00001 Welcome to the Course.mp4
02:01
00002 All About the Exam.mp4
08:14
00003 What s New in the CompTIA CySA+ Exam.mp4
04:51
00004 Meet the Instructors.mp4
02:21
00005 Thinking Like the Enemy.mp4
09:16
00006 Tools of the Trade.mp4
07:31
00007 Intelligence Sources and Confidence Levels.mp4
07:57
00008 Threat Indicators and Actors.mp4
07:59
00009 Threat Trends.mp4
06:50
00010 Intelligence Cycle and ISACs.mp4
06:16
00011 Attack Frameworks.mp4
06:15
00012 Threat Research.mp4
11:09
00013 Threat Modelling and Intelligence Sharing.mp4
05:33
00014 Vulnerability Identification.mp4
07:25
00015 Scanning Parameters and Criteria.mp4
09:13
00016 Scanning Special Considerations.mp4
05:36
00017 Validation.mp4
03:26
00018 Remediation and Mitigation.mp4
07:49
00019 Inhibitors to Remediation.mp4
06:59
00020 Web Applications Scanners Part 1.mp4
09:34
00021 Web Applications Scanners Part 2.mp4
05:12
00022 Scanning.mp4
05:45
00023 Configuring and Executing Scans.mp4
07:42
00024 Vulnerability Scanning.mp4
09:46
00025 Reverse Engineering.mp4
07:37
00026 Enumeration.mp4
06:21
00027 Wireless Assessment Tools.mp4
07:39
00028 Cloud Assessment Tools.mp4
03:36
00029 Mobile and IoT.mp4
09:48
00030 Embedded and Firmware Systems RTOS SoC and FPGA.mp4
09:18
00031 Access and Vehicles Risk.mp4
08:01
00032 Automation and Control Risk.mp4
10:03
00033 Cloud Models.mp4
06:38
00034 Remote Service Invocation FaaS IaC API.mp4
09:32
00035 Cloud Vulnerabilities.mp4
06:10
00036 Injection and Overflow Attacks.mp4
09:25
00037 Authentication Attacks.mp4
06:33
00038 Exploits.mp4
08:08
00039 Application Vulnerabilities Part 1.mp4
07:37
00040 Application Vulnerabilities Part 2.mp4
06:57
00041 Network Architecture and Asset Management.mp4
08:50
00042 Protecting Your Territory.mp4
04:49
00043 Identity and Access Management.mp4
11:17
00044 Encryption and Active Defense.mp4
08:26
00045 Platforms.mp4
07:00
00046 SOA and DevSecOps.mp4
08:44
00047 Secure Software Development.mp4
07:43
00048 Best Coding Practices.mp4
04:08
00049 Trusted Hardware.mp4
09:43
00050 Hardware Encryption.mp4
04:28
00051 Hardware Security.mp4
07:44
00052 Data Analytics.mp4
09:44
00053 Endpoint Security.mp4
07:32
00054 Recon Results Part 1.mp4
13:01
00055 Recon Results Part 2.mp4
04:47
00056 Impact Analysis.mp4
04:30
00057 Collective Tools.mp4
08:53
00058 Query Writing.mp4
06:43
00059 Email Analysis Part 1.mp4
09:31
00060 Email Analysis Part 2.mp4
07:56
00061 Permissions.mp4
08:50
00062 Firewalls.mp4
07:30
00063 Intrusion Prevention Rules.mp4
05:16
00064 DLP and Endpoint Detection.mp4
04:57
00065 Threat Hunting and the Hypothesis.mp4
06:26
00066 Threat Hunting Process.mp4
07:14
00067 Results and Benefits.mp4
04:54
00068 Workflow and Scripting.mp4
07:27
00069 API and Malware Signature Creation.mp4
07:46
00070 Threat Feeds and Machine Learning.mp4
06:02
00071 Protocols Standards and Software Engineering.mp4
05:15
00072 IR Roles and Responsibilities.mp4
07:38
00073 IR Active Preparation.mp4
09:41
00074 Incident Response Process.mp4
06:36
00075 Network Symptoms.mp4
03:30
00076 Host Symptoms.mp4
08:03
00077 Application Symptoms.mp4
04:23
00078 Digital Forensics.mp4
00:27
00079 Seizure and Acquisitions.mp4
04:52
00080 Forensics Acquisition Tools.mp4
08:52
00081 Mobile Virtualization and Cloud.mp4
05:51
00082 Forensics Analysis Part 1.mp4
04:24
00083 Forensics Analysis Part 2.mp4
07:46
00084 Packet Capture.mp4
11:36
00085 Data Privacy and Security.mp4
06:13
00086 Nontechnical Controls.mp4
08:47
00087 Technical Controls.mp4
07:48
00088 Business Impact Analysis.mp4
04:30
00089 Risk Identification.mp4
05:18
00090 Risk Calculation and Communication.mp4
06:10
00091 Training.mp4
03:59
00092 Supply Chain Assessment.mp4
04:12
00093 Frameworks.mp4
13:01
00094 Policies and Procedures.mp4
04:29
00095 Controls and Procedures.mp4
07:39
00096 Verification.mp4
06:11
TOTAL-CompTIA-CySA-Cybersecurity-Analyst-CS0-002-main.zip