Companies Home Search Profile

CompTIA Cybersecurity Analyst+ (CySA+) (CS0-003): 2 Vulnerability Management

Focused View

Mike Chapple

4:48:57

114 View
  • 01 - Vulnerability management.mp4
    00:50
  • 02 - What you need to know.mp4
    00:42
  • 03 - Study resources.mp4
    01:34
  • 01 - What is vulnerability management.mp4
    04:47
  • 02 - Identify scan targets.mp4
    05:50
  • 03 - Scan frequency.mp4
    04:16
  • 01 - Network scanning.mp4
    01:32
  • 02 - Install Nmap on Windows.mp4
    05:24
  • 03 - Install Nmap on macOS.mp4
    02:13
  • 04 - Run and interpret a simple Nmap scan.mp4
    03:37
  • 05 - Host discovery with Nmap.mp4
    04:20
  • 06 - Operate system fingerprinting.mp4
    03:45
  • 07 - Service version detection.mp4
    01:39
  • 01 - Security baseline scanning.mp4
    00:49
  • 02 - Scan configuration.mp4
    06:16
  • 03 - Scan perspective.mp4
    05:03
  • 04 - Scanner maintenance.mp4
    03:19
  • 05 - Vulnerability scanning tools.mp4
    01:08
  • 06 - Passive vulnerability scanning.mp4
    01:53
  • 01 - SCAP.mp4
    02:34
  • 02 - CVSS.mp4
    03:31
  • 03 - Interpret CVSS scores.mp4
    03:18
  • 04 - Analyze scan reports.mp4
    03:59
  • 05 - Correlate scan results.mp4
    02:33
  • 01 - Server vulnerabilities.mp4
    05:31
  • 02 - Endpoint vulnerabilities.mp4
    01:44
  • 03 - Network vulnerabilities.mp4
    04:29
  • 01 - OWASP Top 10.mp4
    05:36
  • 02 - Prevent SQL injection.mp4
    04:25
  • 03 - Understand cross-site scripting.mp4
    04:46
  • 04 - Request forgery.mp4
    04:08
  • 05 - Privilege escalation.mp4
    01:56
  • 06 - Directory traversal.mp4
    03:06
  • 07 - File inclusion.mp4
    01:46
  • 08 - Overflow attacks.mp4
    03:21
  • 09 - Cookies and attachments.mp4
    04:06
  • 10 - Session hijacking.mp4
    04:08
  • 11 - Race conditions.mp4
    02:13
  • 12 - Memory vulnerabilities.mp4
    03:34
  • 13 - Code execution attacks.mp4
    02:43
  • 14 - Data poisoning.mp4
    00:55
  • 15 - Third-party code.mp4
    03:38
  • 16 - Interception proxies.mp4
    05:22
  • 01 - Industrial control systems.mp4
    05:23
  • 02 - Internet of Things.mp4
    03:06
  • 03 - Embedded systems.mp4
    04:29
  • 01 - Exploitation frameworks.mp4
    06:04
  • 02 - Cloud auditing tools.mp4
    04:30
  • 03 - Debuggers.mp4
    00:48
  • 04 - Open-source reconnaissance.mp4
    00:57
  • 05 - Control frameworks.mp4
    07:25
  • 01 - Software platforms.mp4
    02:07
  • 02 - Development methodologies.mp4
    06:32
  • 03 - Maturity models.mp4
    03:36
  • 04 - Change management.mp4
    03:59
  • 01 - Input validation.mp4
    02:41
  • 02 - Parameterized queries.mp4
    03:00
  • 03 - Authentication and session management issues.mp4
    01:49
  • 04 - Output encoding.mp4
    03:13
  • 05 - Error and exception handling.mp4
    03:00
  • 06 - Code signing.mp4
    02:08
  • 07 - Database security.mp4
    03:53
  • 08 - Data de-identification.mp4
    02:44
  • 09 - Data obfuscation.mp4
    02:12
  • 01 - Software testing.mp4
    02:44
  • 02 - Code security tests.mp4
    02:15
  • 03 - Fuzzing.mp4
    06:48
  • 04 - Reverse engineering software.mp4
    04:05
  • 05 - Reverse engineering hardware.mp4
    02:48
  • 01 - Threat research.mp4
    01:40
  • 02 - Identify threats.mp4
    02:27
  • 03 - Understand attacks.mp4
    05:18
  • 04 - Threat modeling.mp4
    03:21
  • 05 - Attack surface management.mp4
    01:16
  • 06 - Bug bounty.mp4
    03:48
  • 01 - Align security with the business.mp4
    03:24
  • 02 - Organizational processes.mp4
    03:13
  • 03 - Security roles and responsibilities.mp4
    02:30
  • 04 - Security control selection.mp4
    04:37
  • 01 - Risk assessment.mp4
    04:32
  • 02 - Quantitative risk assessment.mp4
    06:10
  • 03 - Risk treatment options.mp4
    04:05
  • 04 - Risk management frameworks.mp4
    03:04
  • 05 - Risk visibility and reporting.mp4
    04:23
  • 01 - Continue your studies.mp4
    00:34
  • Description


    As cybersecurity threats become more sophisticated and pervasive, the need for IT professionals with security analytics expertise has grown exponentially. Earning the CompTIA Cybersecurity Analyst (CySA+) certification demonstrates a proficiency in tackling cybersecurity threats using a behavioral analytics-based approach. In this course—the second installment in the CompTIA Cybersecurity Analyst+ CySA+ (CS0-003) certification prep series, instructor Mike Chapple covers the topics covered in the Vulnerability Management domain of the exam. Mike shows how to design a vulnerability management program and configure and execute vulnerability scans. He also covers vulnerability remediation workflows, overcoming barriers to vulnerability scans, and analyzing the results of scans.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Mike Chapple
    Mike Chapple
    Instructor's Courses
    Cybersecurity and analytics educator and leader with over 20 years of experience in government, the private sector and higher education. Author of over 30 books, including best-selling study guides from Wiley covering the CISSP, Security+, CISM, CySA+, CIPP/US, and PenTest+ exams. Creator of over 100 cybersecurity and business analytics video courses on LinkedIn Learning.
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 85
    • duration 4:48:57
    • English subtitles has
    • Release Date 2023/09/06

    Courses related to CompTIA Security+

    Courses related to Ethical Hacking

    Courses related to Cyber Security

    Courses related to Penetration Testing

    Courses related to Cyber Security Awareness