Companies Home Search Profile

CompTIA Cybersecurity Analyst+ (CySA+) (CS0-003): 1 Security Operations

Focused View

Mike Chapple

4:24:01

151 View
  • 01 - Security operations.mp4
    01:03
  • 02 - What you should know.mp4
    00:42
  • 03 - Study resources.mp4
    01:34
  • 04 - The goals of information security.mp4
    02:08
  • 05 - Role of the cybersecurity analyst.mp4
    01:33
  • 01 - Operating system security.mp4
    08:44
  • 02 - Windows Registry.mp4
    03:13
  • 03 - Configuration files.mp4
    01:23
  • 04 - System processes.mp4
    01:45
  • 05 - Hardware architecture.mp4
    01:11
  • 01 - Logging security information.mp4
    05:30
  • 02 - Security information and event management.mp4
    04:08
  • 03 - Tuning and configuring SIEMs.mp4
    03:26
  • 04 - Continuous security monitoring.mp4
    04:11
  • 01 - Virtualization.mp4
    04:48
  • 02 - Cloud infrastructure components.mp4
    02:57
  • 03 - Containers.mp4
    01:54
  • 01 - Network architecture.mp4
    02:57
  • 02 - Security zones.mp4
    03:52
  • 03 - VLANs and network segmentation.mp4
    01:36
  • 04 - Zero trust networking.mp4
    04:09
  • 05 - Secure access service edge (SASE).mp4
    03:50
  • 06 - Software-defined networking (SDN).mp4
    03:26
  • 01 - Identification, authentication, authorization, and accounting.mp4
    03:34
  • 02 - Usernames and access cards.mp4
    03:23
  • 03 - Biometrics.mp4
    02:42
  • 04 - Authentication factors.mp4
    04:25
  • 05 - Multifactor authentication.mp4
    02:35
  • 06 - Something you have.mp4
    04:24
  • 07 - Password authentication protocols.mp4
    03:10
  • 08 - Single sign-on and federation.mp4
    03:09
  • 09 - Passwordless authentication.mp4
    01:48
  • 10 - Privileged access management.mp4
    02:31
  • 11 - Cloud access security brokers.mp4
    05:15
  • 01 - Understanding encryption.mp4
    02:49
  • 02 - Symmetric and asymmetric cryptography.mp4
    04:18
  • 03 - Goals of cryptography.mp4
    03:47
  • 04 - Trust models.mp4
    02:52
  • 05 - PKI and digital certificates.mp4
    04:05
  • 06 - TLS and SSL.mp4
    03:38
  • 01 - Data classification.mp4
    02:42
  • 02 - Data loss prevention.mp4
    05:17
  • 01 - Network symptoms.mp4
    04:30
  • 02 - Rogue access points and evil twins.mp4
    02:50
  • 03 - Endpoint symptoms.mp4
    03:03
  • 04 - Application symptoms.mp4
    02:17
  • 05 - Obfuscated links.mp4
    01:41
  • 06 - Social engineering.mp4
    05:29
  • 01 - Protocol analyzers.mp4
    08:57
  • 02 - DNS and IP reputation.mp4
    05:25
  • 03 - Endpoint monitoring.mp4
    03:23
  • 04 - Malware prevention.mp4
    06:12
  • 05 - Executable analysis.mp4
    04:15
  • 06 - Cuckoo and Joe Sandbox.mp4
    01:15
  • 07 - User account monitoring.mp4
    03:17
  • 01 - Malicious email content.mp4
    02:36
  • 02 - Digital signatures.mp4
    03:51
  • 03 - DKIM, DMARC, and SPF.mp4
    05:44
  • 04 - Analyzing email headers.mp4
    02:27
  • 01 - Shell and script environments.mp4
    02:05
  • 02 - APIs.mp4
    04:20
  • 03 - Querying logs.mp4
    08:54
  • 01 - Threat actors.mp4
    02:39
  • 02 - Zero-days and the APT.mp4
    03:25
  • 03 - Supply chain vulnerabilities.mp4
    04:18
  • 04 - Threat classification.mp4
    04:05
  • 01 - Threat intelligence.mp4
    03:09
  • 02 - Managing threat indicators.mp4
    03:40
  • 03 - Intelligence sharing.mp4
    02:29
  • 04 - Threat research.mp4
    02:18
  • 05 - Identifying threats.mp4
    02:24
  • 06 - Automating threat intelligence.mp4
    03:48
  • 07 - Threat hunting.mp4
    04:04
  • 08 - Deception technologies.mp4
    02:51
  • 01 - Standardizing processes and streamlining operations.mp4
    02:32
  • 02 - Technology and tool integration.mp4
    02:50
  • 01 - Continuing your studies.mp4
    00:34
  • Description


    As cybersecurity threats become more sophisticated and pervasive, the need for IT professionals with security analytics expertise has grown exponentially. Earning the CompTIA Cybersecurity Analyst (CySA+) certification shows potential employers that you understand how to tackle cybersecurity threats using a behavioral analytics-based approach. In this course—the first installment in the CompTIA Cybersecurity Analyst+ CySA+ (CS0-003) certification prep series, instructor Mike Chapple covers the topics covered in the Security Operations domain of the exam. Mike details topics concerning operating system security, logging, key infrastructure concepts, network security, identity and access management, and encryption.

    LinkedIn Learning is a CompTIA Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Mike Chapple
    Mike Chapple
    Instructor's Courses
    Cybersecurity and analytics educator and leader with over 20 years of experience in government, the private sector and higher education. Author of over 30 books, including best-selling study guides from Wiley covering the CISSP, Security+, CISM, CySA+, CIPP/US, and PenTest+ exams. Creator of over 100 cybersecurity and business analytics video courses on LinkedIn Learning.
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 77
    • duration 4:24:01
    • English subtitles has
    • Release Date 2023/07/12