Video description
The second edition of this video title is available. Please go to CompTIA Cybersecurity Analyst (CySA+) CS0-002 https://learning.oreilly.com/videos/comptia-cybersecurity-analyst/9780137432110/.
Over 21 hours of deep-dive training covering every objective in the CompTIA Cybersecurity Analyst CySA+ (CS0-001) exam
The CompTIA Cybersecurity Analyst CySA+ (CS0-001) Complete Video Course is an engaging, self-paced video training solution that provides learners with over 21 hours of personal, visual instruction from two cybersecurity expert trainers. Through the use of topic-focused instructional videos, you will gain an in-depth understanding of each objective in the CompTIA CySA+ exam as well as a deeper understanding of cyber security foundations and principles.
CompTIA Cybersecurity Analyst CySA+ (CS0-001) Complete Video Course contains over 21 hours of training with content divided into 4 modules with 17 content targeted content lessons. This title covers every objective in the CompTIA CySA+ exam and includes two full practice exams, so you have everything you need to learn all of the cyber security principles that appear on the test; but more than that, you will learn the fundamentals of preventing, detecting and combatting cybersecurity threats. Full of live trainer discussions, hands-on demos, whiteboard work, and deep dive discussions, this course covers cyber security fundamentals in a way that is easy to access and even fun.
The video lessons in this course review each exam objective, so you can use it as a complete study tool for taking the CompTIA CySA+ exam.
Skill Level
What You Will Learn
- Every objective on the CompTIA Cybersecurity Analystic CySA+ exam
- Tips to prepare for and pass the exam
- Real-world cyber security configuration and detection skills
- How to perform data analysis and interpret results to identify vulnerabilities, threats and risks
Who Should Take This Course
Primary audience: Anyone preparing for the CompTIA Cybersecurity Analyst CySA+ examination.
Secondary audience: Anyone interested in learning cyber security fundamentals.
Course Requirements
While there is no required prerequisite, CySA+ is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus.
About LiveLessons Video Training
Pearson’s LiveLessons video training series publishes the industry’s leading video tutorials for IT pros, developers, sys admins, devops, network engineers, and certification candidates. LiveLessons feature the highest-quality professional skills training led by recognized author instructors published by Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que. Topics include IT certification, programming, development, networking, software skills for the home, office, and business, and more. Your purchase provides you with lifetime online access to the content.
http://www.pearsonitcertification.com/livelessons
Table of Contents
Introduction
CompTIA Cybersecurity Analyst CySA+ (CS0-001): Introduction
Module 1: Threat Management
Module Introduction
Lesson 1: Reconnaissance Techniques
Learning objectives
1.1 Introduction to Reconnaissance Techniques
1.2 Reconnaissance Techniques
1.3 Techniques of OS Fingerprinting
1.4 Understanding Advanced NMAP Techniques
1.5 Introducing NMAP
1.6 Reconnaissance Techniques Using Packet Captures, Log Reviews, Firewall Reviews, ACL Reviews
1.7 Discovering your Targets through Social Media Profiling and Engineering
1.8 Digging Deeper into Social Engineering
1.9 Email Harvesting, DNS Harvesting, and Phishing Techniques
1.10 FOCA Demo
1.11 Examining Virtual and Physical Environments
1.12 Examining Internal, External, On-Premise, and Cloud Connections
1.13 Using NMAP for Host, Service, and Network Scanning
1.14 Reading Firewall Rule-based and Logs
1.15 Reconnaissance Techniques Using Vulnerability Scanners
1.16 OpenVAS Lab
Summary
Lesson 2: Network Reconnaissance
Learning objectives
2.1 Understanding Point-in-time Data Analysis
2.2 NetFlow Analysis
2.3 Traffic and NetFlow Analysis
2.4 Wireless Analysis Techniques
2.5 Anomaly, Trend, and Behavioral Analysis Techniques
2.6 Examining Logs, Packet Captures, NMAP Results, Event Logs, and Syslog Data
2.7 Reconnaissance Discovery Using SIEMs and Packet Analyzers
Summary
Lesson 3: Response and Counter Measures
Learning objectives
3.1 Introduction to Response and Counter Measures
3.2 Countermeasure Techniques Using Network Isolation, System Isolation, and Jump Boxes
3.3 Honeypots, Endpoint Security, and Group Policies as Countermeasures
3.4 Understanding Sinkholes
3.5 Hardening Systems to Deter Reconnaissance Attacks
3.6 Mitigating Risks through Network Access Control (NAC)
Summary
Lesson 4: Securing Corporate Environments
Learning objectives
4.1 Penetration Testing Concepts and Objectives
4.2 Having Rules of Engagement and Proper Authorization
4.3 Understanding Red Team vs. Blue Team Concepts
Summary
Module 2: Vulnerability Management
Module Introduction
Lesson 5: Implementing the Information Security Vulnerability Management Process
Learning objectives
5.1 Identifying Industry, Corporate, and Regulatory Requirements
5.2 Establishing Appropriate Scanning Frequencies
5.3 Configuring Tools with the Appropriate Options
5.4 Generating and Creating Reports
5.5 How to Remediate and Prioritize Vulnerabilities
5.6 Determining Vulnerabilities Using a Sandbox
5.7 Risks and Inhibitors to Remediation
Summary
Lesson 6: Analyze Output of Vulnerability Scan
Learning objectives
6.1 Analyzing Vulnerability Scan Reports
6.2 How to Identify False Positives
6.3 Validating Scan Results and Correlating Data Points
6.4 Determining Best Practices, Trends, and Needs from Results
6.5 Vulnerability Scan Output Demo
Summary
Lesson 7: Compare and Contrast Common Vulnerabilities
Learning objectives
7.1 Understanding Common Vulnerabilities
7.2 Virtual Infrastructure Risks and Vulnerabilities for an Organization
7.3 Vulnerabilities in Modern Industrial Controls Systems (ICSs) and SCADA Devices
7.4 Email Headers and Honeypots
7.5 Windows Services and Logs
7.6 Ingress / Egress Filtering and Virtual Environment Risks
Summary
Module 3: Cyber Incident Response
Module Introduction
Lesson 8: Determine Impact of an Incident
Learning objectives
8.1 Determining Impact of an Incident
8.2 Determining Threat Classification (Part 1)
8.3 Determining Threat Classification (Part 2)
8.4 Determining Incident Severity for Threats (Part 1)
8.5 Determining Incident Severity for Threats (Part 2)
8.6 Understanding the Importance of Data Classification when Determining Threats
Summary
Lesson 9: Forensics Tools and Investigation
Learning objectives
9.1 Forensics Tools and Investigation
9.2 Introduction to Forensics
9.3 Using the Chain of Custody
9.4 Using Common Forensic Tools
9.5 Overview of Forensic Procedures
9.6 Acquiring Data
Summary
Lesson 10: Incident Reporting and Communications
Learning objectives
10.1 Incident Reporting and Communications
10.2 Stakeholder and Shareholder Communications Procedures during a Breach
10.3 Establishing a Communications Chain
10.4 Information Disclosure, Legal, and Regulatory Requirements
10.5 Roles and Responsibilities for Effective Communications during a Breach
Summary
Lesson 11: Analyzing Incident Response Symptoms and Recovery Techniques
Learning objectives
11.1 Incident Response Symptoms and Recovery Techniques
11.2 Analyzing Computer- and Hardware-related Symptoms
11.3 Symptom Examples
11.4 Exfiltration
11.5 Host Remediation Options
11.6 Analyzing and Working Network- and Traffic-related Symptoms
11.7 Baselines
11.8 Irregular Communication
11.9 Rogue Devices and Reconnaissance
11.10 Port Scanning and Exploitation
11.11 Analyzing Application-related Symptoms
11.12 Analyzing Injection and XXS
11.13 Broken Authentication and Patching Challenges
11.14 Denial of Service (Part 1)
11.15 Denial of Service (Part 2)
Summary
Lesson 12: Post-Incident Response Process
Learning objectives
12.1 Post-Incident Response Process
12.2 Containing an Incident
12.3 Access Control Demonstration with Cisco Identity Services Engine
12.4 Access Control Technology Details
12.5 Reading Authentication Log
12.6 Corrective Actions (Part 1)
12.7 Attack Lifecycle Example
12.8 Corrective Actions (Part 2)
12.9 Writing an Incident Report
Summary
Module 4: Security Architecture and Tool Sets
Module Introduction
Lesson 13: Frameworks, Common Policies, Controls, and Procedures
Learning objectives
13.1 Introduction to Frameworks, Common Policies, Controls, and Procedures
13.2 Frameworks, Common Policies, Controls, and Procedures
13.3 Understanding Regulatory Compliance and Common Frameworks (Part 1)
13.4 Understanding Regulatory Compliance and Common Frameworks (Part 2)
13.5 Policies (Part 1)
13.6 Policies (Part 2)
13.7 Implementing Security Controls and Procedures
13.8 Security Controls
13.9 Procedures and Monitoring
13.10 Testing and Remediation
13.11 Testing Policies (Part 1)
13.12 Testing Policies (Part 2)
Summary
Lesson 14: Access Control and Access Management Remediation
Learning objectives
14.1 Introduction to Access Control and Access Management Remediation
14.2 Access Control and Access Management Remediation
14.3 Understanding Risks with Context-based Authentication Methods
14.4 Security Solutions Based on Identities and Identity Repositories
14.5 Risks and Rewards with Single Sign-on
14.6 Understanding and Reviewing Identification Exploits and Hacks
Summary
Lesson 15: Reviewing Security Architectures
Learning objectives
15.1 Introduction to Reviewing Security Architectures
15.2 Reviewing Security Architectures
15.3 Understanding Security Data Analytics
15.4 Reviewing Log Files (Part 1)
15.5 Reviewing Log Files (Part 2)
15.6 Defense in Depth (Part 1): Personal
15.7 Defense in Depth (Part 2): Processes
Summary
Lesson 16: Software Development Life Cycle (SDLC) Best Practices
Learning objectives
16.1 Introduction to Software Development Life Cycle (SDLC) Best Practices
16.2 Software Development Life Cycle (SDLC) Best Practices
16.3 Best Practices during Software Development Phase
16.4 Testing Applications for Vulnerabilities
16.5 Implementing a Peer Review and Stress Testing Process
16.6 Best Practices for Secure Coding, OWASP, and SANS
Summary
Lesson 17: Cybersecurity Tools and Technologies
Learning objectives
17.1 Cybersecurity Tools and Technologies
17.2 Preventive Technologies: Firewalls
17.3 Preventive Technologies: Proxy and Application Layer Firewall
17.4 Comparing Proxies and Application Firewalls
17.5 Selecting a Firewall
17.6 Prevention Technologies: IPS (Part 1)
17.7 Detecting Bruteforce with Wireshark and IPS
17.8 Detecting Files with Wireshark and IPS
17.9 Prevention Technologies: IPS (Part 2)
17.10 Cisco Breach Detection Demo
17.11 SIEM Core Concepts
17.12 Understanding and Selecting a SIEM
17.13 Vulnerability Scanners Overview
17.14 Vulnerability Scanner Concepts
17.15 NetFlow and Packet Capture Concepts
17.16 Cisco StealthWatch NetFlow Example
17.17 Command Line and OpenSSL
17.18 Exploitation Technologies
Test Taking Strategies
Summary
Summary
CompTIA Cybersecurity Analyst CySA+ (CS0-001): Summary