Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Exclusive - CompTIA CySA+ (CS0-002)
Introduction
Promo (1:05)
Introduction (2:25)
All About the Exam (8:14)
What's New in the CompTIA CySA+ Exam? (4:51)
Meet the Instructors (2:20)
Thinking Like the Enemy (9:15)
Tools of the Trade (7:31)
Course Materials
Exam Pratice Questions
Chapter 1: The Importance of Threat Data and Intelligence
Intelligence Sources and Confidence Levels (7:57)
Threat Indicators and Actors (7:59)
Threat Trends (6:50)
Intelligence Cycle and ISACs (6:15)
Chapter 1: The Importance of Threat Data and Intelligence Quiz
Chapter 2: Threat Intelligence in Support of Organizational Security
Attack Frameworks (6:15)
Threat Research (11:09)
Threat Modeling and Intelligence Sharing (5:33)
Chapter 3: Vulnerability Assessment Tools
Vulnerability Identification (7:25)
Scanning Parameters and Criteria (9:13)
Scanning Special Considerations (5:36)
Validation (3:26)
Remediation and Mitigation (7:49)
Inhibitors to Remediation (6:58)
Chapter 4: Threats and Vulnerabilities Associated with Specialized Technology
Web Applications Scanners, Part 1 (9:34)
Web Applications Scanners, Part 2 (5:12)
Scanning (5:45)
Configuring and Executing Scans (7:42)
Preventative Tools, Part 1 (20:31)
Preventative Tools, Part 2 (6:16)
Vulnerability Scanning (9:46)
Reverse Engineering (7:37)
Enumeration (6:21)
Wireless Assessment Tools (7:39)
Cloud Assessment Tools (3:35)
Chapter 5: Threats and Vulnerabilities Associated with Specialized Technology
Mobile and IoT (9:48)
Embedded and Firmware Systems (RTOS, SoC, and FPGA) (9:18)
Access and Vehicles Risk (8:01)
Automation and Control Risk (10:03)
Chapter 6: Threats and Vulnerabilities Associated with Operating in the Cloud
Cloud Models (6:38)
Remote Service Invocation (FaaS, IaC, API) (9:32)
Cloud Vulnerabilities (6:10)
Chapter 7: Mitigating Controls for Attacks and Software Vulnerabilities
Injection and Overflow Attacks (9:25)
Authentication Attacks (6:33)
Exploits (8:08)
Application Vulnerabilities, Part 1 (7:37)
Application Vulnerabilities, Part 2 (6:57)
Chapter 8: Security Solutions for Infrastructure Management
Network Architecture and Asset Management (8:50)
Protecting Your Territory (4:49)
Identity and Access Management (11:17)
Encryption and Active Defense (8:26)
Chapter 9: Software Assurance Best Practices
Platforms (7:00)
SOA and DevSecOps (8:44)
Secure Software Development (7:43)
Best Coding Practices (4:08)
Chapter 10: Hardware Assurance Best Practices
Trusted Hardware (9:43)
Hardware Encryption (4:28)
Hardware Security (7:44)
Chapter 11: Data Analysis in Security Monitoring Activities
Data Analytics (9:44)
Endpoint Security (7:32)
Recon Results, Part 1 (13:01)
Recon Results, Part 2 (4:47)
Impact Analysis (4:30)
Collective Tools (8:53)
Query Writing (6:43)
E-mail Analysis, Part 1 (9:30)
E-mail Analysis, Part 2 (7:56)
Ch12: Implement Configuration Changes to Existing Controls to Improve Security
Permissions (8:50)
Firewalls (7:30)
Intrustion Prevention Rules (5:16)
DLP and Endpoint Detection (4:57)
Chapter 13: The Importance of Proactive Threat Hunting
Threat Hunting and the Hypothesis (6:26)
Threat Hunting Process (7:14)
Results and Benefits (4:54)
Chapter 14: Compare and Contrast Automation Concepts and Technologies
Workflow and Scripting (7:27)
API and Malware Signature Creation (7:46)
Threat Feeds and Machine Learning (6:02)
Protocols, Standards, and Software Engineering (5:15)
Chapter 15: The Importance of the Incident Response Process
IR Active Preparation (9:41)
IR Roles and Responsibilities (7:38)
Chapter 16: Appropriate Incident Response Procedures
Incident Response Process (6:36)
Chapter 17: Analyze Potential Indicators of Compromise
Network Symptoms (3:30)
Host Symptoms (8:03)
Application Symptoms (4:22)
Chapter 18: Utilize Basic Digital Forensics Techniques
Digital Forensics (9:33)
Seizure and Acquisitions (4:52)
Forensics Acquisition Tools (8:52)
Mobile, Virtualization, and Cloud (5:51)
Forensics Analysis, Part 1 (4:24)
Forensics Analysis, Part 2 (7:46)
Packet Capture (11:36)
Chapter 19: The Importance of Data Privacy and Protection
Data Privacy and Security (6:13)
Nontechnical Controls (8:47)
Technical Controls (7:48)
Chapter 20: Security Concepts in Support of Organizational Risk Mitigation
Business Impact Analysis (4:30)
Risk Identification (5:18)
Risk Calculation and Communication (6:10)
Training (3:59)
Supply Chain Assessment (4:12)
Chapter 21: The Importance of Frameworks, Policies, Procedures, and Controls
Frameworks (13:01)
Policies and Procedures (4:29)
Controls and Procedures (7:39)
Verification (6:11)
Teach online with
Cloud Assessment Tools
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock