Companies Home Search Profile

TOTAL - CompTIA CySA+ Cybersecurity Analyst (CS0-002)

Focused View

Mike Meyers

11:17:05

12 View
  • 00001 Welcome to the Course.mp4
    02:01
  • 00002 All About the Exam.mp4
    08:14
  • 00003 What s New in the CompTIA CySA+ Exam.mp4
    04:51
  • 00004 Meet the Instructors.mp4
    02:21
  • 00005 Thinking Like the Enemy.mp4
    09:16
  • 00006 Tools of the Trade.mp4
    07:31
  • 00007 Intelligence Sources and Confidence Levels.mp4
    07:57
  • 00008 Threat Indicators and Actors.mp4
    07:59
  • 00009 Threat Trends.mp4
    06:50
  • 00010 Intelligence Cycle and ISACs.mp4
    06:16
  • 00011 Attack Frameworks.mp4
    06:15
  • 00012 Threat Research.mp4
    11:09
  • 00013 Threat Modelling and Intelligence Sharing.mp4
    05:33
  • 00014 Vulnerability Identification.mp4
    07:25
  • 00015 Scanning Parameters and Criteria.mp4
    09:13
  • 00016 Scanning Special Considerations.mp4
    05:36
  • 00017 Validation.mp4
    03:26
  • 00018 Remediation and Mitigation.mp4
    07:49
  • 00019 Inhibitors to Remediation.mp4
    06:59
  • 00020 Web Applications Scanners Part 1.mp4
    09:34
  • 00021 Web Applications Scanners Part 2.mp4
    05:12
  • 00022 Scanning.mp4
    05:45
  • 00023 Configuring and Executing Scans.mp4
    07:42
  • 00024 Vulnerability Scanning.mp4
    09:46
  • 00025 Reverse Engineering.mp4
    07:37
  • 00026 Enumeration.mp4
    06:21
  • 00027 Wireless Assessment Tools.mp4
    07:39
  • 00028 Cloud Assessment Tools.mp4
    03:36
  • 00029 Mobile and IoT.mp4
    09:48
  • 00030 Embedded and Firmware Systems RTOS SoC and FPGA.mp4
    09:18
  • 00031 Access and Vehicles Risk.mp4
    08:01
  • 00032 Automation and Control Risk.mp4
    10:03
  • 00033 Cloud Models.mp4
    06:38
  • 00034 Remote Service Invocation FaaS IaC API.mp4
    09:32
  • 00035 Cloud Vulnerabilities.mp4
    06:10
  • 00036 Injection and Overflow Attacks.mp4
    09:25
  • 00037 Authentication Attacks.mp4
    06:33
  • 00038 Exploits.mp4
    08:08
  • 00039 Application Vulnerabilities Part 1.mp4
    07:37
  • 00040 Application Vulnerabilities Part 2.mp4
    06:57
  • 00041 Network Architecture and Asset Management.mp4
    08:50
  • 00042 Protecting Your Territory.mp4
    04:49
  • 00043 Identity and Access Management.mp4
    11:17
  • 00044 Encryption and Active Defense.mp4
    08:26
  • 00045 Platforms.mp4
    07:00
  • 00046 SOA and DevSecOps.mp4
    08:44
  • 00047 Secure Software Development.mp4
    07:43
  • 00048 Best Coding Practices.mp4
    04:08
  • 00049 Trusted Hardware.mp4
    09:43
  • 00050 Hardware Encryption.mp4
    04:28
  • 00051 Hardware Security.mp4
    07:44
  • 00052 Data Analytics.mp4
    09:44
  • 00053 Endpoint Security.mp4
    07:32
  • 00054 Recon Results Part 1.mp4
    13:01
  • 00055 Recon Results Part 2.mp4
    04:47
  • 00056 Impact Analysis.mp4
    04:30
  • 00057 Collective Tools.mp4
    08:53
  • 00058 Query Writing.mp4
    06:43
  • 00059 Email Analysis Part 1.mp4
    09:31
  • 00060 Email Analysis Part 2.mp4
    07:56
  • 00061 Permissions.mp4
    08:50
  • 00062 Firewalls.mp4
    07:30
  • 00063 Intrusion Prevention Rules.mp4
    05:16
  • 00064 DLP and Endpoint Detection.mp4
    04:57
  • 00065 Threat Hunting and the Hypothesis.mp4
    06:26
  • 00066 Threat Hunting Process.mp4
    07:14
  • 00067 Results and Benefits.mp4
    04:54
  • 00068 Workflow and Scripting.mp4
    07:27
  • 00069 API and Malware Signature Creation.mp4
    07:46
  • 00070 Threat Feeds and Machine Learning.mp4
    06:02
  • 00071 Protocols Standards and Software Engineering.mp4
    05:15
  • 00072 IR Roles and Responsibilities.mp4
    07:38
  • 00073 IR Active Preparation.mp4
    09:41
  • 00074 Incident Response Process.mp4
    06:36
  • 00075 Network Symptoms.mp4
    03:30
  • 00076 Host Symptoms.mp4
    08:03
  • 00077 Application Symptoms.mp4
    04:23
  • 00078 Digital Forensics.mp4
    00:27
  • 00079 Seizure and Acquisitions.mp4
    04:52
  • 00080 Forensics Acquisition Tools.mp4
    08:52
  • 00081 Mobile Virtualization and Cloud.mp4
    05:51
  • 00082 Forensics Analysis Part 1.mp4
    04:24
  • 00083 Forensics Analysis Part 2.mp4
    07:46
  • 00084 Packet Capture.mp4
    11:36
  • 00085 Data Privacy and Security.mp4
    06:13
  • 00086 Nontechnical Controls.mp4
    08:47
  • 00087 Technical Controls.mp4
    07:48
  • 00088 Business Impact Analysis.mp4
    04:30
  • 00089 Risk Identification.mp4
    05:18
  • 00090 Risk Calculation and Communication.mp4
    06:10
  • 00091 Training.mp4
    03:59
  • 00092 Supply Chain Assessment.mp4
    04:12
  • 00093 Frameworks.mp4
    13:01
  • 00094 Policies and Procedures.mp4
    04:29
  • 00095 Controls and Procedures.mp4
    07:39
  • 00096 Verification.mp4
    06:11
  • TOTAL-CompTIA-CySA-Cybersecurity-Analyst-CS0-002-main.zip
  • Description


    Are you looking to get into the exciting world of hackers, cybersecurity, threat hunting, and digital forensics? Do you find the idea of gathering and analyzing intelligence to detect and combat hackers intriguing? Then this is the course for you. This course is aimed at the aspirational junior analyst looking to step up in their career. However, if your tech skills don’t include cybersecurity, you can also gain a great deal of knowledge from this course to help launch yourself towards a career in cybersecurity. This course covers everything you need to know in order to respond to cybersecurity threats and attacks. You will learn how to analyze data, perform network reconnaissance, and identify and address vulnerabilities to effectively respond to and recover from incidents. Implementing the suggested countermeasures detailed within this course, you will be prepared to secure your own corporate environment. If you are looking to get certified, this course will also help prepare you for the CompTIA CySA+ Certification (CS0-002) exam. The first goal of the course is to make you an outstanding cybersecurity analyst and, in the process, make sure you are ready to pass the CompTIA exam. All resources and code files are placed here: https://github.com/PacktPublishing/TOTAL-CompTIA-CySA-Cybersecurity-Analyst-CS0-002

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Total Seminars, LLC, is a provider of PC and network repair seminars and certification training services through books, videos, and courseware for thousands of organizations throughout the world including the United Nations, the FBI, and all branches of the US Department of Defense. Mike Meyers is the president and co-founder of Total Seminars, which produces the best-selling CompTIA A+ and Network+ Certification books with over 1 million books in print. He is affectionately called the “Alpha Geek” and is the industry’s leading authority on CompTIA Certifications. He has created several other best-selling video courses on CompTIA certifications with the Total Seminars team of instructors. Mike has been involved in the computer and network repair industry since 1987 as a technician, instructor, author, consultant, and speaker. He is the author of numerous popular PC books and videos, including the best-selling CompTIA A+ Certification All-In-One Exam Guide and CompTIA Network+ Certification All-In-One Exam Guide. His humorous and easy-to-follow approach to teaching comes through in his video training courses as well as his classroom instructor-led courses. Making IT concepts easy to understand and fun to learn helps students stay engaged and retain the information.
    Packt is a publishing company founded in 2003 headquartered in Birmingham, UK, with offices in Mumbai, India. Packt primarily publishes print and electronic books and videos relating to information technology, including programming, web design, data analysis and hardware.
    • language english
    • Training sessions 96
    • duration 11:17:05
    • Release Date 2024/03/15