O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Cyber Security Analyst and Enterprise Architecture

Video Description

The CompTIACSA (cySa)Bootcamp is geared towards experienced ITSecurity pros to prepare for the CyberSecurity Analyst exam . This is an Intermediate level course and not meant for inexperienced ITSecurity professionals. CompTIA Cybersecurity Analyst (CSA+)is an international, vendor-neutral cybersecurity certification that applies behavioral analytics to improve the overall state of IT security. CSA+ validates critical knowledge and skills that are required to prevent, detect and combat cybersecurity threats.As attackers have learned to evade traditional signature-based solutions such as firewalls, an analytics-based approach within the IT securityindustry is increasingly important for most organizations. The behavioral analytics skills covered by CSA+ identify and combat malware, and advanced persistent threats (APTs), resulting in enhanced threat visibility across a broad attack surface. CompTIA CSA+ is for IT professionals looking to gain the following security analyst skills: 1) Configure and use threat detection tools. 2) Perform data analysis. 3) Interpret the results to identify vulnerabilities, threats and risks to an organization.

Table of Contents

  1. Course Introduction
    1. Welcome Aboard 00:04:04
    2. Cyber Security Analyst 00:09:12
    3. Cyber Security Analyst Domain 00:06:18
    4. Cybersecurity Analyst Bootcamp Overview 00:15:21
  2. CySA Job Role
    1. Cybersecurity Analysts Part 1 00:17:53
    2. Cybersecurity Analysts Part 2 00:19:06
  3. Reconnaissance Techniques
    1. Reconnaissance Techniques Part 1 00:16:15
    2. Reconnaissance Techniques Part 2 00:17:46
    3. Reconnaissance Techniques Part 3 00:19:48
    4. Reconnaissance Techniques Part 4 00:06:34
    5. Social Engineering Toolset 00:03:02
    6. Netcraft 00:02:19
    7. Htrack 00:02:44
    8. Fireye 00:02:56
    9. NMAP 00:02:23
    10. Sysinternals 00:01:59
    11. Enhanced Migration Tool 00:03:16
  4. Security Appliances
    1. Security Appliances Part 1 00:19:20
    2. Security Appliances Part 2 00:08:19
    3. Palo Alto Networks 00:06:36
    4. Fortinet 00:04:46
  5. Logging and Access
    1. Logging and Analyst Part 1 00:19:40
    2. Logging and Analyst Part 2 00:11:52
  6. Managing Vulnerabilities
    1. Managing Vulnerabilities Part 1 00:18:29
    2. Managing Vulnerabilities Part 2 00:14:37
    3. Microsoft Security Baseline 00:00:57
    4. Metasploit 00:01:19
    5. NIST SCAP 00:01:47
    6. Computer Security Resouce Center 00:01:06
  7. Remediating Vulnerabilities
    1. Remediating Vulnerabilities part 1 00:19:12
    2. Remediating Vulnerabilities part 2 00:09:44
    3. SANS Institute 00:01:43
  8. Secure Software Development
    1. Software Development Security Part 1 00:18:16
    2. Software Development Security Part 2 00:14:37
    3. Owasp 00:00:38
    4. Incident Response 00:13:44
    5. Computer Emergency Response team 00:02:12
  9. Computer Forensics
    1. Forensics Tools Part 1 00:19:35
    2. Forensics Tools Part 2 00:10:23
    3. Guidance Encase 00:01:09
  10. Analyzing Analysis and Recovery
    1. Incident Analysis And Recovery Part 1 00:19:16
    2. Incident Analysis And Recovery Part 2 00:12:56
  11. Secure Network Design
    1. Secure Network Design 00:15:39
    2. Toms IT Pro 00:02:12
  12. Identity and Access Management (IAM)
    1. Managing Identities and Access Part 1 00:19:16
    2. Managing Identities and Access Part 2 00:12:43
    3. Tripwire 00:02:03
  13. IT Security Frameworks
    1. Security Frameworks and Policies Part 1 00:19:31
    2. Security Frameworks and Policies Part 2 00:13:59
    3. NIST Cybersecurity Framework 00:01:34
  14. Cloud Computing Security Tools
    1. Top 10 Security Tools 00:01:50
    2. O365 Cloud Security 00:02:18
    3. MS Cloud Security Tools 00:04:59
    4. Okta 00:01:34
    5. Sophos 00:02:01
    6. Sophos Lab 00:01:02
  15. Department of Defense Requirements (DOD)
    1. Dept of Defense Workforce 00:01:35
    2. Dept of Defense Workforce Directive (8570) 00:02:03
    3. Dept of Defence Security Technical Implementation Guides (STIG) 00:03:03
    4. Fedramp 00:01:21
  16. Taking the CySA Exam
    1. CompTIA Certifications 00:07:28
    2. CompTIA Exam Preparations 00:01:07
    3. CompTIA Cybersecurity Roadmap 00:03:40
  17. CompTIA Continuing Education
    1. CompTIA Certmetrics 00:02:42
    2. CompTIA Certifcation Renewal 00:09:59
    3. CompTIA Cybersecurity Hub 00:01:25
  18. Job Search Tips
    1. Linked In Job Search 00:06:00
    2. Cleared Connections 00:01:18
    3. Dice 00:01:28
    4. Intelligence Careers 00:02:49
  19. Course Closeout
    1. CSA Exam Registration 00:08:50
    2. Become a CompTIA Subject Matter Expert 00:05:15