Companies Home Search Profile

CompTIA CySA+ (CS0-003) Complete Course & Practice Exam

Focused View

Jason Dion • 1 Million+ Enrollments Worldwide,Dion Training Solutions • ATO for ITIL & PRINCE2,Dion Training Solutions • ATO for ITIL & PRINCE2

36:08:19

105 View
  • 1. Introduction.mp4
    13:22
  • 2.1 CompTIA CySA+ (CS0-003) Study Guide.pdf
  • 2.2 CompTIA-CySA-cs0-003 objectives.pdf
  • 2. Download the Study Guide.html
  • 3. Exam Tips.mp4
    04:31
  • 4. Quiz Introduction.html
  • 1. Identify Security Control Types (OBJ. 2.5).mp4
    01:25
  • 2. Cybersecurity Roles and Responsibilities (OBJ. 2.5).mp4
    06:43
  • 3. Security Operations Center (SOC) (OBJ. 2.5).mp4
    04:59
  • 4. Security Control Categories (OBJ. 2.5).mp4
    18:20
  • 5. Selecting Security Controls (OBJ. 2.5).mp4
    04:59
  • 6. Quiz Identify Security Control Types.html
  • 1. Threat Intelligence Sharing (OBJ. 1.4).mp4
    01:14
  • 2. Security and Threat Intelligence (OBJ. 1.4).mp4
    05:13
  • 3. Intelligence Cycle (OBJ. 1.4).mp4
    09:43
  • 4. Intelligence Sources (OBJ. 1.4).mp4
    09:15
  • 5. Information Sharing and Analysis Centers (ISACS) (OBJ. 1.4).mp4
    04:25
  • 6. Threat Intelligence Sharing (OBJ. 1.4).mp4
    04:53
  • 7. Quiz Threat Intelligence.html
  • 1. Classifying Threats (OBJ. 1.3 1.4 2.3 And 3.1).mp4
    01:53
  • 2. Threat Classification (OBJ. 1.4).mp4
    09:06
  • 3. Threat Actors (OBJ. 1.4).mp4
    13:47
  • 4. Malware (OBJ. 1.4 And 2.3).mp4
    07:47
  • 5. Threat Research (OBJ. 1.4).mp4
    11:00
  • 6. Attack Frameworks (OBJ. 3.1).mp4
    11:12
  • 7. Indicator Management (OBJ. 1.4).mp4
    06:39
  • 8. Quiz Classifying Threat.html
  • 1. Threat Hunting (OBJ. 1.3 1.4 And 2.5).mp4
    02:07
  • 2. Threat Modeling (OBJ. 1.4 And 2.5).mp4
    08:19
  • 3. Threat Hunting (OBJ. 1.4 And 2.5).mp4
    06:54
  • 4. Open-source Intelligence (OBJ. 1.4).mp4
    03:38
  • 5. Google Hacking (OBJ. 1.4).mp4
    07:40
  • 6. Profiling Techniques (OBJ. 1.4).mp4
    05:27
  • 7. Harvesting Techniques (OBJ. 1.3).mp4
    03:30
  • 8. AbuseIPDB (OBJ. 1.3).mp4
    03:34
  • 9. Deep Web and Dark Web (OBJ. 1.4).mp4
    04:11
  • 10. Bug Bounty (OBJ. 1.4).mp4
    03:13
  • 11. Quiz Threat Hunting.html
  • 1. Network Forensics (OBJ. 1.3).mp4
    01:32
  • 2. Network Forensic Tools (OBJ. 1.3).mp4
    04:16
  • 3. tcpdump (OBJ. 1.3).mp4
    07:50
  • 4. Wireshark (OBJ. 1.3).mp4
    10:57
  • 5. Flow Analysis (OBJ. 1.3).mp4
    06:18
  • 6. IP and DNS Analysis (OBJ. 1.3).mp4
    06:33
  • 7. URL Analysis (OBJ. 1.3).mp4
    15:28
  • 8. Conduct Packet Analysis (OBJ. 1.3).mp4
    06:03
  • 9. Quiz Network Forensics.html
  • 1. Appliance Monitoring (OBJ. 1.1 And 1.3).mp4
    01:32
  • 2. Firewall Logs (OBJ. 1.1 And 1.3).mp4
    11:23
  • 3. Firewall Configurations (OBJ. 1.1).mp4
    18:58
  • 4. Proxy Logs (OBJ. 1.3).mp4
    06:25
  • 5. Web Application Firewall Logs (OBJ. 1.3).mp4
    02:46
  • 6. IDS and IPS Configuration (OBJ. 1.3).mp4
    06:36
  • 7. IDS and IPS Logs (OBJ. 1.3).mp4
    08:57
  • 8. Port Security Configuration (OBJ. 1.1).mp4
    05:37
  • 9. NAC Configuration (OBJ. 1.1).mp4
    06:48
  • 10. Analysis of Security Appliances (OBJ. 1.3).mp4
    15:41
  • 11. Quiz Application Monitoring.html
  • 1. Endpoint Monitoring (OBJ. 1.1 And 1.3).mp4
    02:08
  • 2. Endpoint Analysis (OBJ. 1.3).mp4
    05:47
  • 3. Sandboxing (OBJ. 1.3).mp4
    07:22
  • 4. Reverse Engineering (OBJ. 1.3).mp4
    11:14
  • 5. Malware Exploitation (OBJ. 1.3).mp4
    07:50
  • 6. Behavior Analysis (OBJ. 1.1 And 1.3).mp4
    11:34
  • 7. Malware Analysis (demo) (OBJ. 1.3).mp4
    25:39
  • 8. EDR Configuration (OBJ. 1.3).mp4
    04:51
  • 9. Block Lists and Allow Lists (OBJ. 1.1).mp4
    10:43
  • 10. Quiz Endpoint Monitoring.html
  • 1. Email Monitoring (OBJ. 1.3).mp4
    01:44
  • 2. Email IOCs (OBJ. 1.3).mp4
    05:20
  • 3. Email Header Analysis (OBJ. 1.3).mp4
    11:11
  • 4. Email Content Analysis (OBJ. 1.3).mp4
    03:38
  • 5. Email Server Security (OBJ. 1.3).mp4
    08:04
  • 6. SMTP Log Analysis (OBJ. 1.3).mp4
    05:20
  • 7. Email Message Security (OBJ. 1.3).mp4
    06:27
  • 8. Analyzing Email Headers (OBJ. 1.3).mp4
    04:14
  • 9. Quiz Email Monitoring.html
  • 1. Configuring Your SIEM (OBJ. 1.1 And 1.3).mp4
    01:42
  • 2. SIEM (OBJ. 1.3).mp4
    08:50
  • 3. Security Data Collection (OBJ. 1.1 And 1.3).mp4
    05:04
  • 4. Data Normalization (OBJ. 1.1).mp4
    07:40
  • 5. Event Log (OBJ. 1.1 And 1.3).mp4
    03:35
  • 6. Syslog (OBJ. 1.1 And 1.3).mp4
    06:26
  • 7. Configuring a SIEM Agent (OBJ. 1.3).mp4
    19:52
  • 8. Quiz Configuring Your SIEM.html
  • 1. Analyzing Your SIEM (OBJ. 1.3 And 4.1).mp4
    01:55
  • 2. SIEM Dashboards (OBJ. 1.3 And 4.1).mp4
    11:44
  • 3. Analysis and Detection (OBJ. 1.3).mp4
    07:14
  • 4. Trend Analysis (OBJ. 1.3).mp4
    09:59
  • 5. Rule and Query Writing (OBJ. 1.3).mp4
    04:42
  • 6. Searching and Piping Commands (OBJ. 1.3).mp4
    18:06
  • 7. Scripting Tools (OBJ. 1.3).mp4
    09:24
  • 8. Analyzing Filtering and Searching Logs (OBJ. 1.3).mp4
    07:22
  • 9. Quiz Analyzing Your SIEM.html
  • 1. Digital Forensics (OBJ. 3.2).mp4
    03:14
  • 2. Digital Forensic Analysts (OBJ. 3.2).mp4
    04:49
  • 3. Forensics Procedures (OBJ. 3.2).mp4
    09:16
  • 4. Work Product Retention (OBJ. 3.2).mp4
    02:50
  • 5. Data Acquisition (OBJ. 3.2).mp4
    04:58
  • 6. Forensics Tools (OBJ. 3.2).mp4
    07:10
  • 7. Memory Acquisition (OBJ. 3.2).mp4
    05:22
  • 8. Disk Image Acquisition (OBJ. 3.2).mp4
    11:54
  • 9. Hashing (OBJ. 1.3 And 3.2).mp4
    04:47
  • 10. Timeline Generation (OBJ. 3.2).mp4
    04:46
  • 11. Carving (OBJ. 3.2).mp4
    05:41
  • 12. Chain of Custody (OBJ. 3.2).mp4
    05:51
  • 13. Collecting and Validating Evidence (OBJ. 3.2).mp4
    09:05
  • 14. Quiz Digital Forensics.html
  • 1. Analyzing Network IOCs (OBJ. 1.2).mp4
    01:49
  • 2. Analyzing Network IOCs (OBJ. 1.2).mp4
    02:13
  • 3. Traffic Spikes (OBJ. 1.2).mp4
    18:00
  • 4. Beaconing (OBJ. 1.2).mp4
    13:40
  • 5. Irregular P2P Communications (OBJ. 1.2).mp4
    07:55
  • 6. Rogue Devices (OBJ. 1.2).mp4
    11:25
  • 7. Scans and Sweeps (OBJ. 1.2).mp4
    05:19
  • 8. Nonstandard Port Usage (OBJ. 1.2).mp4
    11:24
  • 9. TCP Ports (OBJ. 1.2).mp4
    07:57
  • 10. UDP Ports (OBJ. 1.2).mp4
    07:02
  • 11. Data Exfiltration (OBJ. 1.2).mp4
    06:21
  • 12. Covert Channels (OBJ. 1.2).mp4
    07:34
  • 13. Analysis of Network IOCs (OBJ. 1.2).mp4
    12:33
  • 14. Quiz Analyzing Network IOCs.html
  • 1. Analyzing Host-related IOCs (OBJ. 1.2).mp4
    01:16
  • 2. Host-related IOCs (OBJ. 1.2).mp4
    01:40
  • 3. Malicious Processes (OBJ. 1.2).mp4
    10:00
  • 4. Memory Forensics (OBJ. 1.2).mp4
    07:11
  • 5. Consumption (OBJ. 1.2).mp4
    09:00
  • 6. Disk and File System (OBJ. 1.2).mp4
    11:23
  • 7. Unauthorized Privilege (OBJ. 1.2).mp4
    05:14
  • 8. Unauthorized Software (OBJ. 1.2).mp4
    05:48
  • 9. Unauthorized ChangeHardware (OBJ. 1.2).mp4
    02:52
  • 10. Persistence (OBJ. 1.2).mp4
    10:01
  • 11. Quiz Analyzing Host-related IOCs.html
  • 1. Analyzing Application-related IOCs (OBJ. 1.2 And 3.2).mp4
    01:27
  • 2. Application-related IOCs (OBJ. 1.2).mp4
    01:37
  • 3. Anomalous Activity (OBJ. 1.2).mp4
    04:06
  • 4. Service Interruptions (OBJ. 1.2).mp4
    05:04
  • 5. Application Logs (OBJ. 1.2).mp4
    12:37
  • 6. New Accounts (OBJ. 1.2).mp4
    05:37
  • 7. Virtualization Forensics (OBJ. 3.2).mp4
    05:56
  • 8. Mobile Forensics (OBJ. 3.2).mp4
    11:32
  • 9. Quiz Analyzing Application-related IOCs.html
  • 1. Analyzing Lateral Movement and Pivoting IOCs (OBJ. 1.2).mp4
    01:17
  • 2. Lateral Movement and Pivoting (OBJ. 1.2).mp4
    03:21
  • 3. Pass the Hash (OBJ. 1.2).mp4
    10:10
  • 4. Golden Ticket (OBJ. 1.2).mp4
    07:09
  • 5. Lateral Movement (OBJ. 1.2).mp4
    06:39
  • 6. Pivoting (OBJ. 1.2).mp4
    06:03
  • 7. Quiz Analyzing Lateral Movement and Pivoting IOCs.html
  • 1. Incident Response Preparation (OBJ. 3.3 And 4.2).mp4
    02:44
  • 2. Incident Response Phases (OBJ. 3.3).mp4
    11:09
  • 3. Documenting Procedures (OBJ. 3.3).mp4
    07:12
  • 4. Data Criticality (OBJ. 3.3).mp4
    13:49
  • 5. Communication Plan (OBJ. 3.3 And 4.2).mp4
    07:07
  • 6. Reporting Requirements (OBJ. 3.3).mp4
    04:52
  • 7. Response Coordination (OBJ. 3.3).mp4
    07:26
  • 8. Business Continuity Plan (OBJ. 3.3).mp4
    13:41
  • 9. Training and Testing (OBJ. 3.3).mp4
    06:40
  • 10. Quiz Incident Response Preparation.html
  • 1. Detection and Containment (OBJ. 3.2).mp4
    01:28
  • 2. OODA Loop (OBJ. 3.2).mp4
    05:43
  • 3. Defensive Capabilities (OBJ. 3.2).mp4
    04:46
  • 4. Detection and Analysis (OBJ. 3.2).mp4
    06:44
  • 5. Impact Analysis (OBJ. 3.2).mp4
    07:49
  • 6. Incident Classification (OBJ. 3.2).mp4
    05:57
  • 7. Quiz Detection and Containment.html
  • 1. CER and Post-incident Actions (OBJ. 3.2 3.3 And 4.2).mp4
    02:01
  • 2. Containment (OBJ. 3.2).mp4
    06:25
  • 3. Eradication (OBJ. 3.2).mp4
    06:17
  • 4. Eradication Actions (OBJ. 3.2).mp4
    04:29
  • 5. Recovery (OBJ. 3.2).mp4
    02:44
  • 6. Recovery Actions (OBJ. 3.2).mp4
    06:25
  • 7. Post-Incident Activities (OBJ. 3.3 And 4.2).mp4
    05:57
  • 8. Lessons Learned (OBJ. 3.3 And 4.2).mp4
    07:08
  • 9. Root Cause Analysis (OBJ. 3.3 And 4.2).mp4
    04:24
  • 10. Quiz Eradication Recovery and Post-incident Actions.html
  • 1. Risk Mitigation (OBJ. 2.5 And 4.1).mp4
    01:42
  • 2. Risk Identification Process (OBJ. 2.5 And 4.1).mp4
    07:55
  • 3. Conducting an Assessment (OBJ. 2.5).mp4
    08:55
  • 4. Risk Calculation (OBJ. 2.5).mp4
    18:17
  • 5. Business Impact Analysis (OBJ. 2.5).mp4
    12:28
  • 6. Risk Prioritization (OBJ. 2.5).mp4
    16:56
  • 7. Communicating Risk (OBJ. 2.5 And 4.1).mp4
    08:06
  • 8. Training and Exercises (OBJ. 2.5).mp4
    04:59
  • 9. Quiz Risk Mitigation.html
  • 1. Frameworks Policies and Procedures (OBJ. 2.1 And 3.1).mp4
    01:16
  • 2. Enterprise Security Architecture (OBJ. 2.1).mp4
    02:43
  • 3. Prescriptive Frameworks (OBJ. 2.1).mp4
    04:30
  • 4. Risk-based Frameworks (OBJ. 2.1).mp4
    04:28
  • 5. Industry Frameworks (OBJ. 2.1 And 3.1).mp4
    15:13
  • 6. Audits and Assessments (OBJ. 2.1).mp4
    07:11
  • 7. Continuous Monitoring (OBJ. 2.1).mp4
    05:12
  • 8. Quiz Frameworks Policies and Procedures.html
  • 1. Enumeration Tools (OBJ. 2.1 And 2.2).mp4
    01:41
  • 2. Enumeration Tools (OBJ. 2.1 And 2.2).mp4
    07:35
  • 3. Nmap Discovery Scans (OBJ. 2.2).mp4
    08:36
  • 4. Nmap Port Scans (OBJ. 2.2).mp4
    06:01
  • 5. Nmap Port States (OBJ. 2.2).mp4
    03:43
  • 6. Nmap Fingerprinting Scans (OBJ. 2.2).mp4
    04:18
  • 7. Using Nmap (OBJ. 2.2).mp4
    11:21
  • 8. Hping (OBJ. 2.2).mp4
    05:41
  • 9. Angry IP Scanner (OBJ. 2.2).mp4
    03:49
  • 10. Maltego (OBJ. 2.2).mp4
    03:28
  • 11. Responder (OBJ. 2.2).mp4
    01:35
  • 12. Wireless Assessment Tools (OBJ. 2.2).mp4
    05:30
  • 13. Recon-ng (OBJ. 2.2).mp4
    21:46
  • 14. Hashcat (OBJ. 2.2).mp4
    03:17
  • 15. Testing Credential Security (OBJ. 2.2).mp4
    02:36
  • 16. Quiz Enumeration Tools.html
  • 1. Vulnerability Scanning (Introduction) (OBJ. 2.1 And 2.2).mp4
    01:39
  • 2. Identifying Vulnerabilities (OBJ. 2.1).mp4
    03:37
  • 3. Scanning Workflow (OBJ. 2.1).mp4
    06:45
  • 4. Scope Considerations (OBJ. 2.1).mp4
    08:08
  • 5. Scanner Types (OBJ. 2.1).mp4
    09:00
  • 6. Scanning Parameters (OBJ. 2.1).mp4
    06:16
  • 7. Scheduling and Constraints (OBJ. 2.1).mp4
    08:52
  • 8. Vulnerability Feeds (OBJ. 2.1).mp4
    03:21
  • 9. Scan Sensitivity (OBJ. 2.1).mp4
    05:07
  • 10. Scanning Risks (OBJ. 2.1).mp4
    02:52
  • 11. Conducting Scans (OBJ. 2.1 And 2.2).mp4
    31:25
  • 12. Quiz Vulnerability Scanning.html
  • 1. Analyzing Output from Vulnerability Scanners (OBJ. 2.1 2.3 And 4.1).mp4
    02:02
  • 2. Scan Reports (OBJ. 2.3 And 4.1).mp4
    03:21
  • 3. Common Identifiers (OBJ. 2.3).mp4
    06:30
  • 4. CVSS (OBJ. 2.3).mp4
    08:24
  • 5. Interpreting CVSS (OBJ. 2.3).mp4
    09:45
  • 6. Vulnerability Reports (OBJ. 2.1 And 2.3).mp4
    11:02
  • 7. Nessus (OBJ. 2.2).mp4
    06:54
  • 8. OpenVAS and Qualys (OBJ. 2.2).mp4
    03:09
  • 9. Assessing Scan Outputs (OBJ. 2.2 And 2.3).mp4
    13:37
  • 10. Quiz Analyzing Output from Vulnerability Scanners.html
  • 1. Mitigating Vulnerabilities (OBJ. 2.1 2.5 And 4.1).mp4
    01:36
  • 2. Remediation and Mitigation (OBJ. 2.5).mp4
    06:28
  • 3. Configuration Baselines (OBJ. 2.1 And 2.5).mp4
    04:17
  • 4. Hardening and Patching (OBJ. 2.5).mp4
    11:04
  • 5. Remediation Issues (OBJ. 2.5 And 4.1).mp4
    08:35
  • 6. Quiz Mitigating Vulnerabilities.html
  • 1. Identity and Access Management Solutions (OBJ. 1.1).mp4
    01:52
  • 2. Identity and Access Management (OBJ. 1.1).mp4
    07:08
  • 3. Password Policies (OBJ. 1.1).mp4
    06:10
  • 4. SSO and MFA (OBJ. 1.1).mp4
    05:40
  • 5. Certificate Management (OBJ. 1.1).mp4
