Section 01: Introduction |
|
Introduction |
|
00:02:00 |
|
All about the Exam |
|
00:08:00 |
|
What’s New on the CompTIA CySA+ Exam? |
|
00:05:00 |
|
Meet the Instructors |
|
00:02:00 |
|
Thinking like the Enemy |
|
00:09:00 |
|
Tools of the Trade |
|
00:08:00 |
|
Resource – CompTIA CySA+ (CS0-002) Exam Objectives |
|
00:00:00 |
Section 02: The Importance of Threat Data and Intelligence |
|
Intelligence Sources and Confidence Levels |
|
00:08:00 |
|
Threat Indicators and Actors |
|
00:08:00 |
|
Threat Trends |
|
00:07:00 |
|
Intelligence Cycle and ISACs |
|
00:06:00 |
|
Resource: Slides Handouts |
|
00:00:00 |
Section 03: Threat Intelligence in Support of Organisational Security |
|
Attack Frameworks |
|
00:06:00 |
|
Threat Research |
|
00:11:00 |
|
Threat Modeling and Intelligence Sharing |
|
00:06:00 |
|
Resource: Slides Handouts |
|
00:00:00 |
Section 04: Vulnerability Management Activities |
|
Vulnerability Identification |
|
00:07:00 |
|
Scanning Parameters and Criteria |
|
00:09:00 |
|
Scanning Special Considerations |
|
00:06:00 |
|
Validation |
|
00:03:00 |
|
Remediation and Mitigation |
|
00:08:00 |
|
Inhibitors to Remediation |
|
00:07:00 |
|
Resource: Slides Handouts |
|
00:00:00 |
Section 05: Vulnerability Assessment Tools |
|
Web Applications Scanners, Part 1 |
|
00:10:00 |
|
Web Applications Scanners, Part 2 |
|
00:05:00 |
|
Scanning |
|
00:06:00 |
|
Configuring and Executing Scans |
|
00:08:00 |
|
Vulnerability Scanning |
|
00:10:00 |
|
Reverse Engineering |
|
00:08:00 |
|
Enumeration |
|
00:06:00 |
|
Wireless Assessment Tools |
|
00:08:00 |
|
Cloud Assessment Tools |
|
00:04:00 |
|
Resource: Slides Handouts |
|
00:00:00 |
Section 06: Threats and Vulnerabilities Associated with Specialised Technology |
|
Mobile and IoT |
|
00:10:00 |
|
Embedded and Firmware Systems (RTOS, SoC, and FPGA) |
|
00:09:00 |
|
Access and Vehicles Risk |
|
00:08:00 |
|
Automation and Control Risk |
|
00:10:00 |
|
Resource: Slides Handouts |
|
00:00:00 |
Section 07: Threats and Vulnerabilities Associated with Operating in the Cloud |
|
Cloud Models |
|
00:07:00 |
|
Remote Service Invocation (FaaS, IaC, API) |
|
00:10:00 |
|
Cloud Vulnerabilities |
|
00:06:00 |
|
Resource Handouts |
|
00:00:00 |
Section 08: Mitigating Controls for Attacks and Software Vulnerabilities |
|
Injection and Overflow Attacks |
|
00:09:00 |
|
Authentication Attacks |
|
00:07:00 |
|
Exploits |
|
00:08:00 |
|
Application Vulnerabilities, Part 1 |
|
00:08:00 |
|
Application Vulnerabilities, Part 2 |
|
00:07:00 |
|
Resource Handouts |
|
00:00:00 |
Section 09: Security Solutions for Infrastructure Management |
|
Network Architecture and Asset Management |
|
00:09:00 |
|
Protecting Your Territory |
|
00:05:00 |
|
Identity and Access Management |
|
00:11:00 |
|
Encryption and Active Defense |
|
00:08:00 |
|
Resource Handouts |
|
00:00:00 |
Section 10: Software Assurance Best Practices |
|
Platforms |
|
00:07:00 |
|
SOA and DevSecOps |
|
00:09:00 |
|
Secure Software Development |
|
00:08:00 |
|
Best Coding Practices |
|
00:04:00 |
|
Resource Handouts |
|
00:00:00 |
