Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA CySA+ / Certified Cyber Security Analyst
Training Overview
Description of Training
Video Overview (3:17)
Introduction
Introduction (3:17)
Threat Management
2. Threat Managment Introduction (3:18)
3. Footprinting (14:12)
4. Email Harvest (9:51)
5. Google Hacking (10:36)
6. MetaGoofil (10:18)
7.People Search Engine (6:13)
8. Internet Archives and Alerts (7:04)
9. Maltego (8:40)
10. Using Maltego (8:14)
11. Related Entities in Maltego (3:51)
12. More Maltego (6:05)
13. Important Scanning Defination (13:19)
14. Identifying Live system (6:41)
15. Port Scanning (14:24)
16. Advanced Scanning Techniques (7:23)
17. Network Mapping (11:41)
Vulnerability Management
18. Vulnerability Management Introduction (11:29)
19. Penetration Testing Standards (11:29)
20. VA vs PT (11:29)
21. Types of PT (11:29)
22. Social Engineering PT (11:29)
23. Vulnerability Assessment (11:29)
24. Nessus Report 1 (13:25)
25. Nessus Report 2 (11:29)
26. OWASP ZAP VA (11:29)
27. Nexpose VA-1 (11:29)
28. Nexpose VA-2 (11:29)
29. Penetration Testing (11:29)
30. MetaSploit Pro 1 (14:32)
31. MetaSploit Pro 2 (11:29)
32. MetaSploit Pro 3 (11:29)
33. MetaSploit Community (11:29)
34. Armitage (11:20)
35. SQL Injection Introduction (11:20)
36. What is SQL Injection (11:20)
37. Is The Site Infected with SQL Injection (11:20)
38. The Amazing SQLMAP (11:20)
39. Live Example (11:20)
Cyber Incident Response
40. Incident Management 2 (11:25)
41. Incident Response Team (11:25)
42. Incident Report (11:25)
43. BCP - DRP (11:25)
44. Business Continuity Plan (14:37)
45. Business Impact Analysis 2 (11:25)
46. MTR - RTO - RPO (11:44)
47. Disaster Recovery Plan (11:25)
48. Alternative Sites (11:25)
Security Architecture
49. Common Security Architecture Frameworks (12:17)
50. Trusted Computing Base (11:16)
51. Security Models (17:08)
52. TCSEC (11:16)
53. ITSEC (11:16)
28. Nexpose VA-2
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock