| Section 01: Introduction |
|
Introduction |
|
00:02:00 |
|
All about the Exam |
|
00:08:00 |
|
What’s New on the CompTIA CySA+ Exam? |
|
00:05:00 |
|
Meet the Instructors |
|
00:02:00 |
|
Thinking like the Enemy |
|
00:09:00 |
|
Tools of the Trade |
|
00:08:00 |
| Section 02: The Importance Of Threat Data And Intelligence |
|
Intelligence Sources and Confidence Levels |
|
00:08:00 |
|
Threat Indicators and Actors |
|
00:08:00 |
|
Threat Trends |
|
00:07:00 |
|
Intelligence Cycle and ISACs |
|
00:06:00 |
| Section 03: Threat Intelligence In Support Of Organisational Security |
|
Attack Frameworks |
|
00:06:00 |
|
Threat Research |
|
00:11:00 |
|
Threat Modeling and Intelligence Sharing |
|
00:06:00 |
| Section 04: Vulnerability Management Activities |
|
Vulnerability Identification |
|
00:07:00 |
|
Scanning Parameters and Criteria |
|
00:09:00 |
|
Scanning Special Considerations |
|
00:06:00 |
|
Validation |
|
00:03:00 |
|
Remediation and Mitigation |
|
00:08:00 |
|
Inhibitors to Remediation |
|
00:07:00 |
| Section 05: Vulnerability Assessment Tools |
|
Web Applications Scanners, Part 1 |
|
00:10:00 |
|
Web Applications Scanners, Part 2 |
|
00:05:00 |
|
Scanning |
|
00:06:00 |
|
Configuring and Executing Scans |
|
00:08:00 |
|
Vulnerability Scanning |
|
00:10:00 |
|
Reverse Engineering |
|
00:08:00 |
|
Enumeration |
|
00:06:00 |
|
Wireless Assessment Tools |
|
00:08:00 |
|
Cloud Assessment Tools |
|
00:04:00 |
| Section 06: Threats And Vulnerabilities Associated With Specialised Technology |
|
Mobile and IoT |
|
00:10:00 |
|
Embedded and Firmware Systems (RTOS, SoC, and FPGA) |
|
00:09:00 |
|
Access and Vehicles Risk |
|
00:08:00 |
|
Automation and Control Risk |
|
00:10:00 |
| Section 07: Threats And Vulnerabilities Associated With Operating In The Cloud |
|
Cloud Models |
|
00:07:00 |
|
Remote Service Invocation (FaaS, IaC, API) |
|
00:10:00 |
|
Cloud Vulnerabilities |
|
00:06:00 |
| Section 08: Mitigating Controls For Attacks And Software Vulnerabilities |
|
Injection and Overflow Attacks |
|
00:09:00 |
|
Authentication Attacks |
|
00:07:00 |
|
Exploits |
|
00:08:00 |
|
Application Vulnerabilities, Part 1 |
|
00:08:00 |
|
Application Vulnerabilities, Part 2 |
|
00:07:00 |
| Section 09: Security Solutions For Infrastructure Management |
|
Network Architecture and Asset Management |
|
00:09:00 |
|
Protecting Your Territory |
|
00:05:00 |
|
Identity and Access Management |
|
00:11:00 |
|
Encryption and Active Defense |
|
00:08:00 |
| Section 10: Software Assurance Best Practices |
|
Platforms |
|
00:07:00 |
|
SOA and DevSecOps |
|
00:09:00 |
|
Secure Software Development |
|
00:08:00 |
|
Best Coding Practices |
|
00:04:00 |
| Section 11: Hardware Assurance Best Practices |
|
Trusted Hardware |
|
00:10:00 |
|
Hardware Encryption |
|
00:04:00 |
|
Hardware Security |
|
00:08:00 |
| Section 12: Data Analysis In Security Monitoring Activities |
|
Data Analytics |
|
00:10:00 |
|
Endpoint Security |
|
00:08:00 |
|
Recon Results, Part 1 |
|
00:13:00 |
|
Recon Results, Part 2 |
|
00:05:00 |
|
Impact Analysis |
|
00:05:00 |
|
Collective Tools |
|
00:09:00 |
|
Query Writing |
|
00:07:00 |
|
E-mail Analysis, Part 1 |
|
00:10:00 |
|
E-mail Analysis, Part 2 |
|
00:08:00 |
| Section 13: Implement Configuration Changes To Existing Controls To Improve Security |
|
Permissions |
|
00:09:00 |
|
Firewalls |
|
00:08:00 |
|
Intrusion Prevention Rules |
|
00:05:00 |
|
DLP and Endpoint Detection |
|
00:05:00 |
|
Frustration and Attrition |
|
00:13:00 |
| Section 14: The Importance Of Proactive Threat Hunting |
|
Threat Hunting and the Hypothesis |
|
00:06:00 |
|
Threat Hunting Process |
|
00:07:00 |
|
Results and Benefits |
|
00:05:00 |
| Section 15: Automation Concepts And Technologies |
|
Workflow and Scripting |
|
00:07:00 |
|
API and Malware Signature Creation |
|
00:08:00 |
|
Threat Feeds and Machine Learning |
|
00:06:00 |
|
Protocols, Standards, and Software Engineering |
|
00:05:00 |
| Section 16: The Importance Of The Incident Response Process |
|
IR Roles and Responsibilities |
|
00:08:00 |
|
IR Active Preparation |
|
00:10:00 |
| Section 17: Appropriate Incident Response Procedures |
|
Incident Response Process |
|
00:07:00 |
| Section 18: Analyse Potential Indicators Of Compromise |
|
Network Symptoms |
|
00:04:00 |
|
Host Symptoms |
|
00:08:00 |
|
Application Symptoms |
|
00:04:00 |
| Section 19: Utilise Basic Digital Forensics Techniques |
|
Digital Forensics |
|
00:10:00 |
|
Seizure and Acquisitions |
|
00:05:00 |
|
Forensics Acquisition Tools |
|
00:09:00 |
|
Mobile, Virtualization, and Cloud |
|
00:06:00 |
|
Forensics Analysis, Part 1 |
|
00:04:00 |
|
Forensics Analysis, Part 2 |
|
00:08:00 |
|
Packet Capture |
|
00:12:00 |
| Section 20: The Importance Of Data Privacy And Protection |
|
Data Privacy and Security |
|
00:07:00 |
|
Nontechnical Controls |
|
00:09:00 |
|
Technical Controls |
|
00:08:00 |
| Section 21: Security Concepts In Support Of Organisational Risk Mitigation |
|
Business Impact Analysis |
|
00:05:00 |
|
Risk Identification |
|
00:05:00 |
|
Risk Calculation and Communication |
|
00:06:00 |
|
Training |
|
00:04:00 |
|
Supply Chain Assessment |
|
00:04:00 |
| Section 22: The Importance Of Frameworks, Policies, Procedures, And Controls |
|
Frameworks |
|
00:13:00 |
|
Policies and Procedures |
|
00:05:00 |
|
Controls and Procedures |
|
00:08:00 |
|
Verification |
|
00:06:00 |
| Order Your Certificate |
|
Order Your Certificate |
|
00:00:00 |