Section 01: Introduction | |||
Introduction | 00:02:00 | ||
All about the Exam | 00:08:00 | ||
What’s New on the CompTIA CySA + Exam? | 00:05:00 | ||
Meet the Instructors | 00:02:00 | ||
Thinking like the Enemy | 00:09:00 | ||
Tools of the Trade7 | 00:08:00 | ||
Resource – CompTIA CySA+ (CS0-002) Exam Objectives | 00:00:00 | ||
Section 02: The Importance Of Threat Data And Intelligence | |||
Intelligence Sources and Confidence Levels | 00:08:00 | ||
Threat Indicators and Actors | 00:08:00 | ||
Threat Trends | 00:07:00 | ||
Intelligence Cycle and ISACs | 00:06:00 | ||
Resource: Slides Handouts2 | 00:00:00 | ||
Section 03: Threat Intelligence In Support Of Organisational Security | |||
Attack Frameworks | 00:06:00 | ||
Threat Research | 00:11:00 | ||
Threat Modeling and Intelligence Sharing | 00:06:00 | ||
Resource: Slides Handouts3 | 00:00:00 | ||
Section 04: Vulnerability Management Activities | |||
Vulnerability Identification | 00:07:00 | ||
Scanning Parameters and Criteria | 00:09:00 | ||
Scanning Special Considerations | 00:06:00 | ||
Validation | 00:03:00 | ||
Remediation and Mitigation | 00:08:00 | ||
Inhibitors to Remediation | 00:07:00 | ||
Resource: Slides Handouts4 | 00:00:00 | ||
Section 05: Vulnerability Assessment Tools | |||
Web Applications Scanners, Part 1 | 00:10:00 | ||
Web Applications Scanners, Part 2 | 00:05:00 | ||
Scanning | 00:06:00 | ||
Configuring and Executing Scans | 00:08:00 | ||
Vulnerability Scanning7 | 00:10:00 | ||
Reverse Engineering | 00:08:00 | ||
Enumeration | 00:06:00 | ||
Wireless Assessment Tools | 00:08:00 | ||
Cloud Assessment Tools | 00:04:00 | ||
Resource: Slides Handouts5 | 00:00:00 | ||
Section 06: Threats And Vulnerabilities Associated With Specialised Technology | |||
Mobile and IoT | 00:10:00 | ||
Embedded and Firmware Systems (RTOS, SoC, and FPGA) | 00:09:00 | ||
Access and Vehicles Risk | 00:08:00 | ||
Automation and Control Risk | 00:10:00 | ||
Resource: Slides Handouts6 | 00:00:00 | ||
Section 07: Threats And Vulnerabilities Associated With Operating In The Cloud | |||
Cloud Models | 00:07:00 | ||
Remote Service Invocation (FaaS, IaC, API) | 00:10:00 | ||
Cloud Vulnerabilities | 00:06:00 | ||
Resource Handouts7 | 00:00:00 | ||
Section 08: Mitigating Controls For Attacks And Software Vulnerabilities | |||
Injection and Overflow Attacks | 00:09:00 | ||
Authentication Attacks7 | 00:07:00 | ||
Exploits | 00:08:00 | ||
Application Vulnerabilities, Part 1 | 00:08:00 | ||
Application Vulnerabilities, Part 2 | 00:07:00 | ||
Resource Handouts8 | 00:00:00 | ||
Section 09: Security Solutions For Infrastructure Management | |||
Network Architecture and Asset Management | 00:09:00 | ||
Protecting Your Territory | 00:05:00 | ||
Identity and Access Management7 | 00:11:00 | ||
Encryption and Active Defense | 00:08:00 | ||
Resource Handouts9 | 00:00:00 | ||
Section 10: Software Assurance Best Practices | |||
Platforms | 00:07:00 | ||
SOA and DevSecOps | 00:09:00 | ||
Secure Software Development | 00:08:00 | ||
Best Coding Practices | 00:04:00 | ||
Resource Handouts10 | 00:00:00 | ||
Section 11: Hardware Assurance Best Practices | |||
Trusted Hardware | 00:10:00 | ||
Hardware Encryption | 00:04:00 | ||
Hardware Security | 00:08:00 | ||
Resource Handouts11 | 00:00:00 | ||
Section 12: Data Analysis In Security Monitoring Activities | |||
Data Analytics | 00:10:00 | ||
Endpoint Security | 00:08:00 | ||
Recon Results, Part 1 | 00:13:00 | ||
Recon Results, Part 2 | 00:05:00 | ||
Impact Analysis | 00:05:00 | ||
Collective Tools | 00:09:00 | ||
Query Writing | 00:07:00 | ||
E-mail Analysis, Part 1 | 00:10:00 | ||
E-mail Analysis, Part 2 | 00:08:00 | ||
Resource Handouts12 | 00:00:00 | ||
Section 13: Implement Configuration Changes To Existing Controls To Improve Security | |||
Permissions | 00:09:00 | ||
Firewalls7 | 00:08:00 | ||
Intrusion Prevention Rules | 00:05:00 | ||
DLP and Endpoint Detection | 00:05:00 | ||
Frustration and attrition | 00:13:00 | ||
Resource Handouts 13 | 00:00:00 | ||
Section 14: The Importance Of Proactive Threat Hunting | |||
Threat Hunting and the Hypothesis | 00:06:00 | ||
Threat Hunting Process | 00:07:00 | ||
Results and Benefits | 00:05:00 | ||
Resource Handouts14 | 00:00:00 | ||
Section 15: Automation Concepts And Technologies | |||
Workflow and Scripting | 00:07:00 | ||
API and Malware Signature Creation | 00:08:00 | ||
Threat Feeds and Machine Learning | 00:06:00 | ||
Protocols, Standards, and Software Engineering | 00:05:00 | ||
Resource Handouts15 | 00:00:00 | ||
Section 16: The Importance Of The Incident Response Process | |||
IR Roles and Responsibilities | 00:08:00 | ||
IR Active Preparation | 00:10:00 | ||
Resource Handouts16 | 00:00:00 | ||
Section 17: Appropriate Incident Response Procedures | |||
Incident Response Process | 00:07:00 | ||
Resource Handouts17 | 00:00:00 | ||
Section 18: Analyse Potential Indicators Of Compromise | |||
Network Symptoms | 00:04:00 | ||
Host Symptoms | 00:08:00 | ||
Application Symptoms | 00:04:00 | ||
Resource Handouts18 | 00:00:00 | ||
Section 19: Utilise Basic Digital Forensics Techniques | |||
Digital Forensics7 | 00:10:00 | ||
Seizure and Acquisitions | 00:05:00 | ||
Forensics Acquisition Tools | 00:09:00 | ||
Mobile, Virtualization, and Cloud | 00:06:00 | ||
Forensics Analysis, Part 1 | 00:04:00 | ||
Forensics Analysis, Part 2 | 00:08:00 | ||
Packet Capture | 00:12:00 | ||
Resource Handouts19 | 00:00:00 | ||
Section 20: The Importance Of Data Privacy And Protection | |||
Data Privacy and Security | 00:06:00 | ||
Nontechnical Controls | 00:09:00 | ||
Technical Controls | 00:08:00 | ||
Resource Handouts20 | 00:00:00 | ||
Section 21: Security Concepts In Support Of Organisational Risk Mitigation | |||
Business Impact Analysis7 | 00:05:00 | ||
Risk Identification | 00:05:00 | ||
Risk Calculation and Communication | 00:06:00 | ||
Training | 00:04:00 | ||
Supply Chain Assessment | 00:04:00 | ||
Resource Handouts21 | 00:00:00 | ||
Section 22: The Importance Of Frameworks, Policies, Procedures, And Controls | |||
Frameworks | 00:13:00 | ||
Policies and Procedures | 00:05:00 | ||
Controls and Procedures | 00:08:00 | ||
Verification | 00:06:00 | ||
Resource Handouts22 | 00:00:00 | ||
Order Your Certificates & Transcripts | |||
Order your Certificates & Transcripts | 00:00:00 |
No Reviews found for this course.
Can’t find the anwser you’re looking for ? Reach out to customer support team.
There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course.
You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience.
For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime.
Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks.
We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase.
Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course.
If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.