CompTIA CySA+ Cybersecurity Analyst

Chapter 1: Introduction
1
01 – Thinking Like the Enemy
2
02 – Tools of the Trade
Chapter 2: Analyzing Reconnaissance Results
1
01 – Recon Results: Part 1
2
02 – Recon Results: Part 2
3
03 – Data Output
Chapter 3: Responding to Network-Based Threats
1
01 – Protecting Your Territory
2
02 – Hardening Strategies
Chapter 4: Securing a Corporate Environment
1
01 – Pen Testing
2
02 – Training
3
03 – Reverse Engineering
4
04 – Risk Evaluation
Chapter 5: Vulnerability Management
1
01 – Requirements Identification
2
02 – Scanning
3
03 – Configuring and Executing Scans
4
04 – Reporting and Remediating
Chapter 6: Analyzing Vulnerabilities Scan Results
1
01 – Common Vulnerabilities: Part 1
2
02 – Common Vulnerabilities: Part 2
Chapter 7: Incident Response
1
01 – Incident Response Process
2
02 – IR Roles and Responsibilities
Chapter 8: Preparation Phase
1
01 – IR Active Preparation
2
02 – Threat Trends
Chapter 9: Forensic Tools
1
01 – Digital Forensics
2
02 – Seizure and Acquisitions
3
03 – Forensics Acquisition Tools
4
04 – Forensics Analysis: Part 1
5
05 – Forensics Analysis: Part 2
Chapter 10: Common Symptoms of Compromise
1
01 – Network Symptoms
2
02 – Host Symptoms
3
03 – Application Symptoms
Chapter 11: Incident Recovery and Post-Incident Response Process
1
01 – Moving Forward: Part 1
2
02 – Moving Forward: Part 2
Chapter 12: Frameworks
Common Policies
Controls and Procedures
1
01 – Frameworks
2
02 – Policies
3
03 – Controls & Procedures
4
04 – Verifications
Chapter 13: Identity and Access Management
1
01 – Context-Based Authentication
2
02 – Identities
3
03 – Managing Identities
4
04 – Exploits
Chapter 15: Defense Strategies
1
01 – Data Analytics
2
02 – Defense in Depth
Chapter 15: Software Development Life Cycle (SDLC)
1
01 – Secure Software Development
2
02 – Best Coding Practices
Chapter 16: Tools and Technologies
1
01 – Preventative Tools: Part 1
2
02 – Preventative Tools: Part 2
3
03 – Collective Tools
4
04 – Vulnerability Scanning
5
05 – Packet Capture
6
06 – Connectivity Tools
7
07 – Pen Testing Tools
Be the first to add a review.
Please, login to leave a review