CompTIA CySA+ Cybersecurity Analyst

CompTIA CySA+ Cybersecurity Analyst

As aggressors have figured out how to sidestep conventional mark based arrangements, like firewalls and against infection programming, an investigation based methodology inside the IT security industry is progressively significant for associations. CompTIA CySA+ applies social investigation to organizations to improve the general condition of safety through recognizing and fighting malware and progressed diligent dangers (APTs), bringing about an upgraded danger perceivability across an expansive assault surface. It will approve an IT expert’s capacity to proactively shield and constantly improve the security of an association. CySA+ will check the effective competitor has the information and abilities needed to:

Chapter 1: Introduction

1
01 – Thinking Like the Enemy
2
02 – Tools of the Trade

Chapter 2: Analyzing Reconnaissance Results

1
01 – Recon Results: Part 1
2
02 – Recon Results: Part 2
3
03 – Data Output

Chapter 3: Responding to Network-Based Threats

1
01 – Protecting Your Territory
2
02 – Hardening Strategies

Chapter 4: Securing a Corporate Environment

1
01 – Pen Testing
2
02 – Training
3
03 – Reverse Engineering
4
04 – Risk Evaluation

Chapter 5: Vulnerability Management

1
01 – Requirements Identification
2
02 – Scanning
3
03 – Configuring and Executing Scans
4
04 – Reporting and Remediating

Chapter 6: Analyzing Vulnerabilities Scan Results

1
01 – Common Vulnerabilities: Part 1
2
02 – Common Vulnerabilities: Part 2

Chapter 7: Incident Response

1
01 – Incident Response Process
2
02 – IR Roles and Responsibilities

Chapter 8: Preparation Phase

1
01 – IR Active Preparation
2
02 – Threat Trends

Chapter 9: Forensic Tools

1
01 – Digital Forensics
2
02 – Seizure and Acquisitions
3
03 – Forensics Acquisition Tools
4
04 – Forensics Analysis: Part 1
5
05 – Forensics Analysis: Part 2

Chapter 10: Common Symptoms of Compromise

1
01 – Network Symptoms
2
02 – Host Symptoms
3
03 – Application Symptoms

Chapter 11: Incident Recovery and Post-Incident Response Process

1
01 – Moving Forward: Part 1
2
02 – Moving Forward: Part 2

Chapter 12: Frameworks

Common Policies

Controls and Procedures

1
01 – Frameworks
2
02 – Policies
3
03 – Controls & Procedures
4
04 – Verifications

Chapter 13: Identity and Access Management

1
01 – Context-Based Authentication
2
02 – Identities
3
03 – Managing Identities
4
04 – Exploits

Chapter 15: Defense Strategies

1
01 – Data Analytics
2
02 – Defense in Depth

Chapter 15: Software Development Life Cycle (SDLC)

1
01 – Secure Software Development
2
02 – Best Coding Practices

Chapter 16: Tools and Technologies

1
01 – Preventative Tools: Part 1
2
02 – Preventative Tools: Part 2
3
03 – Collective Tools
4
04 – Vulnerability Scanning
5
05 – Packet Capture
6
06 – Connectivity Tools
7
07 – Pen Testing Tools

Be the first to add a review.

Please, login to leave a review
Add to Wishlist
Lectures: 50

Review

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Mike Stuart

Support

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Mila Kunis

Manager

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Adam Sendler

Designer

Social Network

CompTIA CySA+ Cybersecurity Analyst
Price:
$30