Companies Home Search Profile

CompTIA CySA+ (CS0-003)

Focused View

14:51:50

11 View
  • 001. Course Overview.mp4
    03:15
  • 002. Common Log Ingestion Concepts.mp4
    17:05
  • 003. Common Operating System Concepts.mp4
    26:02
  • 004. Common Infrastructure Concepts.mp4
    19:24
  • 005. Common IAM Concepts.mp4
    24:00
  • 006. Common Encryption Concepts.mp4
    18:02
  • 007. Protecting Sensitive Data.mp4
    11:29
  • 008. Common Network Architecture.mp4
    16:34
  • 009. Malicious Network Activity.mp4
    18:01
  • 010. Malicious Host Activity.mp4
    22:13
  • 011. Malicious Application Activity.mp4
    18:16
  • 012. Other Malicious Activity.mp4
    14:00
  • 013. Packet Capture Tools.mp4
    17:50
  • 014. Log Analysis Tools.mp4
    15:21
  • 015. Endpoint Detection and Response.mp4
    15:46
  • 016. DNS and IP Reputation Tools.mp4
    14:43
  • 017. File Analysis Tools.mp4
    21:25
  • 018. Sandboxing Tools.mp4
    11:16
  • 019. Email Analysis Tools.mp4
    15:50
  • 020. User and Entity Behavior Analytics.mp4
    08:52
  • 021. Scripting and Programming.mp4
    17:29
  • 022. Threat Actor Types.mp4
    24:41
  • 023. TTPs.mp4
    10:29
  • 024. CTI Confidence Levels.mp4
    14:58
  • 025. CTI Sources.mp4
    15:08
  • 026. CTI Sharing.mp4
    12:28
  • 027. Threat Hunting.mp4
    17:11
  • 028. Process Standardization.mp4
    09:33
  • 029. Streamlining Operations.mp4
    08:08
  • 030. Integrating Tools and Technology Into Security Operations.mp4
    14:45
  • 001. Asset Discovery and Mapping.mp4
    20:27
  • 002. Vulnerability Scanning Types and Considerations.mp4
    25:30
  • 003. Vulnerability Scanning Frameworks.mp4
    17:53
  • 004. Analyze Vulnerability Assessment Scanner Output.mp4
    29:48
  • 005. CVSS.mp4
    24:01
  • 006. Vulnerability Prioritization.mp4
    18:54
  • 007. Software Vulnerability Mitigations.mp4
    26:59
  • 008. SDLC.mp4
    12:09
  • 009. Threat Modeling.mp4
    12:48
  • 010. Compensating Controls.mp4
    17:10
  • 011. System Maintenance Procedures.mp4
    10:16
  • 012. Risk Management Principles.mp4
    08:51
  • 013. Policies, Governance, and SLOs.mp4
    07:41
  • 014. Prioritization and Escalation.mp4
    12:46
  • 015. Attack Surface Management.mp4
    11:50
  • 016. Secure Coding Best Practices.mp4
    17:32
  • 001. Attack Methodology Frameworks.mp4
    18:19
  • 002. Detection and Analysis.mp4
    20:59
  • 003. Containment, Eradication, and Recovery.mp4
    14:26
  • 004. Preparation Phase.mp4
    08:05
  • 005. Post-Incident Activity.mp4
    08:50
  • 002. Communicate Incident Response Metrics and KPIs.mp4
    11:20
  • 003. Communicate Compliance Reporting.mp4
    12:10
  • 004. Communicate Inhibitors to Remediation.mp4
    08:29
  • 005. Communicate Incident Response Reports.mp4
    17:46
  • 006. Communicate Root Cause Analysis.mp4
    13:00
  • 007. Communicate Vulnerability Metrics and KPIs.mp4
    09:37
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    We created ITProTV [ITPro] because it is the IT training we wanted to have ourselves — engaging, conversational, affordable, and convenient.
    • language english
    • Training sessions 57
    • duration 14:51:50
    • Release Date 2024/04/29

    Courses related to CompTIA Security+

    Courses related to Network Security

    Subtitle
    CheckPoint Endpoint Security
    Udemy Grezitech Company
    Grezitech Company
    CheckPoint Endpoint Security
    6:16:45
    English subtitles
    03/31/2024
    Subtitle
    eJPTv2 - Host & Networking Auditing - 1.Auditing Fundamentals
    Subtitle
    Network Analysis with pfSense
    Pluralsight Joe Abraham
    Joe Abraham
    Network Analysis with pfSense
    38:46
    English subtitles
    04/18/2023