Total Comptia Cysaplus Cybersecurity Analyst Cs0-002
Focused View
11:17:05
64 View
00001 Welcome to the Course.mp4
02:01
00002 All About the Exam.mp4
08:14
00003 What s New in the CompTIA CySA+ Exam.mp4
04:51
00004 Meet the Instructors.mp4
02:21
00005 Thinking Like the Enemy.mp4
09:16
00006 Tools of the Trade.mp4
07:31
00007 Intelligence Sources and Confidence Levels.mp4
07:57
00008 Threat Indicators and Actors.mp4
07:59
00009 Threat Trends.mp4
06:50
00010 Intelligence Cycle and ISACs.mp4
06:16
00011 Attack Frameworks.mp4
06:15
00012 Threat Research.mp4
11:09
00013 Threat Modelling and Intelligence Sharing.mp4
05:33
00014 Vulnerability Identification.mp4
07:25
00015 Scanning Parameters and Criteria.mp4
09:13
00016 Scanning Special Considerations.mp4
05:36
00017 Validation.mp4
03:26
00018 Remediation and Mitigation.mp4
07:49
00019 Inhibitors to Remediation.mp4
06:59
00020 Web Applications Scanners Part 1.mp4
09:34
00021 Web Applications Scanners Part 2.mp4
05:12
00022 Scanning.mp4
05:45
00023 Configuring and Executing Scans.mp4
07:42
00024 Vulnerability Scanning.mp4
09:46
00025 Reverse Engineering.mp4
07:37
00026 Enumeration.mp4
06:21
00027 Wireless Assessment Tools.mp4
07:39
00028 Cloud Assessment Tools.mp4
03:36
00029 Mobile and IoT.mp4
09:48
00030 Embedded and Firmware Systems RTOS SoC and FPGA.mp4
09:18
00031 Access and Vehicles Risk.mp4
08:01
00032 Automation and Control Risk.mp4
10:03
00033 Cloud Models.mp4
06:38
00034 Remote Service Invocation FaaS IaC API.mp4
09:32
00035 Cloud Vulnerabilities.mp4
06:10
00036 Injection and Overflow Attacks.mp4
09:25
00037 Authentication Attacks.mp4
06:33
00038 Exploits.mp4
08:08
00039 Application Vulnerabilities Part 1.mp4
07:37
00040 Application Vulnerabilities Part 2.mp4
06:57
00041 Network Architecture and Asset Management.mp4
08:50
00042 Protecting Your Territory.mp4
04:49
00043 Identity and Access Management.mp4
11:17
00044 Encryption and Active Defense.mp4
08:26
00045 Platforms.mp4
07:00
00046 SOA and DevSecOps.mp4
08:44
00047 Secure Software Development.mp4
07:43
00048 Best Coding Practices.mp4
04:08
00049 Trusted Hardware.mp4
09:43
00050 Hardware Encryption.mp4
04:28
00051 Hardware Security.mp4
07:44
00052 Data Analytics.mp4
09:44
00053 Endpoint Security.mp4
07:32
00054 Recon Results Part 1.mp4
13:01
00055 Recon Results Part 2.mp4
04:47
00056 Impact Analysis.mp4
04:30
00057 Collective Tools.mp4
08:53
00058 Query Writing.mp4
06:43
00059 Email Analysis Part 1.mp4
09:31
00060 Email Analysis Part 2.mp4
07:56
00061 Permissions.mp4
08:50
00062 Firewalls.mp4
07:30
00063 Intrusion Prevention Rules.mp4
05:16
00064 DLP and Endpoint Detection.mp4
04:57
00065 Threat Hunting and the Hypothesis.mp4
06:26
00066 Threat Hunting Process.mp4
07:14
00067 Results and Benefits.mp4
04:54
00068 Workflow and Scripting.mp4
07:27
00069 API and Malware Signature Creation.mp4
07:46
00070 Threat Feeds and Machine Learning.mp4
06:02
00071 Protocols Standards and Software Engineering.mp4
05:15
00072 IR Roles and Responsibilities.mp4
07:38
00073 IR Active Preparation.mp4
09:41
00074 Incident Response Process.mp4
06:36
00075 Network Symptoms.mp4
03:30
00076 Host Symptoms.mp4
08:03
00077 Application Symptoms.mp4
04:23
00078 Digital Forensics.mp4
00:27
00079 Seizure and Acquisitions.mp4
04:52
00080 Forensics Acquisition Tools.mp4
08:52
00081 Mobile Virtualization and Cloud.mp4
05:51
00082 Forensics Analysis Part 1.mp4
04:24
00083 Forensics Analysis Part 2.mp4
07:46
00084 Packet Capture.mp4
11:36
00085 Data Privacy and Security.mp4
06:13
00086 Nontechnical Controls.mp4
08:47
00087 Technical Controls.mp4
07:48
00088 Business Impact Analysis.mp4
04:30
00089 Risk Identification.mp4
05:18
00090 Risk Calculation and Communication.mp4
06:10
00091 Training.mp4
03:59
00092 Supply Chain Assessment.mp4
04:12
00093 Frameworks.mp4
13:01
00094 Policies and Procedures.mp4
04:29
00095 Controls and Procedures.mp4
07:39
00096 Verification.mp4
06:11
More details
User Reviews
Rating
average 0
Focused display
Category

O'Reilly
View courses O'ReillyO'Reilly Media is an American learning company established by Tim O'Reilly that publishes books, produces tech conferences, and provides an online learning platform. Its distinctive brand features a woodcut of an animal on many of its book covers.
- language english
- Training sessions 96
- duration 11:17:05
- Release Date 2023/03/09