Learning CompTIA CSA+

Video description

This course prepares you to pass the CompTIA CS0-001 Cybersecurity Analyst certification exam. It covers every topic tested during that exam and will help you gain the knowledge you need to further your career in cybersecurity. Taught by security expert Mark Long, the course works best for IT security analysts, vulnerability analysts, and threat intelligence analysts with 3-4 years of hands-on experience.

  • Prepare yourself to confidently take the CompTIA CSA+ certification exam
  • Review and master core concepts like vulnerabilities, threats, and risks
  • Learn how to configure and use threat detection tools
  • Discover how to design and implement a well-organized security plan
  • Master the concepts related to threat management and mitigation
  • Understand how to implement incident identification, response, and recovery
  • Broaden your abilities in penetration testing and vulnerability testing

Mark Long is a long time contributor to O'Reilly Media, having authored more than a dozen book and video titles, including multiple CompTIA and Microsoft certification preparation courses. A network security, network admin, and database design pro with more than 25 years of experience, Mark solves IT issues for Fortune 500 companies as the head of his own consulting company. He holds the A+ certification and many others, including Microsoft's MCSE, MCDBA, and MCT.

Publisher resources

Download Example Code

Table of contents

  1. Introduction
    1. Welcome to the Course
    2. About the Author
    3. Course Overview
    4. CSA+ Audience
    5. About the Exam
    6. CSA+ Acronyms
  2. Security Basics
    1. Cybersecurity Basics
    2. Understanding Risk
    3. Identifying Threats
    4. Network Security
    5. Endpoint Security
    6. Penetration Testing
    7. Reverse Engineering
    8. Wireless vs. Wired
    9. Virtual vs. Physical pt. 1
    10. Virtual vs. Physical pt. 2
    11. On-premises vs. Cloud
  3. Threat Management
    1. Managing Threats
    2. Topology and Service Discovery
    3. OS Fingerprinting
    4. Router and Firewall Review
    5. Packet Capture
    6. Log Review
    7. Email Harvesting
    8. Getting Social
    9. DNS Harvesting pt. 1
    10. DNS Harvesting pt. 2
    11. Phishing
  4. Threat Mitigation
    1. Threat Mitigation Basics
    2. Network Segmentation
    3. LAN Segmentation
    4. Honeypots
    5. Group Policies pt. 1
    6. Group Policies pt. 2
    7. Endpoint Security
    8. Hardening
    9. Network Access Control
    10. ACLs
    11. Utilizing Sinkholes
    12. Penetration Testing
    13. Pen Test Tools
    14. Risk Evaluation
  5. Vulnerability Management
    1. Vulnerability Management
    2. Identifying Requirements
    3. Establish Scanning Frequency
    4. Tool Configuration
    5. Perform Scans
    6. Generate Reports
    7. Perform Remediation
    8. Ongoing Monitoring
    9. Analyzing Scan Results
    10. Web Server Vulnerabilities pt. 1
    11. Web Server Vulnerabilities pt. 2
    12. Endpoint Vulnerabilities
    13. Network Vulnerabilities
    14. Virtual Vulnerabilities
    15. Mobile Device Vulnerabilities
  6. Impact Identification
    1. Incident Response Overview
    2. Threat Classification
    3. Scope of Impact pt. 1
    4. Scope of Impact pt. 2
    5. Sensitive Data Types
    6. Forensics Tools
    7. Forensic Investigation Suite
    8. CSA Security Tools
  7. Incident Response Process
    1. Incident Response Basics
    2. Understanding Stakeholders
    3. Communication
    4. Role-Based Responsibilities
    5. Common Network Symptoms
    6. Common Host-Related Symptoms
    7. Common App-Related Symptoms
  8. Incident Recovery
    1. Incident Recovery Overview
    2. Containment
    3. Eradication
    4. Validation
    5. Post-Incident Actions
    6. Incident Summary Report
  9. Frameworks, Policies Procedures
    1. FP Overview
    2. Regulatory Compliance
    3. Security Frameworks
    4. Security Policies
    5. Implementing Controls
    6. Operational Procedures
    7. Verification
  10. Security Architecture Review
    1. Security Architecture Overview
    2. Data Analytics
    3. Manual Review
    4. Defense in Depth
    5. Processes and Procedures
  11. Conclusion
    1. Wrap Up

Product information

  • Title: Learning CompTIA CSA+
  • Author(s): Mark Long
  • Release date: December 2017
  • Publisher(s): O'Reilly Media, Inc.
  • ISBN: 9781492032199