Course Curriculum
- 23 sections
- 97 lectures
- 11 hours, 35 minutes total length
-
Introduction00:02:00
-
All about the Exam00:08:00
-
What’s New on the CompTIA CySA+ Exam?00:05:00
-
Meet the Instructors00:02:00
-
Thinking like the Enemy00:09:00
-
Tools of the Trade00:08:00
-
Intelligence Sources and Confidence Levels00:08:00
-
Threat Indicators and Actors00:08:00
-
Threat Trends00:07:00
-
Intelligence Cycle and ISACs00:06:00
-
Attack Frameworks00:06:00
-
Threat Research00:11:00
-
Threat Modeling and Intelligence Sharing00:06:00
-
Vulnerability Identification00:07:00
-
Scanning Parameters and Criteria00:09:00
-
Scanning Special Considerations00:06:00
-
Validation00:03:00
-
Remediation and Mitigation00:08:00
-
Inhibitors to Remediation00:07:00
-
Web Applications Scanners, Part 100:10:00
-
Web Applications Scanners, Part 200:05:00
-
Scanning00:06:00
-
Configuring and Executing Scans00:08:00
-
Vulnerability Scanning00:10:00
-
Reverse Engineering00:08:00
-
Enumeration00:06:00
-
Wireless Assessment Tools00:08:00
-
Cloud Assessment Tools00:04:00
-
Mobile and IoT00:10:00
-
Embedded and Firmware Systems (RTOS, SoC, and FPGA)00:09:00
-
Access and Vehicles Risk00:08:00
-
Automation and Control Risk00:10:00
-
Cloud Models00:07:00
-
Remote Service Invocation (FaaS, IaC, API)00:10:00
-
Cloud Vulnerabilities00:06:00
-
Injection and Overflow Attacks00:09:00
-
Injection and Overflow Attacks00:09:00
-
Exploits00:08:00
-
Application Vulnerabilities, Part 100:08:00
-
Application Vulnerabilities, Part 200:07:00
-
Network Architecture and Asset Management00:09:00
-
Protecting Your Territory00:05:00
-
Identity and Access Management00:11:00
-
Encryption and Active Defense00:08:00
-
Platforms00:07:00
-
SOA and DevSecOps00:09:00
-
Secure Software Development00:08:00
-
Best Coding Practices00:04:00
-
Trusted Hardware00:10:00
-
Hardware Encryption00:04:00
-
Hardware Security00:08:00
-
Data Analytics00:10:00
-
Endpoint Security00:08:00
-
Recon Results, Part 100:13:00
-
Recon Results, Part 200:05:00
-
Impact Analysis00:05:00
-
Collective Tools00:09:00
-
Query Writing00:07:00
-
E-mail Analysis, Part 100:10:00
-
E-mail Analysis, Part 200:08:00
-
Permissions00:09:00
-
Firewalls00:08:00
-
Intrusion Prevention Rules00:05:00
-
DLP and Endpoint Detection00:05:00
-
Threat Hunting and the Hypothesis00:06:00
-
Threat Hunting Process00:07:00
-
Results and Benefits00:05:00
-
Workflow and Scripting00:07:00
-
API and Malware Signature Creation00:08:00
-
Threat Feeds and Machine Learning00:06:00
-
Protocols, Standards, and Software Engineering00:05:00
-
IR Roles and Responsibilities00:08:00
-
IR Active Preparation00:10:00
-
Incident Response Process00:07:00
-
Network Symptoms00:04:00
-
Host Symptoms00:08:00
-
Application Symptoms00:04:00
-
Digital Forensics00:10:00
-
Seizure and Acquisitions00:05:00
-
Forensics Acquisition Tools00:09:00
-
Mobile, Virtualization, and Cloud00:06:00
-
Forensics Analysis, Part 100:04:00
-
Forensics Analysis, Part 200:08:00
-
Packet Capture00:12:00
-
Data Privacy and Security00:06:00
-
Nontechnical Controls00:09:00
-
Technical Controls00:08:00
-
Business Impact Analysis00:05:00
-
Risk Identification00:05:00
-
Risk Calculation and Communication00:06:00
-
Training00:04:00
-
Supply Chain Assessment00:04:00
-
Frameworks00:13:00
-
Policies and Procedures00:05:00
-
Controls and Procedures00:08:00
-
Verification00:06:00
-
Claim Your Certificate
5 course rating - 1 review
Patrick Gabriel Ebholoria
The course was very helpful