Home / Course catalog / CompTIA CySA+ (CS0-001)

Hacking

CompTIA CySA+ (CS0-001)


Description
CompTIA Cyber Security Analyst(CySA+) course will help you gain knowledge and skillset that are necessary to defend against Cyber threats.

Instructed by CompTIA certified Instructor, this course will help you attain a grasp of all the monitoring and detection of security incidents in information systems and networks and defend against those incidents.

CompTIA CySA+ will focus on capturing, monitoring & responding to network traffic findings. This course will also highlight Threat hunting, automation, IT regulatory compliance, application security and software security that will influence the work of Security Analysts.

CySA+ conceals the most up-to-date core skills used by Threat Intelligence Analysts, Application Security Analysts, compliance analysts, incident responsders and handlers, threat hunters and help fight against them both interior and exterior of Security Operations.

Hackers have infiltrated signature based solutions such as firewalls and anti-virus softwares. Hence IT security Analytics has become much more important to organisations. CySA+ helps to understand overall advanced security measures through spotting and defending malwares and advanced persistent threats(APT's), eventually providing enhanced threat identification across a vast area.

The candidates are who are willing to learn as follows

Leverage intelligence and threat detection techniques
Analyze and interpret data
Identify and address vulnerabilities
Suggest preventative measures
Effectively respond to and recover from incidents

Skills you will learn

Threat and Vulnerability Management

Analyse threats and support IT security to organisations and look after vulnerability management activities

Software systems and security

Provide application security and infrastructure management. Also assure software and hardware best practices.

Compliance and Assessment

Practice Risk mitigation. Understand important frameworks, policies, procedures and controls.

Security Operations and Monitoring

Data analysis and monitoring network activity. Bring in configuration changes and improvise security controls.

Incident Response

Provide required incident response procedure, inspect potential indicators to detect compromised systems and use digital forensics technique.

Continue To Order: https://ethicalhackersacademy.com/collec...

