Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA Cybersecurity Analyst+ Certification Bundle (CySA+) with Practice Exam
01 Introduction
Did you watch these prerequisites?
Introduction - Cysa+ (1:45)
Resources
02 Identify Security Control Types
01 Identify Security Control Types (0:58)
02 Security Operations Center (4:15)
03 Security Control Category (13:48)
04 Selecting Security Controls (3:34)
02 Resources
03 Threat Intelligence
01 Threat Intelligence Sharing (0:59)
02 Security And Threat Intelligence (3:42)
03 Intelligence Cycle (8:48)
04 Intelligence Sources (7:00)
05 Information Sharing And Analysis Center (3:29)
06 Threat Intelligence Sharing (7:00)
Resources
04 Classifying Threats
01 Classifying Threats (1:23)
02 Threat Classification (4:34)
03 Threat Actors (12:34)
04 Malware (5:45)
05 Threat Research (6:57)
06 Attack Framework (10:12)
07 Indicator Management (5:10)
Resources
05 Threat Hunting
01 Threat Hunting (1:45)
02 Threat Modelling (6:39)
03 Threat Hunting (5:12)
04 Open-Source Intelligence (2:34)
05 Google Hacking (3:30)
06 AbuseIPDB (3:23)
07 Deep Web & Dark Web (5:28)
08 Bug Bounty (2:47)
Resources
06 Network Forensics
01 Network Forensics (0:38)
02 Network Forensic Tool (2:24)
03 Flow Analysis (3:22)
04 IP And DNS Analysis (5:01)
05 URL Analysis (8:04)
Resources
08 Endpoint Monitoring
01 Endpoint Monitoring (0:59)
02 Endpoint Analysis (4:16)
03 Sandboxing (6:20)
04 Reverse Engineering (4:48)
05 Malware Exploitation (7:16)
06 Allow List & Block List (7:27)
Resources
09 Email Monitoring
01 Email Monitoring (0:57)
02 Email IOCs (3:22)
03 Email Header Analysis (3:26)
04 Email Content Analysis (3:47)
05 Email Server Security (2:37)
06 SMTP Log Analysis (3:55)
07 Email Message Security (3:08)
Resources
10 Configuring Your SIEM
01 Configuring Your SIEM (0:59)
02 SIEM (8:18)
03 Security Data Collection (5:39)
04 Data Normalization (6:16)
05 Event Logs (5:01)
06 Syslog (6:12)
Resources
11 Analyzing Your SIEM
01 Analyzing Your SIEM (1:13)
02 SIEM Dashboards (5:33)
03 Analysis & Detection (7:09)
04 Trend Analysis (4:14)
05 Rules And Query Writing (3:21)
06 Scripting Tools (3:42)
Resources
12 Digital Forensics
01 Digital Forensics (1:09)
02 Digital Forensics Analysts (4:35)
03 Forensic Procedures (5:59)
04 Work Product Retention (2:15)
05 Data Acquisition (4:34)
06 Hashing (3:56)
07 Chain Of Custody (2:27)
Resources
13 Incident Response Preparation
01 Incident Response Preparation (1:56)
02 Incident Response Phases (10:33)
03 Documenting Procedures (3:25)
04 Communication Plan (3:24)
05 Reporting Requirements (4:38)
06 Response Coordination (6:29)
07 Business Continuity Plan (8:22)
08 Training And Testing (5:42)
Resources
14 Detection and Containment
01 Detection And Containment (0:53)
02 Defensive Capabilities (4:18)
03 Detection And Analysis (8:03)
04 Impact Analysis (4:34)
05 Incident Classification (6:22)
Resources
15 Cloud and Automation
01 Cloud And Automation (0:55)
02 Cloud Models (14:31)
03 Service Models (6:46)
04 Cloud-Based Infrastructure (5:51)
05 CASB (5:34)
Resources
16 Cloud Infrastructure Assessments
01 Cloud Infrastrucutre Assessments (1:05)
02 Cloud Threats (11:09)
03 Cloud Forensics (5:40)
04 Auditing The Cloud (5:25)
Resources
17 Automation Concepts and Technologies
01 Automation Concept And Technologies (2:48)
02 CI/CD (8:53)
03 DevSecOps (7:24)
04 IAC (5:32)
05 Data Enrichment (4:22)
06 SOAR (4:58)
07 Standardized Processes (5:40)
08 Single Pane Of Glass (8:53)
Resources
18 Non Technical Data and Privacy Control
01 Non-Technical Data And Privacy Controls- Script (3:42)
02 Data Classification (11:04)
03 Data Types (5:13)
04 Legal Requirements (13:37)
05 Data Policies (6:39)
06 Data Retention (9:43)
07 Data Ownership (6:23)
08 Data Sharing (9:13)
Resources
19 Technical Data and Privacy Controls
01 Technical Data And Privacy Controls (1:09)
02 Access Control (3:06)
03 File System Permissions (8:49)
04 Encryption (5:11)
05 Data Loss Prevention (6:10)
06 DLP Discovery And Classification (6:54)
07 DRM And Watermarking (2:52)
Resources
20 Mitigating Software Vulnerabilities
01 Mitigating Software Vulnerabilities (1:23)
02 SDLC Integration (17:39)
03 Execution And Escalation (8:35)
04 Overflow Attacks (9:14)
05 Race Conditions (7:43)
06 Improper Error Handling (5:17)
07 Design Vulnerability (6:59)
08 Platform Best Practices (10:46)
Resource
21 Mitigating Web Application Vulnerabilities
01 Mitigating Web Application Vulnerabilities (1:51)
02 Directory Traversal (10:08)
03 Cross-Site Scripting (9:20)
04 SQL Injection (6:46)
05 XML Vulnerabilities (5:55)
06 Secure Coding (8:59)
07 Authentication Attacks (10:00)
08 Session Hijacking (12:23)
09 Server-Site Request Forgery (7:36)
10 Sensitive Data Exposure (5:14)
11 Clickjacking (3:59)
Resources
22 Analyzing Application Assessments
01 Analyzing Application Assessments (0:44)
02 Software Assessments (6:17)
03 Reverse Engineering (9:53)
04 Dynamic Analysis (10:28)
05 Web Application Scanners (2:40)
06 Burp Suite (1:42)
07 OWASP ZAP (2:48)
Resources
23 Service Oriented Architecture
01 Service Oriented Architecture (2:08)
02 SOA And Microservices (8:55)
03 SOAP (7:21)
04 SAML (6:28)
05 REST (13:50)
06 API, Webhooks And Plugins (9:30)
07 Scripting (4:26)
08 Workflow Orchestration (8:22)
09 FaaS And Serverless (9:10)
Resources
24 Analyzing Host related IOCs
01 Analyzing Host Related IOCs (1:36)
02 Host-Related IOCs (1:54)
03 Malicious Processes (11:27)
04 Memory Forensics (3:34)
05 Consumption (9:04)
06 Disk And File System (12:51)
07 Unauthorized Privilege (7:49)
08 Unauthorized Software (6:15)
09 Unauthorized Change Or Hardware (4:16)
10 Persistence (12:55)
Resources
25 Analyzing Application related IOCs
01 Analyzing Application Related IOCs (1:52)
02 Application-Related IOCs (2:20)
03 Anomalous Activity (4:36)
04 Service Interruption (6:08)
05 New Accounts (5:22)
06 Virtualization Forensics (8:47)
07 Mobile Forensics (12:03)
Resources
26 Analyzing Lateral Movement and Pivoting IOCs
01 Analyzing Lateral Movement And Pivoting IOCs (1:39)
02 Lateral Movement And Pivoting (2:32)
03 Pass The Hash (11:31)
04 Golden Ticket (5:53)
05 Lateral Movement (7:59)
06 Pivoting (8:10)
Resources
27 Risk Mitigation
01 Risk Mitigation (2:02)
02 Risk Identification Process (10:04)
03 Conducting An Assessment (9:21)
04 Risk Calculation (16:55)
05 Business Impact Anallysis (14:57)
06 Risk Prioritization (14:34)
07 Communicating Risk (12:35)
08 Training And Exercises (8:11)
Resources
28 Mitigating Vulnerabilities
01 Mitigating Vulnerabilities (1:47)
02 Remediation And Mitigation- (10:15)
03 Configuration Baseline (5:14)
04 Hardening And Patching (14:33)
05 Remediation Issues (11:08)
Resources
Test Your Knowledge
Practice Exam
07 Unauthorized Privilege
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock