Course Curriculum
- 23 sections
- 46 lectures
- 00:00:00 total length
-
Introduction
00:02:00 -
All about the Exam
00:08:00 -
What’s New on the CompTIA CySA+ Exam?
00:05:00 -
Meet the Instructors
00:02:00 -
Thinking like the Enemy
00:09:00 -
Tools of the Trade
00:08:00
-
Intelligence Sources and Confidence Levels
00:08:00 -
Threat Indicators and Actors
00:08:00 -
Threat Trends
00:07:00 -
Intelligence Cycle and ISACs
00:06:00
-
Attack Frameworks
00:06:00 -
Threat Research
00:11:00 -
Threat Modeling and Intelligence Sharing
00:06:00
-
Vulnerability Identification
00:07:00 -
Scanning Parameters and Criteria
00:09:00 -
Scanning Special Considerations
00:06:00 -
Validation
00:03:00 -
Remediation and Mitigation
00:08:00 -
Inhibitors to Remediation
00:07:00
-
Web Applications Scanners, Part 1
00:10:00 -
Web Applications Scanners, Part 2
00:05:00 -
Scanning
00:06:00 -
Configuring and Executing Scans
00:08:00 -
Vulnerability Scanning
00:10:00 -
Reverse Engineering
00:08:00 -
Enumeration
00:06:00 -
Wireless Assessment Tools
00:08:00 -
Cloud Assessment Tools
00:04:00
-
Mobile and IoT
00:10:00 -
Embedded and Firmware Systems (RTOS, SoC, and FPGA)
00:09:00 -
Access and Vehicles Risk
00:08:00 -
Automation and Control Risk
00:10:00
-
Cloud Models
00:07:00 -
Remote Service Invocation (FaaS, IaC, API)
00:10:00 -
Cloud Vulnerabilities
00:06:00
-
Injection and Overflow Attacks
00:09:00 -
Injection and Overflow Attacks
00:09:00 -
Exploits
00:08:00 -
Application Vulnerabilities, Part 1
00:08:00 -
Application Vulnerabilities, Part 2
00:07:00
-
Network Architecture and Asset Management
00:09:00 -
Protecting Your Territory
00:05:00 -
Identity and Access Management
00:11:00 -
Encryption and Active Defense
00:08:00
-
Platforms
00:07:00 -
SOA and DevSecOps
00:09:00 -
Secure Software Development
00:08:00 -
Best Coding Practices
00:04:00
-
Trusted Hardware
00:10:00 -
Hardware Encryption
00:04:00 -
Hardware Security
00:08:00
-
Data Analytics
00:10:00 -
Endpoint Security
00:08:00 -
Recon Results, Part 1
00:13:00 -
Recon Results, Part 2
00:05:00 -
Impact Analysis
00:05:00 -
Collective Tools
00:09:00 -
Query Writing
00:07:00 -
E-mail Analysis, Part 1
00:10:00 -
E-mail Analysis, Part 2
00:08:00
-
Permissions
00:09:00 -
Firewalls
00:08:00 -
Intrusion Prevention Rules
00:05:00 -
DLP and Endpoint Detection
00:05:00
-
Threat Hunting and the Hypothesis
00:06:00 -
Threat Hunting Process
00:07:00 -
Results and Benefits
00:05:00
-
Workflow and Scripting
00:07:00 -
API and Malware Signature Creation
00:08:00 -
Threat Feeds and Machine Learning
00:06:00 -
Protocols, Standards, and Software Engineering
00:05:00
-
IR Roles and Responsibilities
00:08:00 -
IR Active Preparation
00:10:00
-
Incident Response Process
00:07:00
-
Network Symptoms
00:04:00 -
Host Symptoms
00:08:00 -
Application Symptoms
00:04:00
-
Digital Forensics
00:10:00 -
Seizure and Acquisitions
00:05:00 -
Forensics Acquisition Tools
00:09:00 -
Mobile, Virtualization, and Cloud
00:06:00 -
Forensics Analysis, Part 1
00:04:00 -
Forensics Analysis, Part 2
00:08:00 -
Packet Capture
00:12:00
-
Data Privacy and Security
00:06:00 -
Nontechnical Controls
00:09:00 -
Technical Controls
00:08:00
-
Business Impact Analysis
00:05:00 -
Risk Identification
00:05:00 -
Risk Calculation and Communication
00:06:00 -
Training
00:04:00 -
Supply Chain Assessment
00:04:00
-
Frameworks
00:13:00 -
Policies and Procedures
00:05:00 -
Controls and Procedures
00:08:00 -
Verification
00:06:00
-
Claim Your Certificate
00:00:00
5 Star course rating
Patrick Gabriel Ebholoria
The course was very helpful

TAKE ALL COURSES FOR £99