Content
  • Welcome and Introduction
  • 1. Welcome to the Course.mp4
  • 1.1 CompTIA CySA_ _Study Notes_.pdf
  • 2. Exam Foundations.mp4
  • 2.1 02 - Exam Foundations.pdf
  • 3. A Special Message From Jason Dion.mp4
  • Domain 1 Threat Management (27%)
  • 1. Domain 1 Threat Management.mp4
  • 1.1 Domain 1 - Threat Management.pdf.pdf
  • 2. CIA Triad.mp4
  • 2.1 05 - CIA Triad.pdf.pdf
  • 3. Risk Consideration.mp4
  • 4. Risk Assessment.mp4
  • 5. Identify Threats.mp4
  • 7. Likelihood_ Impact_ and Risk.mp4
  • 8. Qualitative and Quantitative Assessments.mp4
  • 9. Reviewing Controls.mp4
  • 10. Network Perimeter Security.mp4
  • 11. Network Segmentation.mp4
  • 12. Network Access Control.mp4
  • 13. Defense Deception Methods.mp4
  • 14. Secure Endpoint Management.mp4
  • 15. Penetration Testing.mp4
  • 16. Security Exercises and Training.mp4
  • 17. Reverse Engineering.mp4
  • 19. Reconnaissance and Intelligence.mp4
  • 20. Footprinting the Network.mp4
  • 21. Network Mapping.mp4
  • 22. Port Scanning.mp4
  • 23. Other Port Scanners.mp4
  • 24. NMAP - Demonstration of the world_s most popular port scanning tool.mp4
  • 25. Passive Reconnaissance.mp4
  • 26. Passive Recon - Network Devices.mp4
  • 27. Passive Recon - Netstat.mp4
  • 28. DHCP Logs and Configs.mp4
  • 29. Firewall Logs and Configs.mp4
  • 30. System and Host Log Files.mp4
  • 31. DNS Harvesting.mp4
  • 32. Domain Names and IP Ranges.mp4
  • 33. DNS Zone Transfers.mp4
  • 34. Whois and Host Commands.mp4
  • 35. Information Gathering and Aggregation.mp4
  • 36. Organizational Intelligence.mp4
  • 37. Detecting_ Preventing_ and Responding to Reconnaissance.mp4
  • 3.1 06 - Risk Considerations.pdf.pdf
  • 4.1 07 - Risk Assessment.pdf.pdf
  • 5.1 08 - Identify Threats.pdf.pdf
  • 6.1 09 - Identify Vulnerabilities.pdf.pdf
  • 7.1 10 - Likelihood_ Impact_ and Risk.pdf.pdf
  • 8.1 11 - Qualitative and Quantitative Assessments.pdf.pdf
  • 9.1 12 - Revieiwing Controls.pdf.pdf
  • 10.1 13 - Network Perimeter Security.pdf.pdf
  • 11.1 14 - Network Segmentation.pdf.pdf
  • 12.1 15 - Network Access Control.pdf.pdf
  • 13.1 16 - Defense Deception Methods.pdf.pdf
  • 14.1 17 - Secure Endpoint Management.pdf.pdf
  • 14.1 17 - Secure Endpoint Management.pdf.pdf
  • 15.1 18 - Penetration Testing.pdf.pdf
  • 16.1 19 - Security Exercises and Training.pdf.pdf
  • 17.1 20 - Reverse Engineering.pdf.pdf
  • 19.1 21 - Reconnaissance and Intelligence.pdf.pdf
  • 20.1 22 - Footprinting the Network.pdf.pdf
  • 21.1 23 - Network Mapping.pdf.pdf
  • 22.1 24 - Port Scanning.pdf.pdf
  • 23.1 25 - Other Port Scanners.pdf.pdf
  • 25.1 27 - Passive Reconnaissance.pdf.pdf
  • 26.1 28 - Passive Recon - Network Devices.pdf.pdf
  • 27.1 29 - Passive Recon - Netstat.pdf.pdf
  • 28.1 30 - DHCP Logs and Configs.pdf.pdf
  • 29.2 31 - Firewall Logs and Configs.pdf.pdf
  • 30.1 32 - System and Host Log Files.pdf.pdf
  • 31.1 33 - DNS Harvesting.pdf.pdf
  • 32.1 34 - Domain Names and IP Ranges.pdf.pdf
  • 33.1 35 - DNS Zone Transfers.pdf.pdf
  • 34.1 36 - Whois and Host Commands.pdf.pdf
  • 35.1 37 - Information Gathering and Aggregation.pdf.pdf
  • 36.1 38 - Organizational Intelligence.pdf.pdf
  • 37.1 39 - Detecting_ Preventing_ and Responding to Reconnaissance.pdf.pdf
  • Domain 2 Vulnerability Management (26%)
  • 1. Domain 2 Vulnerability Management.mp4
  • 2. Regulatory Requirements.mp4
  • 3. Corporate Requirements.mp4
  • 4. Scanning Tools.mp4 sample
  • 5. Scoping Scans.mp4
  • 6. Configuring Scans.mp4
  • 7. Scanning Sensitivity.mp4
  • 8. Scanning Perspective.mp4
  • 9. Authenticated Scanning.mp4
  • 10. Maintaining Scanners.mp4
