Companies Home Search Profile

Become a SOC Analyst - Level 3

Focused View

33:28:19

39 View
    Module 1 - About the Exam and Certification
  • 1.1 Course Welcome and Introduction.mp4
    03:36
  • 1.2 CASP+ Overview.mp4
    04:48
  • 1.3 CASP+ Course Overview.mp4
    02:25
    Module 2 - Security Architecture
  • 2.1 Network Security Architecture Part 1.mp4
    15:50
  • 2.2 Network Security Architecture Part 2.mp4
    11:36
  • 2.3 Secure Infrastructure Design.mp4
    10:26
  • 2.4 Integrating Software Applications Part 1.mp4
    05:24
  • 2.5 Integrating Software Applications Part 2.mp4
    08:39
  • 2.6 Software Development Activities.mp4
    08:46
  • 2.7 Data Security and the Data Life Cycle.mp4
    08:16
  • 2.8 Authentication.mp4
    07:22
  • 2.9 Authorization Controls.mp4
    11:22
  • 2.10 Virtualization and Cloud Technology.mp4
    11:48
  • 2.11 Emerging Technologies.mp4
    09:59
    Module 3 - Security Operations
  • 3.1 Threat Management.mp4
    14:10
  • 3.2 Threat Management Frameworks.mp4
    06:48
  • 3.3 Indicators of Compromise.mp4
    08:00
  • 3.4 Vulnerability Management.mp4
    11:31
  • 3.5 Vulnerability Assessments.mp4
    14:23
  • 3.6 Vulnerability Risk Mitigation Part 1.mp4
    08:43
  • 3.7 Vulnerability Risk Mitigation Part 2.mp4
    09:20
  • 3.8 Techniques for Risk Reduction.mp4
    07:57
  • 3.9 Incident Response.mp4
    06:01
  • 3.10 Forensics Concepts.mp4
    07:09
  • 3.11 Forensics Tools.mp4
    08:55
    Module 4 - Security Engineering and Cryptography
  • 4.1 Enterprise Mobility Security Part 1.mp4
    10:17
  • 4.2 Enterprise Mobility Security Part 2.mp4
    12:09
  • 4.3 Endpoint Security - Hardening Part 1.mp4
    11:36
  • 4.4 Endpoint Security - Hardening Part 2.mp4
    11:20
  • 4.5 Sector-Specific Technology Security Concerns.mp4
    08:05
  • 4.6 ICS Protocols.mp4
    08:42
  • 4.7 Security Implications of Cloud Technology Adoption.mp4
    13:30
  • 4.8 Cryptography.mp4
    13:53
  • 4.9 Implementing Public Key Infrastructure.mp4
    10:39
  • 4.10 Implementing PKI Solutions.mp4
    15:27
  • 4.11 Common Certificate Implementation Issues.mp4
    06:30
    Module 5 - Governance, Risk, and Compliance
  • 5.1 Understanding Risk.mp4
    15:26
  • 5.2 The Risk Life Cycle.mp4
    14:34
  • 5.3 Vendor Risk.mp4
    12:41
  • 5.4 Governance and Compliance Part 1.mp4
    15:23
  • 5.5 Governance and Compliance Part 2.mp4
    11:31
  • 5.6 Business Impact Analysis.mp4
    12:43
  • 5.7 Disaster Recovery Plans.mp4
    07:23
    Module 6 - Preparing for Your Exam
  • 6.1 Course Recap.mp4
    13:58
  • 6.2 Study Strategies.mp4
    04:36
  • 6.3 Exam Time - Strategies for Success.mp4
    06:48
    Resources
  • CASP Glossary.pdf
  • CASP Resources.pdf
  • CASP Syllabus.pdf
    Module 1 - Introduction
  • 1.1 Introduction.mp4
    07:33
  • 1.2 An Introduction to OWASP.mp4
    07:10
  • 1.3 The OWASP Top 10.mp4
    11:17
  • 1.4 OWASP Web Security Testing Guide (WSTG).mp4
    07:09
  • 1.5 Using Intercepting Proxies in Web Application Security Testing.mp4
    11:19
  • 1.6 Video Demonstration of Using Intercepting Proxies.mp4
    11:54
  • 1.7 Video Demonstration of Using OWASP Mutillidae.mp4
    02:40
    Resources
  • OWASP Top 10 2021 Complete Syllabus.pdf
    Module 1 - Introduction
  • 1.1 Intro Part 1.mp4
    23:32
  • 1.2 Intro Part 2.mp4
    09:41
  • 1.3 Intro Part 3.mp4
    08:05
    Module 2 - Lab Setup
  • 2.1 Lab Setup Part 1.mp4
    01:45
  • 2.2 Lab Setup Part 2.mp4
    21:22
  • 2.3 Lab Setup Part 3.mp4
    18:40
    Module 3 - Dynamic Analysis Part 1
  • 3.1 Dynamic Analysis Part 1.1.mp4
    04:55
  • 3.2 Dynamic Analysis Part 1.2.mp4
    25:42
  • 3.3 Dynamic Analysis Part 1.3.mp4
    14:09
    Module 4 - Dynamic Analysis Part 2
  • 4.1 Dynamic Analysis Part 2.1.mp4
    10:55
  • 4.2 Dynamic Analysis Part 2.2.mp4
    30:05
    Module 5 - Basic Static Analysis
  • 5.1 Basic Static Analysis Part 1.mp4
    38:37
  • 5.2 Basic Static Analysis Part 2.mp4
    33:39
  • 5.3 Basic Static Analysis Part 3.mp4
    46:06
  • 5.4 Basic Static Analysis Part 4A.mp4
    32:20
  • 5.5 Basic Static Analysis Part 4B.mp4
    02:58
  • 5.6 Basic Static Analysis Part 5.mp4
    20:40
  • 5.7 Basic Static Analysis Part 6.mp4
    41:30
    Module 6 - Packers
  • 6.1 Packers Part 1.mp4
    19:37
  • 6.2 Packers Part 2.mp4
    05:43
  • 6.3 Packers Part 3.mp4
    23:11
  • 6.4 Packers Part 4.mp4
    24:46
  • 6.5 Packers Part 5.mp4
    08:11
    Module 7 - Malware Defenses
  • 7.1 Malware Defenses Part 1.mp4
    10:22
  • 7.2 Malware Defenses Part 2.mp4
    47:56
  • 7.3 Malware Defenses Part 3.mp4
    24:59
    Resources
  • Intro to Malware Analysis and Reverse Engineering Glossary 1 .pdf
  • Intro to Malware Analysis and Reverse Engineering Study Guide 1 .pdf
  • Resources.zip
    • Module 1 - Basic Assembly
    • 1.1 Template and Setup.mp4
      08:07
    • 1.2 Introduction to Assembly.mp4
      07:48
    • 1.3 Architecture, Registers, and Protected Mode.mp4
      13:02
    • 1.4 Binary, 2s Complement and Hexadecimal.mp4
      07:44
    • 1.5 Assembly Template.mp4
      07:00
    • 1.6 Instructions, Directives and Generating a Listing.mp4
      14:57
    • 1.7 Logical Operators and Memory Layout.mp4
      15:15
    • 1.8 Segments and Functions.mp4
      09:58
    • 1.9 Sign Extend, Zero Extend, Multiple, Divide.mp4
      11:43
    • 1.10 Multiply and Divide Examples.mp4
      06:55
    • 1.11 Compare, Conditionals and Jumps.mp4
      11:02
    • 1.12 Skeleton and Loop Example.mp4
      11:17
    • 1.13 Shift Left and Right.mp4
      09:13
    • 1.14 Arithmetic Shift.mp4
      10:35
    • 1.15 Module 1 Review.mp4
      05:12
      Module 2 - Indirect Addressing, Stack, Arrays and Strings
    • 2.1 Indirect Addressing and Variables Part 1.mp4
      06:00
    • 2.2 Indirect Addressing and Variables Part 2.mp4
      03:11
    • 2.3 Slack Intro Part 1.mp4
      06:59
    • 2.4 Slack Intro Part 2.mp4
      01:56
    • 2.5 Stack Usage.mp4
      07:38
    • 2.6 Simple Function Example.mp4
      11:18
    • 2.7 Function Prologue.mp4
      03:21
    • 2.8 Function Epilogue.mp4
      08:16
    • 2.9 Function Arguments.mp4
      08:40
    • 2.10 Saving Registers.mp4
      09:32
    • 2.11 More Complicated Function.mp4
      14:46
    • 2.12 Calling Conventions.mp4
      08:31
    • 2.13 Local Variables.mp4
      06:21
    • 2.14 Local Variables Example.mp4
      12:19
    • 2.15 Enter and Leave.mp4
      05:02
    • 2.16 Enter and Leave Example Conversion.mp4
      04:52
    • 2.17 Floating Point.mp4
      07:08
    • 2.18 Floating Point Circle Example.mp4
      10:04
    • 2.19 Floating Point Comparison.mp4
      06:16
    • 2.20 Floating Point Comparison Example.mp4
      09:37
    • 2.21 Max of Three Numbers.mp4
      12:34
    • 2.22 Conditional Move.mp4
      08:17
    • 2.23 Conditional Move Max Example.mp4
      06:44
    • 2.24 Arrays.mp4
      11:19
    • 2.25 Arrays Examples.mp4
      06:19
    • 2.26 String Instructions.mp4
      07:10
    • 2.27 Strings Uppercase Example.mp4
      09:38
      Module 3 - ARM Architecture
    • 3.1 ARM Intro.mp4
      11:42
    • 3.2 ARM Template.mp4
      06:06
    • 3.3 ARM Math and Data Movement.mp4
      08:24
    • 3.4 Branching, If, While, Shift.mp4
      08:49
    • 3.5 Shift Example.mp4
      07:20
    • 3.6 Memory, Offsets, Debugging and Listing.mp4
      10:53
    • 3.7 Pushing and Popping.mp4
      05:34
    • 3.8 Push Example.mp4
      05:29
    • 3.9 Array Indexing.mp4
      08:30
    • 3.10 Array Indexing Example.mp4
      04:55
    • 3.11 ARM Multiple Load and Store.mp4
      05:57
    • 3.12 ARM Load and Store Multiple Examples.mp4
      06:00
    • 3.13 VFP and Neon.mp4
      15:23
    • 3.14 Neon Example.mp4
      12:43
