CompTIA CySA+ (CS0-003)
Focused View
14:51:50
11 View
001. Course Overview.mp4
03:15
002. Common Log Ingestion Concepts.mp4
17:05
003. Common Operating System Concepts.mp4
26:02
004. Common Infrastructure Concepts.mp4
19:24
005. Common IAM Concepts.mp4
24:00
006. Common Encryption Concepts.mp4
18:02
007. Protecting Sensitive Data.mp4
11:29
008. Common Network Architecture.mp4
16:34
009. Malicious Network Activity.mp4
18:01
010. Malicious Host Activity.mp4
22:13
011. Malicious Application Activity.mp4
18:16
012. Other Malicious Activity.mp4
14:00
013. Packet Capture Tools.mp4
17:50
014. Log Analysis Tools.mp4
15:21
015. Endpoint Detection and Response.mp4
15:46
016. DNS and IP Reputation Tools.mp4
14:43
017. File Analysis Tools.mp4
21:25
018. Sandboxing Tools.mp4
11:16
019. Email Analysis Tools.mp4
15:50
020. User and Entity Behavior Analytics.mp4
08:52
021. Scripting and Programming.mp4
17:29
022. Threat Actor Types.mp4
24:41
023. TTPs.mp4
10:29
024. CTI Confidence Levels.mp4
14:58
025. CTI Sources.mp4
15:08
026. CTI Sharing.mp4
12:28
027. Threat Hunting.mp4
17:11
028. Process Standardization.mp4
09:33
029. Streamlining Operations.mp4
08:08
030. Integrating Tools and Technology Into Security Operations.mp4
14:45
001. Asset Discovery and Mapping.mp4
20:27
002. Vulnerability Scanning Types and Considerations.mp4
25:30
003. Vulnerability Scanning Frameworks.mp4
17:53
004. Analyze Vulnerability Assessment Scanner Output.mp4
29:48
005. CVSS.mp4
24:01
006. Vulnerability Prioritization.mp4
18:54
007. Software Vulnerability Mitigations.mp4
26:59
008. SDLC.mp4
12:09
009. Threat Modeling.mp4
12:48
010. Compensating Controls.mp4
17:10
011. System Maintenance Procedures.mp4
10:16
012. Risk Management Principles.mp4
08:51
013. Policies, Governance, and SLOs.mp4
07:41
014. Prioritization and Escalation.mp4
12:46
015. Attack Surface Management.mp4
11:50
016. Secure Coding Best Practices.mp4
17:32
001. Attack Methodology Frameworks.mp4
18:19
002. Detection and Analysis.mp4
20:59
003. Containment, Eradication, and Recovery.mp4
14:26
004. Preparation Phase.mp4
08:05
005. Post-Incident Activity.mp4
08:50
002. Communicate Incident Response Metrics and KPIs.mp4
11:20
003. Communicate Compliance Reporting.mp4
12:10
004. Communicate Inhibitors to Remediation.mp4
08:29
005. Communicate Incident Response Reports.mp4
17:46
006. Communicate Root Cause Analysis.mp4
13:00
007. Communicate Vulnerability Metrics and KPIs.mp4
09:37
More details
User Reviews
Rating
average 0
Focused display
Category

ITProTV
View courses ITProTVWe created ITProTV [ITPro] because it is the IT training we wanted to have ourselves — engaging, conversational, affordable, and convenient.
- language english
- Training sessions 57
- duration 14:51:50
- Release Date 2024/04/29