Autoplay
Autocomplete
HTML5
Flash
Player
Speed
Previous Lecture
Complete and continue
CompTIA Cybersecurity Analyst CySA+ (CS0-001)
Introduction
CompTIA Cybersecurity Analyst CySA+ (CS0-001): Introduction (2:00)
Module 1: Threat Management
Module Introduction (0:21)
Lesson 1: Reconnaissance Techniques
Learning objectives (0:20)
1.1 Introduction to Reconnaissance Techniques (5:31)
1.2 Reconnaissance Techniques (9:03)
1.3 Techniques of OS Fingerprinting (8:08)
1.4 Understanding Advanced NMAP Techniques (15:27)
1.5 Introducing NMAP (15:37)
1.6 Reconnaissance Techniques Using Packet Captures, Log Reviews, Firewall Reviews, ACL Reviews (11:51)
1.7 Discovering your Targets through Social Media Profiling and Engineering (16:22)
1.8 Digging Deeper into Social Engineering (14:10)
1.9 Email Harvesting, DNS Harvesting, and Phishing Techniques (14:28)
1.10 FOCA Demo (6:06)
1.11 Examining Virtual and Physical Environments (5:46)
1.12 Examining Internal, External, On-Premise, and Cloud Connections (3:59)
1.13 Using NMAP for Host, Service, and Network Scanning (6:25)
1.14 Reading Firewall Rule-based and Logs (4:50)
1.15 Reconnaissance Techniques Using Vulnerability Scanners (2:58)
1.16 OpenVAS Lab (1:53)
Summary (1:29)
Lesson 2: Network Reconnaissance
Learning objectives (0:21)
2.1 Understanding Point-in-time Data Analysis (5:30)
2.2 NetFlow Analysis (7:35)
2.3 Traffic and NetFlow Analysis (4:28)
2.4 Wireless Analysis Techniques (9:31)
2.5 Anomaly, Trend, and Behavioral Analysis Techniques (3:36)
2.6 Examining Logs, Packet Captures, NMAP Results, Event Logs, and Syslog Data (5:09)
2.7 Reconnaissance Discovery Using SIEMs and Packet Analyzers (2:13)
Summary (0:23)
Lesson 3: Response and Counter Measures
Learning objectives (0:20)
3.1 Introduction to Response and Counter Measures (3:52)
3.2 Countermeasure Techniques Using Network Isolation, System Isolation, and Jump Boxes (7:17)
3.3 Honeypots, Endpoint Security, and Group Policies as Countermeasures (6:33)
3.4 Understanding Sinkholes (9:04)
3.5 Hardening Systems to Deter Reconnaissance Attacks (6:28)
3.6 Mitigating Risks through Network Access Control (NAC) (3:57)
Summary (0:54)
Lesson 4: Securing Corporate Environments
Learning objectives (0:21)
4.1 Penetration Testing Concepts and Objectives (8:46)
4.2 Having Rules of Engagement and Proper Authorization (3:32)
4.3 Understanding Red Team vs. Blue Team Concepts q (4:28)
Summary (1:07)
Module 2: Vulnerability Management
Module Introduction (0:25)
Lesson 5: Implementing the Information Security Vulnerability Management Process
Learning objectives (0:17)
5.1 Identifying Industry, Corporate, and Regulatory Requirements (3:27)
5.2 Establishing Appropriate Scanning Frequencies (2:21)
5.3 Configuring Tools with the Appropriate Options (2:35)
5.4 Generating and Creating Reports (2:37)
5.5 How to Remediate and Prioritize Vulnerabilities (5:39)
5.6 Determining Vulnerabilities Using a Sandbox (11:27)
5.7 Risks and Inhibitors to Remediation (2:15)
Summary (0:17)
Lesson 6: Analyze Output of Vulnerability Scan
Learning objectives (0:23)
6.1 Analyzing Vulnerability Scan Reports (5:54)
6.2 How to Identify False Positives (3:35)
6.3 Validating Scan Results and Correlating Data Points (1:32)
6.4 Determining Best Practices, Trends, and Needs from Results (2:37)
6.5 Vulnerability Scan Output Demo (9:08)
Summary (0:19)
Lesson 7: Compare and Contrast Common Vulnerabilities
Learning objectives (0:19)
7.1 Understanding Common Vulnerabilities (4:18)
7.2 Virtual Infrastructure Risks and Vulnerabilities for an Organization (4:01)
7.3 Vulnerabilities in Modern Industrial Controls Systems (ICSs) and SCADA Devices (6:13)
7.4 Email Headers and Honeypots (7:52)
7.5 Windows Services and Logs (6:17)
7.6 Ingress / Egress Filtering and Virtual Environment Risks (10:54)
Summary (1:37)
Module 3: Cyber Incident Response
Module Introduction (0:33)
Lesson 8: Determine Impact of an Incident
Learning Objectives (0:20)
8.1 Determining Impact of an Incident (12:27)
8.2 Determining Threat Classification (Part 1) (10:35)
8.3 Determining Threat Classification (Part 2) (8:32)
8.4 Determining Incident Severity for Threats (Part 1) (8:14)
8.5 Determining Incident Severity for Threats (Part 2) (7:02)
8.6 Understanding the Importance of Data Classification when Determining Threats (13:31)
Summary (2:07)
Lesson 9: Forensics Tools and Investigation
Learning objectives (0:32)
9.1 Forensics Tools and Investigation (10:34)
9.2 Introduction to Forensics (8:25)
9.3 Using the Chain of Custody (13:44)
9.4 Using Common Forensic Tools (15:01)
9.5 Overview of Forensic Procedures (13:29)
9.6 Acquiring Data (8:54)
Summary (2:29)
Lesson 10: Incident Reporting and Communications
Learning objectives (0:43)
10.1 Incident Reporting and Communications (4:31)
10.2 Stakeholder and Shareholder Communications Procedures during a Breach (11:56)
10.3 Establishing a Communications Chain (7:45)
10.4 Information Disclosure, Legal, and Regulatory Requirements (8:43)
10.5 Roles and Responsibilities for Effective Communications during a Breach (12:16)
Summary (1:30)
Lesson 11: Analyzing Incident Response Symptoms and Recovery Techniques
Learning Objectives (0:29)
11.1 Incident Response Symptoms and Recovery Techniques (8:01)
11.2 Analyzing Computer- and Hardware-related Symptoms (12:27)
11.3 Symptom Examples (10:31)
11.4 Exfiltration (8:25)
11.5 Host Remediation Options (4:11)
11.6 Analyzing and Working Network- and Traffic-related Symptoms (11:41)
11.7 Baselines (6:44)
11.8 Irregular Communication (11:21)
11.9 Rogue Devices and Reconnaissance (5:28)
11.10 Port Scanning and Exploitation (8:07)
11.11 Analyzing Application-related Symptoms (11:58)
11.12 Analyzing Injection and XXS (10:39)
11.13 Broken Authentication and Patching Challenges (10:33)
11.14 Denial of Service (Part 1) (10:17)
11.15 Denial of Service (Part 2) (9:27)
Summary (1:52)
Lesson 12: Post-Incident Response Process
Learning Objectives (0:24)
12.1 Post-Incident Response Process (3:39)
12.2 Containing an Incident (15:17)
12.3 Access Control Demonstration with Cisco Identity Services Engine (19:44)
12.4 Access Control Technology Details (13:39)
12.5 Reading Authentication Log (4:37)
12.6 Corrective Actions (Part 1) (15:57)
12.7 Attack Lifecycle Example (12:41)
12.8 Corrective Actions (Part 2) (9:32)
12.9 Writing an Incident Report (14:53)
Summary (1:49)
Module 4: Security Architecture and Tool Sets
Module Introduction (0:28)
Lesson 13: Frameworks, Common Policies, Controls, and Procedures
Learning Objectives (0:31)
