Video description
The second edition of this video title is available. Please go to CompTIA Cybersecurity Analyst (CySA+) CS0-002 https://learning.oreilly.com/videos/comptia-cybersecurity-analyst/9780137432110/.
Over 21 hours of deep-dive training covering every objective in the CompTIA Cybersecurity Analyst CySA+ (CS0-001) exam
The CompTIA Cybersecurity Analyst CySA+ (CS0-001) Complete Video Course is an engaging, self-paced video training solution that provides learners with over 21 hours of personal, visual instruction from two cybersecurity expert trainers. Through the use of topic-focused instructional videos, you will gain an in-depth understanding of each objective in the CompTIA CySA+ exam as well as a deeper understanding of cyber security foundations and principles.
CompTIA Cybersecurity Analyst CySA+ (CS0-001) Complete Video Course contains over 21 hours of training with content divided into 4 modules with 17 content targeted content lessons. This title covers every objective in the CompTIA CySA+ exam and includes two full practice exams, so you have everything you need to learn all of the cyber security principles that appear on the test; but more than that, you will learn the fundamentals of preventing, detecting and combatting cybersecurity threats. Full of live trainer discussions, hands-on demos, whiteboard work, and deep dive discussions, this course covers cyber security fundamentals in a way that is easy to access and even fun.
The video lessons in this course review each exam objective, so you can use it as a complete study tool for taking the CompTIA CySA+ exam.
Skill Level
- Intermediate
What You Will Learn
- Every objective on the CompTIA Cybersecurity Analystic CySA+ exam
- Tips to prepare for and pass the exam
- Real-world cyber security configuration and detection skills
- How to perform data analysis and interpret results to identify vulnerabilities, threats and risks
Who Should Take This Course
Primary audience: Anyone preparing for the CompTIA Cybersecurity Analyst CySA+ examination.
Secondary audience: Anyone interested in learning cyber security fundamentals.
Course Requirements
While there is no required prerequisite, CySA+ is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus.
About LiveLessons Video Training
Pearson’s LiveLessons video training series publishes the industry’s leading video tutorials for IT pros, developers, sys admins, devops, network engineers, and certification candidates. LiveLessons feature the highest-quality professional skills training led by recognized author instructors published by Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que. Topics include IT certification, programming, development, networking, software skills for the home, office, and business, and more. Your purchase provides you with lifetime online access to the content.
http://www.pearsonitcertification.com/livelessons
Table of contents
- Introduction
- Module 1: Threat Management
-
Lesson 1: Reconnaissance Techniques
- Learning objectives
- 1.1 Introduction to Reconnaissance Techniques
- 1.2 Reconnaissance Techniques
- 1.3 Techniques of OS Fingerprinting
- 1.4 Understanding Advanced NMAP Techniques
- 1.5 Introducing NMAP
- 1.6 Reconnaissance Techniques Using Packet Captures, Log Reviews, Firewall Reviews, ACL Reviews
- 1.7 Discovering your Targets through Social Media Profiling and Engineering
- 1.8 Digging Deeper into Social Engineering
- 1.9 Email Harvesting, DNS Harvesting, and Phishing Techniques
- 1.10 FOCA Demo
- 1.11 Examining Virtual and Physical Environments
- 1.12 Examining Internal, External, On-Premise, and Cloud Connections
- 1.13 Using NMAP for Host, Service, and Network Scanning
- 1.14 Reading Firewall Rule-based and Logs
- 1.15 Reconnaissance Techniques Using Vulnerability Scanners
- 1.16 OpenVAS Lab
- Summary
-
Lesson 2: Network Reconnaissance
- Learning objectives
- 2.1 Understanding Point-in-time Data Analysis
- 2.2 NetFlow Analysis
- 2.3 Traffic and NetFlow Analysis
- 2.4 Wireless Analysis Techniques
- 2.5 Anomaly, Trend, and Behavioral Analysis Techniques
- 2.6 Examining Logs, Packet Captures, NMAP Results, Event Logs, and Syslog Data
- 2.7 Reconnaissance Discovery Using SIEMs and Packet Analyzers
- Summary
-
Lesson 3: Response and Counter Measures
- Learning objectives
- 3.1 Introduction to Response and Counter Measures
- 3.2 Countermeasure Techniques Using Network Isolation, System Isolation, and Jump Boxes
- 3.3 Honeypots, Endpoint Security, and Group Policies as Countermeasures
- 3.4 Understanding Sinkholes
- 3.5 Hardening Systems to Deter Reconnaissance Attacks
- 3.6 Mitigating Risks through Network Access Control (NAC)
- Summary
- Lesson 4: Securing Corporate Environments
- Module 2: Vulnerability Management
-
Lesson 5: Implementing the Information Security Vulnerability Management Process
- Learning objectives
- 5.1 Identifying Industry, Corporate, and Regulatory Requirements
- 5.2 Establishing Appropriate Scanning Frequencies
- 5.3 Configuring Tools with the Appropriate Options
- 5.4 Generating and Creating Reports
- 5.5 How to Remediate and Prioritize Vulnerabilities
- 5.6 Determining Vulnerabilities Using a Sandbox
- 5.7 Risks and Inhibitors to Remediation
- Summary
- Lesson 6: Analyze Output of Vulnerability Scan
-
Lesson 7: Compare and Contrast Common Vulnerabilities
- Learning objectives
- 7.1 Understanding Common Vulnerabilities
- 7.2 Virtual Infrastructure Risks and Vulnerabilities for an Organization
- 7.3 Vulnerabilities in Modern Industrial Controls Systems (ICSs) and SCADA Devices
- 7.4 Email Headers and Honeypots
- 7.5 Windows Services and Logs
- 7.6 Ingress / Egress Filtering and Virtual Environment Risks
- Summary
- Module 3: Cyber Incident Response
-
Lesson 8: Determine Impact of an Incident
- Learning objectives
- 8.1 Determining Impact of an Incident
- 8.2 Determining Threat Classification (Part 1)
- 8.3 Determining Threat Classification (Part 2)
- 8.4 Determining Incident Severity for Threats (Part 1)
- 8.5 Determining Incident Severity for Threats (Part 2)
- 8.6 Understanding the Importance of Data Classification when Determining Threats
- Summary
- Lesson 9: Forensics Tools and Investigation
-
Lesson 10: Incident Reporting and Communications
- Learning objectives
- 10.1 Incident Reporting and Communications
- 10.2 Stakeholder and Shareholder Communications Procedures during a Breach
- 10.3 Establishing a Communications Chain
- 10.4 Information Disclosure, Legal, and Regulatory Requirements
- 10.5 Roles and Responsibilities for Effective Communications during a Breach
- Summary
-
Lesson 11: Analyzing Incident Response Symptoms and Recovery Techniques
- Learning objectives
- 11.1 Incident Response Symptoms and Recovery Techniques
- 11.2 Analyzing Computer- and Hardware-related Symptoms
- 11.3 Symptom Examples
- 11.4 Exfiltration
- 11.5 Host Remediation Options
- 11.6 Analyzing and Working Network- and Traffic-related Symptoms
- 11.7 Baselines
- 11.8 Irregular Communication
- 11.9 Rogue Devices and Reconnaissance
- 11.10 Port Scanning and Exploitation
- 11.11 Analyzing Application-related Symptoms
- 11.12 Analyzing Injection and XXS
- 11.13 Broken Authentication and Patching Challenges
- 11.14 Denial of Service (Part 1)
- 11.15 Denial of Service (Part 2)
- Summary
-
Lesson 12: Post-Incident Response Process
- Learning objectives
- 12.1 Post-Incident Response Process
- 12.2 Containing an Incident
- 12.3 Access Control Demonstration with Cisco Identity Services Engine
- 12.4 Access Control Technology Details
- 12.5 Reading Authentication Log
- 12.6 Corrective Actions (Part 1)
- 12.7 Attack Lifecycle Example
- 12.8 Corrective Actions (Part 2)
- 12.9 Writing an Incident Report
- Summary
- Module 4: Security Architecture and Tool Sets
-
Lesson 13: Frameworks, Common Policies, Controls, and Procedures
- Learning objectives
- 13.1 Introduction to Frameworks, Common Policies, Controls, and Procedures
- 13.2 Frameworks, Common Policies, Controls, and Procedures
- 13.3 Understanding Regulatory Compliance and Common Frameworks (Part 1)
- 13.4 Understanding Regulatory Compliance and Common Frameworks (Part 2)
- 13.5 Policies (Part 1)
- 13.6 Policies (Part 2)
- 13.7 Implementing Security Controls and Procedures
- 13.8 Security Controls
- 13.9 Procedures and Monitoring
- 13.10 Testing and Remediation
- 13.11 Testing Policies (Part 1)
- 13.12 Testing Policies (Part 2)
- Summary
-
Lesson 14: Access Control and Access Management Remediation
- Learning objectives
- 14.1 Introduction to Access Control and Access Management Remediation
- 14.2 Access Control and Access Management Remediation
- 14.3 Understanding Risks with Context-based Authentication Methods
- 14.4 Security Solutions Based on Identities and Identity Repositories
- 14.5 Risks and Rewards with Single Sign-on
- 14.6 Understanding and Reviewing Identification Exploits and Hacks
- Summary
-
Lesson 15: Reviewing Security Architectures
- Learning objectives
- 15.1 Introduction to Reviewing Security Architectures
- 15.2 Reviewing Security Architectures
- 15.3 Understanding Security Data Analytics
- 15.4 Reviewing Log Files (Part 1)
- 15.5 Reviewing Log Files (Part 2)
- 15.6 Defense in Depth (Part 1): Personal
- 15.7 Defense in Depth (Part 2): Processes
- Summary
-
Lesson 16: Software Development Life Cycle (SDLC) Best Practices
- Learning objectives
- 16.1 Introduction to Software Development Life Cycle (SDLC) Best Practices
- 16.2 Software Development Life Cycle (SDLC) Best Practices
- 16.3 Best Practices during Software Development Phase
- 16.4 Testing Applications for Vulnerabilities
- 16.5 Implementing a Peer Review and Stress Testing Process
- 16.6 Best Practices for Secure Coding, OWASP, and SANS
- Summary
-
Lesson 17: Cybersecurity Tools and Technologies
- Learning objectives
- 17.1 Cybersecurity Tools and Technologies
- 17.2 Preventive Technologies: Firewalls
- 17.3 Preventive Technologies: Proxy and Application Layer Firewall
- 17.4 Comparing Proxies and Application Firewalls
- 17.5 Selecting a Firewall
- 17.6 Prevention Technologies: IPS (Part 1)
- 17.7 Detecting Bruteforce with Wireshark and IPS
- 17.8 Detecting Files with Wireshark and IPS
- 17.9 Prevention Technologies: IPS (Part 2)
- 17.10 Cisco Breach Detection Demo
- 17.11 SIEM Core Concepts
- 17.12 Understanding and Selecting a SIEM
- 17.13 Vulnerability Scanners Overview
- 17.14 Vulnerability Scanner Concepts
- 17.15 NetFlow and Packet Capture Concepts
- 17.16 Cisco StealthWatch NetFlow Example
- 17.17 Command Line and OpenSSL
- 17.18 Exploitation Technologies
- Test Taking Strategies
- Summary
- Summary
Product information
- Title: CompTIA Cybersecurity Analyst CySA+ (CS0-001)
- Author(s):
- Release date: October 2017
- Publisher(s): Pearson
- ISBN: 0134772067
You might also like
video
CCNP and CCIE Security Core SCOR 350-701
12+ Hours of Video Instruction More than 12 hours of video instruction and remediation organized to …
video
CompTIA Cybersecurity Analyst (CySA+) CS0-002
20 Hours of Video Instruction 20 hours of deep-dive training covering every objective in the CompTIA …
video
CompTIA Advanced Security Practitioner (CASP) CAS-003
18+ Hours of Video Instruction More than 18 hours of video instruction to prepare you for …
book
CompTIA Advanced Security Practitioner (CASP) CAS-003 Cert Guide, Second Edition
Learn, prepare, and practice for CompTIA Advanced Security Practitioner (CASP) CAS-003 exam success with this CompTIA …