Section 11: Hardware Assurance Best Practices |
|
Trusted Hardware |
|
00:10:00 |
|
Hardware Encryption |
|
00:04:00 |
|
Hardware Security |
|
00:08:00 |
|
Resource Handouts |
|
00:00:00 |
Section 12: Data Analysis in Security Monitoring Activities |
|
Data Analytics |
|
00:10:00 |
|
Endpoint Security |
|
00:08:00 |
|
Recon Results, Part 1 |
|
00:13:00 |
|
Recon Results, Part 2 |
|
00:05:00 |
|
Impact Analysis |
|
00:05:00 |
|
Collective Tools |
|
00:09:00 |
|
Query Writing |
|
00:07:00 |
|
E-mail Analysis, Part 1 |
|
00:10:00 |
|
E-mail Analysis, Part 2 |
|
00:08:00 |
|
Resource Handouts |
|
00:00:00 |
Section 13: Implement Configuration Changes to Existing Controls to Improve Security |
|
Permissions |
|
00:09:00 |
|
Firewalls |
|
00:08:00 |
|
Intrusion Prevention Rules |
|
00:05:00 |
|
DLP and Endpoint Detection |
|
00:05:00 |
|
Frustration and attrition |
|
00:13:00 |
|
Resource Handouts |
|
00:00:00 |
Section 14: The Importance of Proactive Threat Hunting |
|
Threat Hunting and the Hypothesis |
|
00:06:00 |
|
Threat Hunting Process |
|
00:07:00 |
|
Results and Benefits |
|
00:05:00 |
|
Resource Handouts |
|
00:00:00 |
Section 15: Automation Concepts and Technologies |
|
Workflow and Scripting |
|
00:07:00 |
|
API and Malware Signature Creation |
|
00:08:00 |
|
Threat Feeds and Machine Learning |
|
00:06:00 |
|
Protocols, Standards, and Software Engineering |
|
00:05:00 |
|
Resource Handouts |
|
00:00:00 |
Section 16: The Importance of the Incident Response Process |
|
IR Roles and Responsibilities |
|
00:08:00 |
|
IR Active Preparation |
|
00:10:00 |
|
Resource Handouts |
|
00:00:00 |
Section 17: Appropriate Incident Response Procedures |
|
Incident Response Process |
|
00:07:00 |
|
Resource Handouts |
|
00:00:00 |
Section 18: Analyse Potential Indicators of Compromise |
|
Network Symptoms |
|
00:04:00 |
|
Host Symptoms |
|
00:08:00 |
|
Application Symptoms |
|
00:04:00 |
|
Resource Handouts |
|
00:00:00 |
Section 19: Utilise Basic Digital Forensics Techniques |
|
Digital Forensics |
|
00:10:00 |
|
Seizure and Acquisitions |
|
00:05:00 |
|
Forensics Acquisition Tools |
|
00:09:00 |
|
Mobile, Virtualization, and Cloud |
|
00:06:00 |
|
Forensics Analysis, Part 1 |
|
00:04:00 |
|
Forensics Analysis, Part 2 |
|
00:08:00 |
|
Packet Capture |
|
00:12:00 |
|
Resource Handouts |
|
00:00:00 |
Section 20: The Importance of Data Privacy and Protection |
|
Data Privacy and Security |
|
00:06:00 |
|
Nontechnical Controls |
|
00:09:00 |
|
Technical Controls |
|
00:08:00 |
|
Resource Handouts |
|
00:00:00 |
Section 21: Security Concepts in Support of Organisational Risk Mitigation |
|
Business Impact Analysis |
|
00:05:00 |
|
Risk Identification |
|
00:05:00 |
|
Risk Calculation and Communication |
|
00:06:00 |
|
Training |
|
00:04:00 |
|
Supply Chain Assessment |
|
00:04:00 |
|
Resource Handouts |
|
00:00:00 |
Section 22: The Importance of Frameworks, Policies, Procedures, and Controls |
|
Frameworks |
|
00:13:00 |
|
Policies and Procedures |
|
00:05:00 |
|
Controls and Procedures |
|
00:08:00 |
|
Verification |
|
00:06:00 |
|
Resource Handouts |
|
00:00:00 |