Course Curriculum
Chapter 1: Introduction
- 01 – Thinking Like the Enemy (9:20)
- 02 – Tools of the Trade (7:35)
- New Lecture
- Chapter 01 Conducting Reconnaissance Quiz
Chapter 2: Analyzing Reconnaissance Results
- 01 – Recon Results: Part 1 (13:06)
- 02 – Recon Results: Part 2 (4:52)
- 03 – Data Output (5:01)t
- Chapter 02 Analyzing Reconnaissance Results Quiz
Chapter 3: Responding to Network-Based Threats
- 01 – Protecting Your Territory (4:53)
- 02 – Hardening Strategies (12:42)
- Chapter 03 Responding to Network-Based Threats Quiz
Chapter 4: Securing a Corporate Environment
- 01 – Pen Testing (5:42)
- 02 – Training (4:03)
- 03 – Reverse Engineering (7:42)
- 04 – Risk Evaluation (2:34)
- Chapter 04 Securing a Corporate Environment Quiz
Chapter 5: Vulnerability Management
- 01 – Requirements Identification (4:50)
- 02 – Scanning (5:49)
- 03 – Configuring and Executing Scans (7:47)
- 04 – Reporting and Remediating (9:24)
- Chapter 05 Vulnerability Management Quiz
Chapter 6: Analyzing Vulnerabilities Scan Results
- 01 – Common Vulnerabilities: Part 1 (7:58)
- 02 – Common Vulnerabilities: Part 2 (7:50)
- Chapter 06 Analyzing Vulnerabilities Scan Results Quiz
Chapter 7: Incident Response
- 01 – Incident Response Process (6:40)
- 02 – IR Roles and Responsibilities (7:43)
- Chapter 07 Incident Response Quiz
Chapter 8: Preparation Phase
- 01 – IR Active Preparation (9:45)
- 02 – Threat Trends (7:35)
- Chapter 08 Defensive Strategies Quiz
Chapter 9: Forensic Tools
- 01 – Digital Forensics (9:37)
- 02 – Seizure and Acquisitions (4:56)
- 03 – Forensics Acquisition Tools (8:57)
- 04 – Forensics Analysis: Part 1 (4:29)
- 05 – Forensics Analysis: Part 2 (7:51)
- Chapter 09 Forensic Tools Quiz
Chapter 10: Common Symptoms of Compromise
- 01 – Network Symptoms (3:34)
- 02 – Host Symptoms (8:07)
- 03 – Application Symptoms (4:27)
- Chapter 10 Common Symptoms of Compromise Quiz
Chapter 11: Incident Recovery and Post-Incident Response Process
- 01 – Moving Forward: Part 1 (13:06)
- 02 – Moving Forward: Part 2 (8:02)
- Chapter 11 Incident Recovery and Post-Incident Response Process Quiz
Chapter 12: Frameworks, Common Policies, Controls, and Procedures
- 01 – Frameworks (13:06)
- 02 – Policies (7:31)
- 03 – Controls & Procedures (7:44)
- 04 – Verifications (6:16)
- Chapter 12 Frameworks, Common Policies, Controls, and Procedures Quiz
Chapter 13: Identity and Access Management
- 01 – Context-Based Authentication (6:20)
- 02 – Identities (15:17)
- 03 – Managing Identities (9:43)
- 04 – Exploits (8:12)
- Chapter 13 Identity and Access Management Quiz
Chapter 15: Defense Strategies
- 01 – Data Analytics (9:48)
- 02 – Defense in Depth (14:14)
- Chapter 14 Defensive Tactics Quiz
Chapter 15: Software Development Life Cycle (SDLC)
- 01 – Secure Software Development (7:47)
- 02 – Best Coding Practices (4:12)
- Chapter 15 Software Development Life Cycle (SDLC) Quiz
Chapter 16: Tools and Technologies
- 01 – Preventative Tools: Part 1 (20:35)
- 02 – Preventative Tools: Part 2 (6:20)
- 03 – Collective Tools (8:57)
- 04 – Vulnerability Scanning (15:54)
- 05 – Packet Capture (11:40)
- 06 – Connectivity Tools (8:00)
- 07 – Pen Testing Tools (11:55)
- Chapter 16 Tools and Technologies Quiz
Get CompTIA CySA+ Cybersecurity Analyst – Total Seminars, Only Price $10
Tag: CompTIA CySA+ Cybersecurity Analyst – Total Seminars Review. CompTIA CySA+ Cybersecurity Analyst – Total Seminars download. CompTIA CySA+ Cybersecurity Analyst – Total Seminars discount.
Reviews
There are no reviews yet.