    03:54
  • 6. Federation (OBJ. 1.1).mp4
    05:19
  • 7. Passwordless Authentication (OBJ. 1.1).mp4
    05:17
  • 8. Privilege Management (OBJ. 1.1).mp4
    05:51
  • 9. IAM Auditing (OBJ. 1.1).mp4
    06:13
  • 10. Conduct and Use Policies (OBJ. 1.1).mp4
    03:27
  • 11. Account and Permissions Audits (OBJ. 1.1).mp4
    04:32
  • 12. Quiz Identity and Access Management Solutions.html
  • 1. Network Architecture and Segmentation (OBJ. 1.1 1.4 And 2.5).mp4
    02:02
  • 2. Asset and Change Management (OBJ. 2.5).mp4
    10:05
  • 3. Network Architecture (OBJ. 1.1).mp4
    11:23
  • 4. Segmentation (OBJ. 1.1).mp4
    06:01
  • 5. Jumpbox (OBJ. 1.1).mp4
    05:04
  • 6. Virtualization (OBJ. 1.1).mp4
    05:50
  • 7. Virtualized Infrastructure (OBJ. 1.1).mp4
    06:34
  • 8. Honeypots (OBJ. 1.4).mp4
    06:25
  • 9. Zero Trust (OBJ. 1.1).mp4
    06:37
  • 10. Configuring Network Segmentation (OBJ. 1.1).mp4
    10:05
  • 11. Quiz Network Architecture and Segmentation.html
  • 1. Hardware Assurance Best Practices (OBJ. 1.4 And 2.4).mp4
    01:47
  • 2. Supply Chain Assessment (OBJ. 1.4).mp4
    05:24
  • 3. Root of Trust (OBJ. 2.4).mp4
    04:35
  • 4. Trusted Firmware (OBJ. 2.4).mp4
    04:55
  • 5. Secure Processing (OBJ. 2.4).mp4
    04:02
  • 6. Quiz Hardware Assurance Best Practices.html
  • 1. Specialized Technology (OBJ. 2.1 And 2.4).mp4
    01:40
  • 2. Mobile Vulnerabilities (OBJ. 2.1 And 2.4).mp4
    11:59
  • 3. IoT Vulnerabilities (OBJ. 2.1 And 2.4).mp4
    03:28
  • 4. Embedded System Vulnerabilities (OBJ. 2.1 And 2.4).mp4
    06:52
  • 5. ICS And SCADA Vulnerabilities (OBJ. 2.1 And 2.4).mp4
    08:18
  • 6. Mitigating Vulnerabilities (OBJ. 2.1 And 2.4).mp4
    03:29
  • 7. Premise System Vulnerabilities (OBJ. 2.1 And 2.4).mp4
    06:13
  • 8. Vehicular Vulnerabilities (OBJ. 2.1 And 2.4).mp4
    06:53
  • 9. Quiz Specialized Technology.html
  • 1. Non-technical Data and Privacy Controls (OBJ. 1.1 And 2.5).mp4
    02:47
  • 2. Data Classification (OBJ. 2.5).mp4
    09:13
  • 3. Data Types (OBJ. 1.1 And 2.5).mp4
    03:19
  • 4. Legal Requirements (OBJ. 1.1 And 2.5).mp4
    09:16
  • 5. Data Policies (OBJ. 2.5).mp4
    05:31
  • 6. Data Retention (OBJ. 2.5).mp4
    06:59
  • 7. Data Ownership (OBJ. 2.5).mp4
    04:05
  • 8. Data Sharing (OBJ. 2.5).mp4
    05:46
  • 9. Quiz Non-technical Data and Privacy Controls.html
  • 1. Technical Data and Privacy Controls (OBJ. 1.1).mp4
    01:22
  • 2. Access Controls (OBJ. 1.1).mp4
    03:02
  • 3. File System Permissions (OBJ. 1.1).mp4
    10:10
  • 4. Encryption (OBJ. 1.1).mp4
    03:16
  • 5. Data Loss Prevention (OBJ. 1.1).mp4
    04:23
  • 6. DLP Discovery and Classification (OBJ. 1.1).mp4
    03:57
  • 7. Deidentification Controls (OBJ. 1.1).mp4
    06:29
  • 8. DRM and Watermarking (OBJ. 1.1).mp4
    04:11
  • 9. Analyzing Share Permissions (OBJ. 1.1).mp4
    03:37
  • 10. Quiz Technical Data and Privacy Controls.html
  • 1. Mitigate Software Vulnerabilities and Attacks (OBJ. 2.4 And 2.5).mp4
    01:40
  • 2. SDLC Integration (OBJ. 2.5).mp4
    12:11
  • 3. Execution and Escalation (OBJ. 2.4).mp4
    06:22
  • 4. Overflow Attacks (OBJ. 2.4).mp4
    13:31
  • 5. Race Conditions (OBJ. 2.5).mp4
    05:49
  • 6. Improper Error Handling (OBJ. 2.5).mp4
    05:16
  • 7. Design Vulnerabilities (OBJ. 2.4).mp4
    04:16
  • 8. Platform Best Practices (OBJ. 2.5).mp4
    06:29
  • 9. Metasploit Framework (OBJ. 2.2).mp4
    18:47
  • 10. Quiz Mitigate Software Vulnerabilities and Attacks.html
  • 1. Mitigate Web Application Vulnerabilities and Attacks (OBJ. 2.4 And 2.5).mp4
    01:35
  • 2. Directory Traversal (OBJ. 2.4).mp4
    08:07
  • 3. Cross-site Scripting (OBJ. 2.4).mp4
    08:03
  • 4. SQL Injection (OBJ. 2.4).mp4
    07:41
  • 5. XML Vulnerabilities (OBJ. 2.4).mp4
    05:09
  • 6. Secure Coding (OBJ. 2.5).mp4
    09:31
  • 7. Authentication Attacks (OBJ. 2.4 And 2.5).mp4
    07:08
  • 8. Session Hijacking (OBJ. 2.4 And 2.5).mp4
    06:54
  • 9. Server-Side Request Forgery (OBJ. 2.4).mp4
    04:25
  • 10. Sensitive Data Exposure (OBJ. 2.5).mp4
    03:19
  • 11. Clickjacking (OBJ. 2.4 And 2.5).mp4
    02:21
  • 12. Web Application Vulnerabilities (OBJ. 2.4 And 2.5).mp4
    08:43
  • 13. Quiz Mitigate Web Application Vulnerabilities and Attacks.html
  • 1. Analyzing Application Assessments (OBJ. 2.1 And 2.2).mp4
    01:03
  • 2. Software Assessments (OBJ. 2.1).mp4
    07:34
  • 3. Reverse Engineering (OBJ. 2.1).mp4
    09:33
  • 4. Dynamic Analysis (OBJ. 2.1).mp4
    07:56
  • 5. Web Application Scanners (OBJ. 2.2).mp4
    03:13
  • 6. Burp Suite (OBJ. 2.2).mp4
    10:34
  • 7. OWASP ZAP (OBJ. 2.2).mp4
    02:54
  • 8. Analyzing Web Applications (OBJ. 2.2).mp4
    15:42
  • 9. Quiz Analyzing Application Assessments.html
  • 1. Cloud and Automation (OBJ. 1.1).mp4
    01:06
  • 2. Cloud Models (OBJ. 1.1).mp4
    16:00
  • 3. Service Models (OBJ. 1.1).mp4
    10:43
  • 4. Cloud-based Infrastructure (OBJ. 1.1).mp4
    07:21
  • 5. CASB (OBJ. 1.1).mp4
    04:27
  • 6. Quiz Cloud and Automation.html
  • 1. Service-Oriented Architecture (OBJ. 1.1 1.5 And 2.4).mp4
    02:12
  • 2. SOA and Microservices (OBJ. 1.1).mp4
    06:02
  • 3. SOAP (OBJ. 1.5 And 2.5).mp4
    04:40
  • 4. SAML (OBJ. 1.5).mp4
    06:54
  • 5. REST (OBJ. 1.5).mp4
    10:15
  • 6. APIs Webhooks and Plugins (OBJ. 1.5).mp4
    11:46
  • 7. Scripting (OBJ. 1.3 And 1.5).mp4
    04:28
  • 8. Workflow Orchestration (OBJ. 1.5).mp4
    06:16
  • 9. FAAS and Serverless (OBJ. 1.1).mp4
    08:13
  • 10. Quiz Service-Oriented Architecture.html
  • 1. Cloud Infrastructure Assessments (OBJ. 1.1 And 2.2).mp4
    01:20
  • 2. Cloud Threats (OBJ. 1.1).mp4
    08:13
  • 3. Cloud Forensics (OBJ. 1.1).mp4
    04:01
  • 4. Auditing the Cloud (OBJ. 2.2).mp4
    05:06
  • 5. Conducting Cloud Audits (OBJ. 2.2).mp4
    14:02
  • 6. Quiz Cloud Infrastructure Assessments.html
  • 1. Automation Concepts and Technologies (OBJ. 1.5).mp4
    02:17
  • 2. CICD (OBJ. 1.5).mp4
    07:09
  • 3. DevSecOps (OBJ. 1.5).mp4
    04:50
  • 4. IAC (OBJ. 1.5).mp4
    04:22
  • 5. Machine Learning (OBJ. 1.5).mp4
    08:28
  • 6. Data Enrichment (OBJ. 1.5).mp4
    03:41
  • 7. SOAR (OBJ. 1.5).mp4
    03:19
  • 8. Standardized Processes (OBJ. 1.5).mp4
    04:03
  • 9. Single Pane of Glass (OBJ. 1.5).mp4
    05:59
  • 10. Quiz Automation Concepts and Technologies.html
  • 1. Conclusion.mp4
    12:20
  • 2. BONUS What Comes Next.mp4
    03:47
  • 3. CompTIA CySA+ (CS0-003).html
  • Description


    Pass the CompTIA Cybersecurity Analyst+ (CS0-003) exam on your 1st attempt, includes a full practice exam!

    What You'll Learn?


    • Take and pass the CompTIA CySA+ (CS0-003) certification exam
    • Understand security operations
    • Understand threat and vulnerability management concepts
    • Understand how to conduct a cyber incident response
    • Understand how to setup a strong security architecture for your networks
    • Know what different types of cybersecurity tools are on the market and which to use in different scenarios

    Who is this for?


  • Students preparing for the CompTIA CySA+ (CS0-003) Certification Exam
  • Threat analysts
  • Vulnerability analysts
  • Risk management professionals
  • Entry-level incident response professionals
  • What You Need to Know?


  • Basic understanding of network and network security
  • Understand the concepts covered by the Network+ and Security+ exams
  • This course aligns directly to the CompTIA CySA+ CS0-003 Certification Study Guide
  • More details


    Description

    *** Taught by a Best Selling IT Certification Instructor ***

    This course provides everything you need in order to study for the CompTIA Cybersecurity Analyst+ (CySA+) (CS0-003) exam, including a downloadable Study Guide (PDF), quizzes to check your knowledge as you progress through the videos, and a full-length practice exam to test your knowledge before test day!

    Taught by an expert in information technology and cybersecurity with over 20 years of experience, this course is a fun way to learn what you need to know to pass the CompTIA Cybersecurity Analyst+ (CySA+) (CS0-003) exam or to better prepare yourself to serve on your organization's cyber defense team.    

    The CompTIA CySA+ (Cybersecurity Analyst+) (CS0-003) certification is a vendor-neutral certification that validates your knowledge and ability to conduct intermediate-level cybersecurity skills. This certification fills the gap between the entry-level CompTIA Security+ exam (for those with about 1 year in the field) and the advanced-level CompTIA Advanced Security Practitioner (for those with at least 5 years in the field). The CompTIA CySA+ exam is focused on the technical, hands-on details of the cybersecurity field, including not only cyber threats, secure network architecture, and risk management, but also the ability to perform log analysis, configuration assessments, and more.    

    This CySA+ (CS0-003) course is designed for IT Security analysts, vulnerability analysts, threat intelligence analysts, or anyone who is trying to get a better understanding of the concepts involved in conducting cybersecurity analysis, including threat management, vulnerability management, cyber incident response, security architecture, and the tool sets associated with these cybersecurity efforts.    

    To help you practice for the CompTIA CySA+ (CS0-003) exam, this course even comes with a realistic practice exam containing 90 multiple-choice questions spread across the four domains tested by the CompTIA CySA+ (CS0-003) certification exam!       


    This course will provide you with full coverage of the four domains of the CySA+ (CS0-003) exam:   

    1. Security Operations (33%)

    2. Vulnerability Management (30%)

    3. Incident Response Management (20%)

    4. Reporting and Communication (17%)


    This course stays current and up-to-date with the latest release of the CompTIA CySA+ exam (CS0-003), and also provides a 30-day money-back guarantee if you are not satisfied with the quality of this course for any reason!


    This course is brought to you by Dion Training Solutions, a CompTIA Platinum Delivery Partner, and aligns directly with the OFFICIAL CompTIA CySA+ CS0-003 Certification Study Guide.


    What Other Students Are Saying About Our Courses:

    • Jason Dion always has some of the best courses. This is the third CYSA+ course I bought from different vendors to see which one would help me more and like always this has already caught my attention and kept me focused the entire time. Other courses have too many distracting factors, unlike this one. I will always recommend Jason Dion. (Luis, 5 stars)

    • Great course, very detailed. Passed the exam on the first try. I have recommended this course to everyone I know in the security industry trying to pass the CySA+ exam. (Jose D., 5 stars)

    • I have really enjoyed and learned a lot from this course. I used Jason's course to pass the Network + on my first attempt, I am expecting that this course will enable me to pass the CySA+, too! (Leone W., 5 stars)


    Upon completion of this course, you will earn 33 CEUs towards the renewal of your CompTIA A+, Network+, Security+, Linux+, Cloud+, PenTest+, CySA+, or CASP+ certifications.

    Who this course is for:

    • Students preparing for the CompTIA CySA+ (CS0-003) Certification Exam
    • Threat analysts
    • Vulnerability analysts
    • Risk management professionals
    • Entry-level incident response professionals

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Jason Dion • 1 Million+ Enrollments Worldwide
    Jason Dion • 1 Million+ Enrollments Worldwide
    Instructor's Courses
    Jason Dion, CISSP No. 349867, is a former college professor and the lead instructor at Dion Training Solutions. He has multiple information technology professional certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Network Defense Architect (CNDA), Digital Forensic Examiner (DFE), Digital Media Collector (DMC), CySA+, Security+, Network+, A+, PRINCE2 Practitioner, and ITIL. With networking experience dating back to 1992, Jason has been a network engineer, Director of a Network Operations and Security Center, and an Information Systems Officer for large organizations around the globe. He holds a Master’s of Science degree in Information Technology with a specialization in Information Assurance. He lives in Puerto Rico with his wife and two children.
    Dion Training Solutions • ATO for ITIL & PRINCE2
    Dion Training Solutions • ATO for ITIL & PRINCE2
    Instructor's Courses
    Learn Faster and Get CertifiedDue to the design of our materials, you will learn faster and focus your studies on passing your certifications. With our tools and techniques, you will be ready to take and pass your certification exam on your first attempt!Training the Cybersecurity WorkforceWe strive to train the cybersecurity workforce of today and tomorrow. Whether you need to earn your next certification to be competitive for that position, or you just need to do your continuing education to maintain your current certifications, Dion Training is here to support you.
    Dion Training Solutions • ATO for ITIL & PRINCE2
    Dion Training Solutions • ATO for ITIL & PRINCE2
    Instructor's Courses
    Learn Faster and Get CertifiedDue to the design of our materials, you will learn faster and focus your studies on passing your certifications. With our tools and techniques, you will be ready to take and pass your certification exam on your first attempt!Training the Cybersecurity WorkforceWe strive to train the cybersecurity workforce of today and tomorrow. Whether you need to earn your next certification to be competitive for that position, or you just need to do your continuing education to maintain your current certifications, Dion Training is here to support you.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 319
    • duration 36:08:19
    • Release Date 2023/07/03