  • 11. Standardizing Vulnerabilities.mp4
  • 12. Workflow for Remediation.mp4
  • 13. Vulnerability Reporting.mp4
  • 14. Remediation Priority.mp4
  • 15. Implementing and Testing.mp4
  • 16. Nessus Vulnerability Scanner A Walkthrough.mp4
  • 18. Interpreting Scan Results.mp4
  • 19. Interpreting CVSS.mp4
  • 20. Calculating the CVSS Score.mp4
  • 21. CVSS Temporal Score.mp4
  • 22. Validation of Results.mp4
  • 23. Common Vulnerabilities.mp4
  • 24. Server and Host Vulnerabilities.mp4
  • 25. Network Vulnerabilities.mp4
  • 26. Virtualization Vulnerabilities.mp4
  • 27. Web Application Vulnerabilities.mp4
  • 28. Internet of Things _IoT_ Vulnerabilities.mp4
  • 1.2 40 - Domain 2 - Vulnerability Management.pdf.pdf
  • 2.1 41 - Regulatory Requirements.pdf.pdf
  • 3.1 42 - Corporate Requirements.pdf.pdf
  • 4.1 43 - Scanning Tools.pdf.pdf
  • 5.1 44 - Scoping Scans.pdf.pdf
  • 6.1 45 - Configuring Scans.pdf.pdf
  • 7.1 46 - Scanning Sensitivity.pdf.pdf
  • 8.1 47 - Scanning Perspective.pdf.pdf
  • 9.1 48 - Authenticated Scanning.pdf.pdf sample
  • 10.1 49 - Maintaining Scanners.pdf.pdf
  • 11.1 50 - Standardizing Vulnerabilities.pdf.pdf
  • 12.1 51 - Workflow for Remediation.pdf.pdf
  • 13.1 52 - Vulnerability Reporting.pdf.pdf
  • 14.1 53 - Remediation Reporting.pdf.pdf
  • 15.1 54 - Implementing and Testing.pdf.pdf
  • 16.1 55 - Nessus-Scan-Report-Example.pdf.pdf
  • 18.1 56 - Interpreting Scan Results.pdf.pdf
  • 19.1 57 - Interpeting CVSS.pdf.pdf
  • 20.1 58 - Calculating the CVSS Score.pdf.pdf
  • 21.1 59 - CVSS Temporal Score.pdf.pdf
  • 22.1 60 - Validation of Results.pdf.pdf
  • 23.1 61 - Common Vulnerabilities.pdf.pdf
  • 24.1 62 - Server and Host Vulnerabilities.pdf.pdf
  • 25.1 63 - Network Vulnerabilities.pdf.pdf
  • 26.1 64 - Virtualization Vulnerabilities.pdf.pdf
  • 27.1 65 - Web Application Vulnerabilities.pdf.pdf
  • 28.1 66 - Internet of Things _IoT_ Vulnerabilities.pdf.pdf
  • Domain 3 Cyber Incident Response (23%)
  • 1. Domain 3 Cyber Incident Response.mp4
  • 2. Security Incidents.mp4
  • 3. Incident Response Teams.mp4
  • 4. Incident Response Phases.mp4
  • 5. Incident Response Policy and Procedures.mp4
  • 6. Communication and Info Sharing.mp4
  • 7. Incident Classification.mp4
  • 9. Network Event Monitoring.mp4
  • 10. Network Monitoring Tools.mp4
  • 11. Detecting Network Events.mp4
  • 12. Network Probes and Attacks.mp4
  • 13. Server and Host Events.mp4
  • 14. Service and Application Events.mp4
  • 16. Digital Forensics.mp4
  • 17. Forensic Toolkit Components.mp4
  • 18. Mobile Forensic Toolkits.mp4
  • 19. Forensic Software.mp4
  • 20. Training and Certification.mp4
  • 21. Forensic Investigation Process.mp4
  • 22. Disk Imaging.mp4
  • 23. Disk Imaging Using dd.mp4
  • 24. Disk Imaging Using FTK Imager.mp4
  • 26. Incident Containment.mp4
  • 27. Eradication and Recovery.mp4
  • 28. Finishing the Response.mp4
  • 1.1 67 - Domain 3 - Cyber Incident Response.pdf.pdf
  • 1.2 Domain 3 - Cyber Incident Response.pdf.pdf
  • 2.1 68 - Security Incidents.pdf.pdf
  • 3.1 69 - Incident Response Teams.pdf.pdf
  • 4.1 70 - Incident Response Phases.pdf.pdf
  • 5.1 71 - Incident Response Policy _ Procedures.pdf.pdf
  • 6.1 72 - Communication and Information Sharing.pdf.pdf
  • 7.1 73 - Incident Classification.pdf.pdf
  • 9.1 74 - Network Event Monitoring.pdf.pdf
  • 10.1 75 - Network Monitoring Tools.pdf.pdf
  • 11.1 76 - Detecting Network Events.pdf.pdf
  • 12.1 77 - Network Probes and Attacks.pdf.pdf
  • 13.1 78 - Server and Host Events.pdf.pdf
  • 14.1 79 - Service and Application Events.pdf.pdf
