Get 92% Discount | CPD Accredited | Affordable Pricing | No Hidden Charges | 24/7 Tutor Support | Instant Access
The CompTIA CySA+ (CS0-002) Cyber Analyst certification is the ideal next step for IT professionals who want to advance their careers in cybersecurity. This certification validates the skills and knowledge required to perform various cybersecurity analyst tasks, including threat detection, vulnerability management, and incident response. You will familiarise yourself with myriad vulnerability assessment tools, gaining insight into the threats and vulnerabilities unique to specialised technology and cloud operations.
Next, delve into the realms of infrastructure management security solutions, software, and hardware assurance best practices. You will immerse in data analysis for security monitoring activities, learn to implement configuration changes for improved security and understand the necessity of proactive threat hunting. Subsequent sections focus on automation concepts and technologies and underline the criticality of the incident response process.
Round off your learning journey by analysing potential indicators of compromise, harnessing basic digital forensics techniques, and comprehending the importance of data privacy and protection. The final sections of the CompTIA CySA+ (CS0-002) Cyber Analyst course emphasize security concepts supporting organisational risk mitigation and the significance of frameworks, policies, procedures, and controls.
Section 01: Introduction | |||
Introduction | 00:02:00 | ||
All about the Exam | 00:08:00 | ||
What’s New on the CompTIA CySA+ Exam? | 00:05:00 | ||
Meet the Instructors | 00:02:00 | ||
Thinking like the Enemy | 00:09:00 | ||
Tools of the Trade | 00:08:00 | ||
Resource – CompTIA CySA+ (CS0-002) Exam Objectives | 00:00:00 | ||
Section 02: The Importance of Threat Data and Intelligence | |||
Intelligence Sources and Confidence Levels | 00:08:00 | ||
Threat Indicators and Actors | 00:08:00 | ||
Threat Trends | 00:07:00 | ||
Intelligence Cycle and ISACs | 00:06:00 | ||
Resource: Slides Handouts | 00:00:00 | ||
Section 03: Threat Intelligence in Support of Organisational Security | |||
Attack Frameworks | 00:06:00 | ||
Threat Research | 00:11:00 | ||
Threat Modeling and Intelligence Sharing | 00:06:00 | ||
Resource: Slides Handouts | 00:00:00 | ||
Section 04: Vulnerability Management Activities | |||
Vulnerability Identification | 00:07:00 | ||
Scanning Parameters and Criteria | 00:09:00 | ||
Scanning Special Considerations | 00:06:00 | ||
Validation | 00:03:00 | ||
Remediation and Mitigation | 00:08:00 | ||
Inhibitors to Remediation | 00:07:00 | ||
Resource: Slides Handouts | 00:00:00 | ||
Section 05: Vulnerability Assessment Tools | |||
Web Applications Scanners, Part 1 | 00:10:00 | ||
Web Applications Scanners, Part 2 | 00:05:00 | ||
Scanning | 00:06:00 | ||
Configuring and Executing Scans | 00:08:00 | ||
Vulnerability Scanning | 00:10:00 | ||
Reverse Engineering | 00:08:00 | ||
Enumeration | 00:06:00 | ||
Wireless Assessment Tools | 00:08:00 | ||
Cloud Assessment Tools | 00:04:00 | ||
Resource: Slides Handouts | 00:00:00 | ||
Section 06: Threats and Vulnerabilities Associated with Specialised Technology | |||
Mobile and IoT | 00:10:00 | ||
Embedded and Firmware Systems (RTOS, SoC, and FPGA) | 00:09:00 | ||
Access and Vehicles Risk | 00:08:00 | ||
Automation and Control Risk | 00:10:00 | ||
Resource: Slides Handouts | 00:00:00 | ||
Section 07: Threats and Vulnerabilities Associated with Operating in the Cloud | |||
Cloud Models | 00:07:00 | ||
Remote Service Invocation (FaaS, IaC, API) | 00:10:00 | ||
Cloud Vulnerabilities | 00:06:00 | ||
Resource Handouts | 00:00:00 | ||
Section 08: Mitigating Controls for Attacks and Software Vulnerabilities | |||
Injection and Overflow Attacks | 00:09:00 | ||
Authentication Attacks | 00:07:00 | ||
Exploits | 00:08:00 | ||
Application Vulnerabilities, Part 1 | 00:08:00 | ||
Application Vulnerabilities, Part 2 | 00:07:00 | ||
Resource Handouts | 00:00:00 | ||
Section 09: Security Solutions for Infrastructure Management | |||
Network Architecture and Asset Management | 00:09:00 | ||
Protecting Your Territory | 00:05:00 | ||
Identity and Access Management | 00:11:00 | ||
Encryption and Active Defense | 00:08:00 | ||
Resource Handouts | 00:00:00 | ||
Section 10: Software Assurance Best Practices | |||
Platforms | 00:07:00 | ||
SOA and DevSecOps | 00:09:00 | ||
Secure Software Development | 00:08:00 | ||
Best Coding Practices | 00:04:00 | ||
Resource Handouts | 00:00:00 | ||
Section 11: Hardware Assurance Best Practices | |||
Trusted Hardware | 00:10:00 | ||
Hardware Encryption | 00:04:00 | ||
Hardware Security | 00:08:00 | ||
Resource Handouts | 00:00:00 | ||
Section 12: Data Analysis in Security Monitoring Activities | |||
Data Analytics | 00:10:00 | ||
Endpoint Security | 00:08:00 | ||
Recon Results, Part 1 | 00:13:00 | ||
Recon Results, Part 2 | 00:05:00 | ||
Impact Analysis | 00:05:00 | ||
Collective Tools | 00:09:00 | ||
Query Writing | 00:07:00 | ||
E-mail Analysis, Part 1 | 00:10:00 | ||
E-mail Analysis, Part 2 | 00:08:00 | ||
Resource Handouts | 00:00:00 | ||
Section 13: Implement Configuration Changes to Existing Controls to Improve Security | |||
Permissions | 00:09:00 | ||
Firewalls | 00:08:00 | ||
Intrusion Prevention Rules | 00:05:00 | ||
DLP and Endpoint Detection | 00:05:00 | ||
Frustration and attrition | 00:13:00 | ||
Resource Handouts | 00:00:00 | ||
Section 14: The Importance of Proactive Threat Hunting | |||
Threat Hunting and the Hypothesis | 00:06:00 | ||
Threat Hunting Process | 00:07:00 | ||
Results and Benefits | 00:05:00 | ||
Resource Handouts | 00:00:00 | ||
Section 15: Automation Concepts and Technologies | |||
Workflow and Scripting | 00:07:00 | ||
API and Malware Signature Creation | 00:08:00 | ||
Threat Feeds and Machine Learning | 00:06:00 | ||
Protocols, Standards, and Software Engineering | 00:05:00 | ||
Resource Handouts | 00:00:00 | ||
Section 16: The Importance of the Incident Response Process | |||
IR Roles and Responsibilities | 00:08:00 | ||
IR Active Preparation | 00:10:00 | ||
Resource Handouts | 00:00:00 | ||
Section 17: Appropriate Incident Response Procedures | |||
Incident Response Process | 00:07:00 | ||
Resource Handouts | 00:00:00 | ||
Section 18: Analyse Potential Indicators of Compromise | |||
Network Symptoms | 00:04:00 | ||
Host Symptoms | 00:08:00 | ||
Application Symptoms | 00:04:00 | ||
Resource Handouts | 00:00:00 | ||
Section 19: Utilise Basic Digital Forensics Techniques | |||
Digital Forensics | 00:10:00 | ||
Seizure and Acquisitions | 00:05:00 | ||
Forensics Acquisition Tools | 00:09:00 | ||
Mobile, Virtualization, and Cloud | 00:06:00 | ||
Forensics Analysis, Part 1 | 00:04:00 | ||
Forensics Analysis, Part 2 | 00:08:00 | ||
Packet Capture | 00:12:00 | ||
Resource Handouts | 00:00:00 | ||
Section 20: The Importance of Data Privacy and Protection | |||
Data Privacy and Security | 00:06:00 | ||
Nontechnical Controls | 00:09:00 | ||
Technical Controls | 00:08:00 | ||
Resource Handouts | 00:00:00 | ||
Section 21: Security Concepts in Support of Organisational Risk Mitigation | |||
Business Impact Analysis | 00:05:00 | ||
Risk Identification | 00:05:00 | ||
Risk Calculation and Communication | 00:06:00 | ||
Training | 00:04:00 | ||
Supply Chain Assessment | 00:04:00 | ||
Resource Handouts | 00:00:00 | ||
Section 22: The Importance of Frameworks, Policies, Procedures, and Controls | |||
Frameworks | 00:13:00 | ||
Policies and Procedures | 00:05:00 | ||
Controls and Procedures | 00:08:00 | ||
Verification | 00:06:00 | ||
Resource Handouts | 00:00:00 |