This Course is part of a Career Path: Become a Cyber Defense Incident Responder

Course Content

Module 1: Course Introduction

01:49
1.1 CYSA Course Introduction

Module 2: Threat Management

15:57
2.1 Reconnaissance
20:51
2.2 Port Scanning for Active Reconnaissance
13:57
2.3 Environmental Reconnaissance Tools
15:01
2.4 Social Engineering for Reconnaissance
17:28
2.5 Network Mapping for Active Reconnaissance
15:04
2.6 Syslog
09:19
2.7 Reviewing Alerts:Detecting Attack Phases
03:53
2.8 Common Tasks in Environmental Reconnaissance
05:20
2.9 Environmental Reconnaissance Variables
08:18
2.10 Basic Packet Analysis
07:47
2.11 Methods of Network Traffic Analysis
16:20
2.12 Network Traffic Analysis
14:37
2.13 Netflows
07:51
2.14 Working with Netflows
08:31
2.15 Netflow Tools
13:03
2.16 Examining Log Files
03:38
2.17 Data Correlation and Analytics
05:34
2.18 Analyzing Device Data
08:44
2.19 SIEM
06:30
2.20 DEMO- Wireshark Packet Analyzer
21:13
2.21 Hardening Network Devices
10:49
2.22 Network Segmentation and Design
13:30
2.23 Honeypot
20:19
2.24 Endpoint Security
05:40
2.25 Windows Group Policy
23:56
2.26 Access Control Models
13:52
2.27 Remote Authentication - Radius and Tacacs+
14:16
2.28 Hardening Host and Networked Systems
11:17
2.29 Compensating Controls
21:15
2.30 Corporate Penetration Testing
18:52
2.31 Reverse Engineering Purpose and Practice
04:08
2.32 Team Training and Exercises
07:17
2.33 Risk Evaluation and Security Controls

Module 3: Cyber Incident Response

06:16
3.1 Malware and Social Engineering Threats
08:58
3.2 Preparing for Impact Analysis
04:20
3.3 Forensics Kit and Incident Response
04:16
3.4 Forensic Investigation Suite
02:58
3.5 Setting Up an Analysis Environment
03:44
3.6 Communication During Incident Response
06:27
3.7 Common Symptoms of Host Infection
24:01
3.8 Incident Response and Recovery Part 1 of 2
14:28
3.9 Incident Response and Recovery Part 2 of 2

Module 4: Security Architecture and Tool Sets

04:35
4.1 Regulatory Compliance and Frameworks
10:50
4.2 Control Selection Tailoring and Implementation
06:02
4.3 Verification and Quality Control
04:41
4.4 Procedures Supporting Policy
11:00
4.5 Enterprise Network Authentication Part 1 of 2
18:25
4.6 Enterprise Network Authentication Part 2 of 2
13:06
4.7 Cross-site Scripting and Other Exploits
06:40
4.8 Privilege Escalation Exploit
09:36
4.9 Technical Processes and Controls
12:46
4.10 Software Development Models and SDLC
13:06
4.11 Code Review and Testing
05:11
4.12 Secure Coding Best Practice Resources
03:56
4.13 Preventative Cyber Tools
06:58
4.14 Collective Cyber Tools
03:48
4.15 Analytical Cyber Tools
03:20
4.16 Exploit Cyber Tools
04:02
4.17 Forensics Cyber Tools

Course Description

This intermediate-level CySA course focuses on analysis and defense techniques leveraging data and tools to identify risks to an organization, and apply effective mitigation strategies. They CySA+ is an approved baseline certification of the DoD Directive 8570. Learning objectives: Provide a review of the following four skills: threat management, vulnerability management, security architecture and tool sets, and cyber incident response.- Supplemental self-study preparation resource for the CompTIA CySA+ exam.

  • Understand how to configure and use threat detection tools, perform data analysis, identify vulnerabilities, threats and risks, and secure and protect applications and systems within an organization.

    Training Purpose: - Certification Prep

    Security Domains: - Protect and Defend

  • Operate and Maintain
  • Securely Provision

    Specialty Areas:- Vulnerability Assessment and Management

  • Systems Analysis
  • Cyber Defense Analysis

    Proficiency Area: - Intermediate

Upon completion of this course you can purchase and schedule your CompTIA CySA+ exam here