13.1 Introduction to Frameworks, Common Policies, Controls, and Procedures (5:42)
13.2 Frameworks, Common Policies, Controls, and Procedures (2:57)
13.3 Understanding Regulatory Compliance and Common Frameworks (Part 1) (10:44)
13.4 Understanding Regulatory Compliance and Common Frameworks (Part 2) (6:59)
13.5 Policies (Part 1) (11:01)
13.6 Policies (Part 2) (8:12)
13.7 Implementing Security Controls and Procedures (15:09)
13.8 Security Controls (5:08)
13.9 Procedures and Monitoring (6:39)
13.10 Testing and Remediation (12:59)
13.11 Testing Policies (Part 1) (10:41)
13.12 Testing Policies (Part 2) (12:00)
Summary (2:33)
Lesson 14: Access Control and Access Management Remediation
Learning Objectives (0:33)
14.1 Introduction to Access Control and Access Management Remediation (2:09)
14.2 Access Control and Access Management Remediation (10:09)
14.3 Understanding Risks with Context-based Authentication Methods (13:57)
14.4 Security Solutions Based on Identities and Identity Repositories (12:12)
14.5 Risks and Rewards with Single Sign-on (15:14)
14.6 Understanding and Reviewing Identification Exploits and Hacks (10:13)
Summary (2:09)
Lesson 15: Reviewing Security Architectures
Learning Objectives (0:27)
15.1 Introduction to Reviewing Security Architectures (4:24)
15.2 Reviewing Security Architectures (7:45)
15.3 Understanding Security Data Analytics (13:20)
15.4 Reviewing Log Files (Part 1) (14:38)
15.5 Reviewing Log Files (Part 2) (16:25)
15.6 Defense in Depth (Part 1): Personal (16:15)
15.7 Defense in Depth (Part 2): Processes (10:03)
Summary (1:07)
Lesson 16: Software Development Life Cycle (SDLC) Best Practices
Learning Objectives (0:36)
16.1 Introduction to Software Development Life Cycle (SDLC) Best Practices (5:23)
16.2 Software Development Life Cycle (SDLC) Best Practices (3:16)
16.3 Best Practices during Software Development Phase (8:41)
16.4 Testing Applications for Vulnerabilities (7:18)
16.5 Implementing a Peer Review and Stress Testing Process (8:28)
16.6 Best Practices for Secure Coding, OWASP, and SANS (8:37)
Summary (3:02)
Lesson 17: Cybersecurity Tools and Technologies
Learning Objectives (0:35)
17.1 Cybersecurity Tools and Technologies (15:00)
17.2 Preventive Technologies: Firewalls (18:51)
17.3 Preventive Technologies: Proxy and Application Layer Firewall (7:51)
17.4 Comparing Proxies and Application Firewalls (8:27)
17.5 Selecting a Firewall (9:35)
17.6 Prevention Technologies: IPS (Part 1) (13:12)
17.7 Detecting Bruteforce with Wireshark and IPS (15:54)
17.8 Detecting Files with Wireshark and IPS (15:16)
17.9 Prevention Technologies: IPS (Part 2) (10:28)
17.10 Cisco Breach Detection Demo (16:27)
17.11 SIEM Core Concepts (9:42)
17.12 Understanding and Selecting a SIEM (12:40)
17.13 Vulnerability Scanners Overview (14:50)
17.14 Vulnerability Scanner Concepts (8:28)
17.15 NetFlow and Packet Capture Concepts (6:05)
17.16 Cisco StealthWatch NetFlow Example (8:17)
17.17 Command Line and OpenSSL (2:42)
17.18 Exploitation Technologies (11:51)
Test Taking Strategies (5:55)
Summary (0:59)
Summary
CompTIA Cybersecurity Analyst CySA+ (CS0-001): Summary (1:12)
13.3 Understanding Regulatory Compliance and Common Frameworks (Part 1)
Lecture content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock