Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Exclusive - CompTIA CySA+ Cybersecurity Analyst
Chapter 1: Introduction
01 - Thinking Like the Enemy (9:20)
02 - Tools of the Trade (7:35)
New Lecture
Chapter 01 Conducting Reconnaissance Quiz
Chapter 2: Analyzing Reconnaissance Results
01 - Recon Results: Part 1 (13:06)
02 - Recon Results: Part 2 (4:52)
03 - Data Output (5:01)
Chapter 02 Analyzing Reconnaissance Results Quiz
Chapter 3: Responding to Network-Based Threats
01 - Protecting Your Territory (4:53)
02 - Hardening Strategies (12:42)
Chapter 03 Responding to Network-Based Threats Quiz
Chapter 4: Securing a Corporate Environment
01 - Pen Testing (5:42)
02 - Training (4:03)
03 - Reverse Engineering (7:42)
04 - Risk Evaluation (2:34)
Chapter 04 Securing a Corporate Environment Quiz
Chapter 5: Vulnerability Management
01 - Requirements Identification (4:50)
02 - Scanning (5:49)
03 - Configuring and Executing Scans (7:47)
04 - Reporting and Remediating (9:24)
Chapter 05 Vulnerability Management Quiz
Chapter 6: Analyzing Vulnerabilities Scan Results
01 - Common Vulnerabilities: Part 1 (7:58)
02 - Common Vulnerabilities: Part 2 (7:50)
Chapter 06 Analyzing Vulnerabilities Scan Results Quiz
Chapter 7: Incident Response
01 - Incident Response Process (6:40)
02 - IR Roles and Responsibilities (7:43)
Chapter 07 Incident Response Quiz
Chapter 8: Preparation Phase
01 - IR Active Preparation (9:45)
02 - Threat Trends (7:35)
Chapter 08 Defensive Strategies Quiz
Chapter 9: Forensic Tools
01 - Digital Forensics (9:37)
02 - Seizure and Acquisitions (4:56)
03 - Forensics Acquisition Tools (8:57)
04 - Forensics Analysis: Part 1 (4:29)
05 - Forensics Analysis: Part 2 (7:51)
Chapter 09 Forensic Tools Quiz
Chapter 10: Common Symptoms of Compromise
01 - Network Symptoms (3:34)
02 - Host Symptoms (8:07)
03 - Application Symptoms (4:27)
Chapter 10 Common Symptoms of Compromise Quiz
Chapter 11: Incident Recovery and Post-Incident Response Process
01 - Moving Forward: Part 1 (13:06)
02 - Moving Forward: Part 2 (8:02)
Chapter 11 Incident Recovery and Post-Incident Response Process Quiz
Chapter 12: Frameworks, Common Policies, Controls, and Procedures
01 - Frameworks (13:06)
02 - Policies (7:31)
03 - Controls & Procedures (7:44)
04 - Verifications (6:16)
Chapter 12 Frameworks, Common Policies, Controls, and Procedures Quiz
Chapter 13: Identity and Access Management
01 - Context-Based Authentication (6:20)
02 - Identities (15:17)
03 - Managing Identities (9:43)
04 - Exploits (8:12)
Chapter 13 Identity and Access Management Quiz
Chapter 15: Defense Strategies
01 - Data Analytics (9:48)
02 - Defense in Depth (14:14)
Chapter 14 Defensive Tactics Quiz
Chapter 15: Software Development Life Cycle (SDLC)
01 - Secure Software Development (7:47)
02 - Best Coding Practices (4:12)
Chapter 15 Software Development Life Cycle (SDLC) Quiz
Chapter 16: Tools and Technologies
01 - Preventative Tools: Part 1 (20:35)
02 - Preventative Tools: Part 2 (6:20)
03 - Collective Tools (8:57)
04 - Vulnerability Scanning (15:54)
05 - Packet Capture (11:40)
06 - Connectivity Tools (8:00)
07 - Pen Testing Tools (11:55)
Chapter 16 Tools and Technologies Quiz
Teach online with
Chapter 13 Identity and Access Management Quiz
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock