Companies Home Search Profile

Total Comptia Cysaplus Cybersecurity Analyst Cs0-002

Focused View

11:17:05

64 View
  • 00001 Welcome to the Course.mp4
    02:01
  • 00002 All About the Exam.mp4
    08:14
  • 00003 What s New in the CompTIA CySA+ Exam.mp4
    04:51
  • 00004 Meet the Instructors.mp4
    02:21
  • 00005 Thinking Like the Enemy.mp4
    09:16
  • 00006 Tools of the Trade.mp4
    07:31
  • 00007 Intelligence Sources and Confidence Levels.mp4
    07:57
  • 00008 Threat Indicators and Actors.mp4
    07:59
  • 00009 Threat Trends.mp4
    06:50
  • 00010 Intelligence Cycle and ISACs.mp4
    06:16
  • 00011 Attack Frameworks.mp4
    06:15
  • 00012 Threat Research.mp4
    11:09
  • 00013 Threat Modelling and Intelligence Sharing.mp4
    05:33
  • 00014 Vulnerability Identification.mp4
    07:25
  • 00015 Scanning Parameters and Criteria.mp4
    09:13
  • 00016 Scanning Special Considerations.mp4
    05:36
  • 00017 Validation.mp4
    03:26
  • 00018 Remediation and Mitigation.mp4
    07:49
  • 00019 Inhibitors to Remediation.mp4
    06:59
  • 00020 Web Applications Scanners Part 1.mp4
    09:34
  • 00021 Web Applications Scanners Part 2.mp4
    05:12
  • 00022 Scanning.mp4
    05:45
  • 00023 Configuring and Executing Scans.mp4
    07:42
  • 00024 Vulnerability Scanning.mp4
    09:46
  • 00025 Reverse Engineering.mp4
    07:37
  • 00026 Enumeration.mp4
    06:21
  • 00027 Wireless Assessment Tools.mp4
    07:39
  • 00028 Cloud Assessment Tools.mp4
    03:36
  • 00029 Mobile and IoT.mp4
    09:48
  • 00030 Embedded and Firmware Systems RTOS SoC and FPGA.mp4
    09:18
  • 00031 Access and Vehicles Risk.mp4
    08:01
  • 00032 Automation and Control Risk.mp4
    10:03
  • 00033 Cloud Models.mp4
    06:38
  • 00034 Remote Service Invocation FaaS IaC API.mp4
    09:32
  • 00035 Cloud Vulnerabilities.mp4
    06:10
  • 00036 Injection and Overflow Attacks.mp4
    09:25
  • 00037 Authentication Attacks.mp4
    06:33
  • 00038 Exploits.mp4
    08:08
  • 00039 Application Vulnerabilities Part 1.mp4
    07:37
  • 00040 Application Vulnerabilities Part 2.mp4
    06:57
  • 00041 Network Architecture and Asset Management.mp4
    08:50
  • 00042 Protecting Your Territory.mp4
    04:49
  • 00043 Identity and Access Management.mp4
    11:17
  • 00044 Encryption and Active Defense.mp4
    08:26
  • 00045 Platforms.mp4
    07:00
  • 00046 SOA and DevSecOps.mp4
    08:44
  • 00047 Secure Software Development.mp4
    07:43
  • 00048 Best Coding Practices.mp4
    04:08
  • 00049 Trusted Hardware.mp4
    09:43
  • 00050 Hardware Encryption.mp4
    04:28
  • 00051 Hardware Security.mp4
    07:44
  • 00052 Data Analytics.mp4
    09:44
  • 00053 Endpoint Security.mp4
    07:32
  • 00054 Recon Results Part 1.mp4
    13:01
  • 00055 Recon Results Part 2.mp4
    04:47
  • 00056 Impact Analysis.mp4
    04:30
  • 00057 Collective Tools.mp4
    08:53
  • 00058 Query Writing.mp4
    06:43
  • 00059 Email Analysis Part 1.mp4
    09:31
  • 00060 Email Analysis Part 2.mp4
    07:56
  • 00061 Permissions.mp4
    08:50
  • 00062 Firewalls.mp4
    07:30
  • 00063 Intrusion Prevention Rules.mp4
    05:16
  • 00064 DLP and Endpoint Detection.mp4
    04:57
  • 00065 Threat Hunting and the Hypothesis.mp4
    06:26
  • 00066 Threat Hunting Process.mp4
    07:14
  • 00067 Results and Benefits.mp4
    04:54
  • 00068 Workflow and Scripting.mp4
    07:27
  • 00069 API and Malware Signature Creation.mp4
    07:46
  • 00070 Threat Feeds and Machine Learning.mp4
    06:02
  • 00071 Protocols Standards and Software Engineering.mp4
    05:15
  • 00072 IR Roles and Responsibilities.mp4
    07:38
  • 00073 IR Active Preparation.mp4
    09:41
  • 00074 Incident Response Process.mp4
    06:36
  • 00075 Network Symptoms.mp4
    03:30
  • 00076 Host Symptoms.mp4
    08:03
  • 00077 Application Symptoms.mp4
    04:23
  • 00078 Digital Forensics.mp4
    00:27
  • 00079 Seizure and Acquisitions.mp4
    04:52
  • 00080 Forensics Acquisition Tools.mp4
    08:52
  • 00081 Mobile Virtualization and Cloud.mp4
    05:51
  • 00082 Forensics Analysis Part 1.mp4
    04:24
  • 00083 Forensics Analysis Part 2.mp4
    07:46
  • 00084 Packet Capture.mp4
    11:36
  • 00085 Data Privacy and Security.mp4
    06:13
  • 00086 Nontechnical Controls.mp4
    08:47
  • 00087 Technical Controls.mp4
    07:48
  • 00088 Business Impact Analysis.mp4
    04:30
  • 00089 Risk Identification.mp4
    05:18
  • 00090 Risk Calculation and Communication.mp4
    06:10
  • 00091 Training.mp4
    03:59
  • 00092 Supply Chain Assessment.mp4
    04:12
  • 00093 Frameworks.mp4
    13:01
  • 00094 Policies and Procedures.mp4
    04:29
  • 00095 Controls and Procedures.mp4
    07:39
  • 00096 Verification.mp4
    06:11
  • TOTAL-CompTIA-CySA-Cybersecurity-Analyst-CS0-002-main.zip
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    O'Reilly Media is an American learning company established by Tim O'Reilly that publishes books, produces tech conferences, and provides an online learning platform. Its distinctive brand features a woodcut of an animal on many of its book covers.
    • language english
    • Training sessions 96
    • duration 11:17:05
    • Release Date 2023/03/09

    Courses related to Cyber Security