    • 3.15 Neon Floating Point.mp4
      06:29
    • 3.16 Neon Floating Point Example.mp4
      07:52
    • 3.17 SIMD Load and Store Data.mp4
      08:32
    • 3.18 SIMD Process Data.mp4
      08:48
    • 3.19 SIMD Encryption Example.mp4
      11:28
    • 3.20 Thumb Mode.mp4
      04:54
    • 3.21 Thumb Mode Example.mp4
      14:50
    • 3.22 Conditional Execution.mp4
      07:30
    • 3.23 Conditional Execution Example.mp4
      08:52
    • 3.24 IT Block Assembly.mp4
      05:10
    • 3.25 IT Block Example.mp4
      07:32
      Module 4 - C Constructs and Interrupts
    • 4.1 Tools for Code, Reverse Engineering.mp4
      08:45
    • 4.2 Reverse Engineering Process.mp4
      07:40
    • 4.3 Setup Reverse Engineering Lab.mp4
      08:07
    • 4.4 Structures and Unions.mp4
      05:36
    • 4.5 Structure Layout.mp4
      05:10
    • 4.6 Structure Creation - Reverse Engineering.mp4
      07:01
    • 4.7 Structures, Unions and Malloc.mp4
      09:21
    • 4.8 Structures, Unions and Malloc Example.mp4
      06:40
    • 4.9 Jump Tables and Switch Statements.mp4
      05:43
    • 4.10 Jump Table Example.mp4
      08:17
    • 4.11 Function Pointers.mp4
      07:22
    • 4.12 Function Pointers Example.mp4
      07:01
    • 4.13 Inline Assembly.mp4
      09:38
    • 4.14 Inline Assembly Example.mp4
      10:12
    • 4.15 Assembly with C.mp4
      10:08
    • 4.16 SysCall and Interrupts.mp4
      08:06
    • 4.17 Interrupts Example Use Fork.mp4
      08:26
    • 4.18 Strings in C.mp4
      05:43
    • 4.19 Integers in Assembly.mp4
      07:38
    • 4.20 64-Bit Assembly.mp4
      10:09
    • 4.21 MMX, SSE, AES-NI.mp4
      09:49
    • 4.22 AES Implementations.mp4
      08:45
    • 4.23 Implement Dump Registers.mp4
      18:12
    • 4.24 Static and Dynamic Linking Assembly.mp4
      06:56
    • 4.25 Shared Library.mp4
      07:48
    • 4.26 Shared Library Example.mp4
      12:52
      Module 1 - BSWJ - binwalk
    • 1.1 BSWJ - binwalk.mp4
      04:05
  • Resources.zip
    • Module 1 - Mapping to ATT&CK
    • 1.1 Introduction - Challenges, .mp4
      13:47
    • 1.2 Finding and Researching the Behavior.mp4
      07:44
    • 1.3 Translating the Behavior into a Tactic.mp4
      10:23
    • 1.4 Identifying Techniques or Sub-Techniques.mp4
      12:41
    • 1.5 Mapping to a Narrative Point.mp4
      10:02
    • 1.6 Hedging Your Biases.mp4
      10:49
      Module 2 - Mapping to ATT&CK
    • 2.1 The Process of Mapping from Raw Data.mp4
      05:41
    • 2.2 Identify and Research Behaviors.mp4
      05:18
    • 2.3 Translate Behaviors to Tactics, Techniques and Sub-Techniques.mp4
      04:45
    • 2.4 Raw Data to Narrative Reporting.mp4
      08:45
      Module 3 - Storing and Analyzing ATT&CK
    • 3.1 Storing and Displaying ATT&CK-Mapped Data.mp4
      03:17
    • 3.2 Expressing and Storing ATT&CK-Mapped Data.mp4
      03:52
    • 3.3 Analyzing ATT&CK-Mapped Data.mp4
      05:06
    • 3.4 Exercise 3 - Comparing Layers in ATT&CK Navigator.mp4
      01:58
      Module 4 - Making Defensive
    • 4.1 The Defensive Recommendations Process.mp4
      05:28
    • 4.2 How Techniques and Sub-Techniques are Being Used.mp4
      08:40
    • 4.3 Researching Organizational.mp4
      09:46
    • 4.4 Make Defensive Recommendations.mp4
      12:56

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Cybrary, Inc., is a crowdsourced free online IT and Cyber Security training and career development platform for people around the world. Founded in January 2015, the company has a myriad of courses spanning from beginner to expert level in areas such as IT Fundamentals, Malware Analysis, Python Scripting, Incident Response, and much more. For a full list of courses and other resources, visit the Cybrary Catalog.
    • language english
    • Training sessions 191
    • duration 33:28:19
    • English subtitles has
    • Release Date 2024/01/27