  • 16.1 80 - Digital Forensics.pdf.pdf
  • 17.1 81 - Forensic Toolkit Components.pdf.pdf
  • 18.1 82 - Mobile Forensic Toolkits.pdf.pdf
  • 18.1 82 - Mobile Forensic Toolkits.pdf.pdf
  • 19.1 83 - Forensic Software.pdf.pdf
  • 20.1 84 - Training and Certification.pdf.pdf
  • 21.1 85 - Forensic Investigation Process.pdf.pdf
  • 22.1 86 - Disk Imaging.pdf.pdf
  • 26.1 89 - Incident Containment.pdf.pdf
  • 27.1 90 - Eradication and Recovery.pdf.pdf
  • 28.1 91 - Finishing the Response.pdf.pdf
  • Domain 4 Security Architecture and Toolsets (24%)
  • 1. Domain 4 Security Architecture and Tool Sets.mp4
  • 2. Policy Documents.mp4
  • 3. Standard Frameworks.mp4
  • 4. Policy-based Controls.mp4
  • 5. Audits and Assessments.mp4
  • 6. Laws and Regulations.mp4
  • 8. Defense in Depth.mp4
  • 9. Types of Controls.mp4
  • 10. Layered Network Defense.mp4
  • 11. Layered Host Security.mp4
  • 12. Data Analytics.mp4
  • 13. Personnel Security.mp4
  • 14. Outsourcing Concerns.mp4
  • 15. User Awareness Training.mp4
  • 16. Analyzing Secure Architectures.mp4
  • 18. What Is Identity.mp4
  • 19. Identity Systems.mp4
  • 20. Threats to Identity Systems.mp4
  • 21. Attacking AAA Protocols and Systems.mp4 sample
  • 22. Targeting Account Lifecycle.mp4
  • 23. Identity Exploits.mp4
  • 24. Credential Theft.mp4
  • 25. Securing Authentication and Authorization System.mp4
  • 26. Identity as a Service _IDaaS_.mp4
  • 27. Detecting Identity Attacks.mp4
  • 28. Federated Identity Systems.mp4
  • 30. Software Development Life Cycle _SDLC_.mp4
  • 31. Software Development Models.mp4
  • 32. Coding for Security.mp4
  • 33. Testing Application Security.mp4
  • 34. Finding Security Flaws.mp4
  • 35. Web Application Vulnerability Scanners.mp4
  • 1.1 Domain 4 - Security Architecture _ Tool Sets.pdf.pdf
  • 1.2 92 - Domain 4 - Security Architecture _ Tool Sets.pdf.pdf
  • 2.1 93 - Policy Documents.pdf.pdf
  • 3.1 94 - Standard Frameworks.pdf.pdf
  • 4.1 95 - Policy-Based Controls.pdf.pdf
  • 5.1 96 - Audits and Assessments.pdf.pdf
  • 6.1 97 - Laws and Regulations.pdf.pdf
  • 8.1 98 - Defense in Depth.pdf.pdf
  • 9.1 99 - Types of Controls.pdf.pdf
  • 10.1 100 - Layered Network Design.pdf.pdf
  • 11.1 101 - Layered Host Security.pdf.pdf
  • 12.1 102 - Data Analytics.pdf.pdf
  • 13.1 103 - Personnel Security.pdf.pdf
  • 14.1 104 - Outsourcing Concerns.pdf.pdf
  • 15.1 105 - User Awareness Training.pdf.pdf
  • 16.1 106 - Analyzing Secure Architectures.pdf.pdf
  • 18.1 107 - What is Identity.pdf.pdf
  • 19.1 108 - Identity Systems.pdf.pdf
  • 20.1 109 - Threats to Identity Systems.pdf.pdf
  • 21.1 110 - Attacking AAA Protocols and Systems.pdf.pdf
  • 22.1 111 - Targeting Account Lifecycle.pdf.pdf
  • 23.1 112 - Identity Exploits.pdf.pdf
  • 24.1 113 - Credential Theft.pdf.pdf
  • 25.1 114 - Securing Authentication and Authorization.pdf.pdf
  • 26.1 115 - Identity as a Service _IDaaS_.pdf.pdf
  • 27.1 116 - Detecting Identity Attacks.pdf.pdf
  • 28.1 117 - Federated Identity Systems.pdf.pdf
  • 30.1 118 - Software Development Life Cycle _SDLC_.pdf.pdf
  • 31.1 119 - Software Development Models.pdf.pdf
  • 32.1 120 - Coding for Security.pdf.pdf
  • 33.1 121 - Testing Application Code.pdf.pdf
  • 34.1 122 - Finding Security Flaws.pdf.pdf
  • 35.1 123 - Web Application Vulnerability Scanning.pdf.pdf
  • Conclusion
  • 1. How to Schedule Your Exam.mp4
  • 2. Conclusion.mp4
  • 3. BONUS A Special Thank You Message From Jason.mp4
  • 2.1 CompTIA CySA_ Course _Conclusion_.pdf.pdf
  • Practice Exam
  • 1. Simulations and Performance-Based Questions _PBQs_.mp4
Completion rules
  • All units must be completed