CompTIA CySA+ (CS0-001): Complete Course and Practice Exam

Video description

Pass the CompTIA Cybersecurity Analyst+ (CS0-001) exam on your 1st attempt, includes CySA+ (CSA+) practice exam!

About This Video

This course provides full coverage of the four domains of the CSA+ (CySA+) exam:

  • 27%: Threat Management
  • 26%: Vulnerability Management
  • 23%: Cyber Incident Response
  • 24%: Security Architecture and Tool Sets

In Detail

This course provides everything you need in order to study for the CompTIA Cybersecurity Analyst+ (CSA+, CySA+) exam, including downloadable PDFs of every lecture, 12 quizzes to check your knowledge as you progress through the videos, and a full-length practice exam to test your knowledge before test day! Taught by an expert in information technology and cybersecurity with over 20 years of experience, this course is a fun way to learn what you need to know to pass the CompTIA Cybersecurity Analyst+ (CSA+,CySA+) exam or to better prepare yourself to serve on your organization's cyber defense team. The CompTIA CSA+ (Cybersecurity Analyst+) certification is a vendor-neutral certification that validates your knowledge and ability to conduct intermediate-level cyber security skills. The CompTIA CSA+ (CySA+) exam is focused on the technical, hands-on details of the cybersecurity field, including not only cyber threats, secure network architecture, and risk management, but also the ability to perform log analysis, configuration assessments, and more. Each video comes with a downloadable PDF of all the lecture notes

Publisher resources

Download Example Code

Table of contents

  1. Chapter 1 : Welcome and Introduction
    1. Welcome to the Course
    2. Exam Foundations
  2. Chapter 2 : Domain 1: Threat Management (27%)
    1. Domain 1: Threat Management
    2. CIA Triad
    3. Risk Consideration
    4. Risk Assessment
    5. Identify Threats
    6. Identify Vulnerabilities
    7. Likelihood, Impact, and Risk
    8. Qualitative and Quantitative Assessments
    9. Reviewing Controls
    10. Network Perimeter Security
    11. Network Segmentation
    12. Network Access Control
    13. Defense Deception Methods
    14. Secure Endpoint Management
    15. Penetration Testing
    16. Security Exercises and Training
    17. Reverse Engineering
    18. Reconnaissance and Intelligence
    19. Footprinting the Network
    20. Network Mapping
    21. Port Scanning
    22. Other Port Scanners
    23. NMAP - Demonstration of the world's most popular port scanning tool
    24. Passive Reconnaissance
    25. Passive Recon - Network Devices
    26. Passive Recon – Netstat
    27. DHCP Logs and Configs
    28. Firewall Logs and Configs
    29. System and Host Log Files
    30. DNS Harvesting
    31. Domain Names and IP Ranges
    32. DNS Zone Transfers
    33. Whois and Host Commands
    34. Information Gathering and Aggregation
    35. Organizational Intelligence
    36. Detecting, Preventing, and Responding to Reconnaissance
  3. Chapter 3 : Domain 2: Vulnerability Management (26%)
    1. Domain 2: Vulnerability Management
    2. Regulatory Requirements
    3. Corporate Requirements
    4. Scanning Tools
    5. Scoping Scans
    6. Configuring Scans
    7. Scanning Sensitivity
    8. Scanning Perspective
    9. Authenticated Scanning
    10. Maintaining Scanners
    11. Standardizing Vulnerabilities
    12. Workflow for Remediation
    13. Vulnerability Reporting
    14. Remediation Priority
    15. Implementing and Testing
    16. Nessus Vulnerability Scanner: A Walkthrough
    17. Interpreting Scan Results
    18. Interpreting CVSS
    19. Calculating the CVSS Score
    20. CVSS Temporal Score
    21. Validation of Results
    22. Common Vulnerabilities
    23. Server and Host Vulnerabilities
    24. Network Vulnerabilities
    25. Virtualization Vulnerabilities
    26. Web Application Vulnerabilities
    27. Internet of Things (IoT) Vulnerabilities
  4. Chapter 4 : Domain 3: Cyber Incident Response (23%)
    1. Domain 3: Cyber Incident Response
    2. Security Incidents
    3. Incident Response Teams
    4. Incident Response Phases
    5. Incident Response Policy and Procedures
    6. Communication and Info Sharing
    7. Incident Classification
    8. Network Event Monitoring
    9. Network Monitoring Tools
    10. Detecting Network Events
    11. Network Probes and Attacks
    12. Server and Host Events
    13. Service and Application Events
    14. Digital Forensics
    15. Forensic Toolkit Components
    16. Mobile Forensic Toolkits
    17. Forensic Software
    18. Training and Certification
    19. Forensic Investigation Process
    20. Disk Imaging
    21. Disk Imaging Using dd
    22. Disk Imaging Using FTK Imager
    23. Incident Containment
    24. Eradication and Recovery
    25. Finishing the Response
  5. Chapter 5 : Domain 4: Security Architecture and Toolsets (24%)
    1. Domain 4: Security Architecture and Tool Sets
    2. Policy Documents
    3. Standard Frameworks
    4. Policy-based Controls
    5. Audits and Assessments
    6. Laws and Regulations
    7. Defence in Depth
    8. Types of Controls
    9. Layered Network Defence
    10. Layered Host Security
    11. Data Analytics
    12. Personnel Security
    13. Outsourcing Concerns
    14. User Awareness Training
    15. Analyzing Secure Architectures
    16. What Is Identity?
    17. Identity Systems
    18. Threats to Identity Systems
    19. Attacking AAA Protocols and Systems
    20. Targeting Account Lifecycle
    21. Identity Exploits
    22. Credential Theft
    23. Securing Authentication and Authorization System
    24. Identity as a Service (IDaaS)
    25. Detecting Identity Attacks
    26. Federated Identity Systems
    27. Software Development Life Cycle (SDLC)
    28. Software Development Models
    29. Coding for Security
    30. Testing Application Security
    31. Finding Security Flaws
    32. Web Application Vulnerability Scanners
  6. Chapter 6 : Conclusion
    1. Conclusion

Product information

  • Title: CompTIA CySA+ (CS0-001): Complete Course and Practice Exam
  • Author(s): Jason Dion
  • Release date: June 2018
  • Publisher(s): Packt Publishing
  • ISBN: 9781789539479