applied Lab: Performing System Hardening
  • Identity and Access Management (IAM)
  • Assisted Lab: Configuring Centralized Logging
  • Operational Visibility
  • Assisted Lab: Assess Time Sync Errors

  • Leadership In Security Operations
  • Assisted Lab: Configuring Automation
  • Technology for Security Operations
  • PBQ: Responding to A Security Incident

  • Compliance Requirements
  • Vulnerability Scanning Methods
  • PBQ: Implementing Vulnerability Scanning Methods
  • PBQ: Analyzing Vulnerability Scans
  • Assisted Lab: Performing Asset Discovery
  • Assisted Lab: Performing Passive Scanning
  • Assisted Lab: Performing Vulnerability Scanning

  • Vulnerability Scoring Concepts
  • PBQ: Analyzing Data to Prioritize Vulnerabilities
  • Vulnerability Context Considerations
  • Assisted Lab: Establishing Context Awareness

  • Effective Communication Concepts
  • Assisted Lab: Analyzing Vulnerability Scans
  • Vulnerability Reporting Outcomes and Action Plans
  • PBQ: Performing Vulnerability Assessment
  • Assisted Lab: Detecting Legacy Systems

  • Incident Response Planning
  • Adaptive Lab: Performing Playbook Incident Response
  • Applied Lab: Performing IoC Detection and Analysis
  • Applied Lab: Performing Post-Incident Forensic Analysis
  • Applied Lab: Collecting Forensic Evidence
  • Incident Response Communication
  • PBQ: Performing Incident Response Reporting
  • Assisted Lab: Performing Root Cause Analysis

  • Malicious Activity
  • Assisted Lab: Using File Analysis Techniques
  • Assisted Lab: Analyzing Potentially Malicious Files
  • Applied Lab: Using Network Sniffers
  • Attack Methodology Frameworks
  • Techniques for Identifying Malicious Activity
  • PBQ: Identifying Malicious Activity
  • Applied Lab: Researching DNS and IP Reputation

  • Web Vulnerabilities
  • Applied Lab: Performing Web Vulnerability Scanning
  • Cloud Vulnerabilities
  • PBQ: Analyzing Cloud Vulnerability Assessment Output
  • Assisted Lab: Analyzing Cloud Vulnerabilities

  • Scripting Languages
  • PBQ: Identifying Programming Languages
  • Malicious Activity Through Analysis
  • PBQ: Identifying Malicious Activity Through Analysis

  • Secure Software Development Practices
  • Assisted Lab: Exploiting Weak Cryptography
  • Controls to Mitigate Successful Application Attacks
  • PBQ: Applying Security Solutions for Software Assurance
  • Assisted Lab: Performing Directory Traversal and Command Injection
  • Assisted Lab: Performing and Detecting XSS, LFI/RFI, SQLi, SCRF
  • Controls to Prevent Attacks
  • Assisted Lab: Performing and Detecting Privilege Escalation
  • Applied Lab: Detecting and Exploiting Security Misconfiguration

As a working professional, CySA+ will enhance your ability to detect and respond to advanced threats using real-time behavioral analytics, a skill highly sought after in today’s cybersecurity landscape. This certification bridges the gap between traditional IT security and proactive security operations, making you an indispensable asset to any organization.

Career Opportunities

Ready to Get Started?