Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA CySA+ (CS0-003) Complete Course
Training Overview
Description of Training
Introduction
Introduction (13:22)
Download the Study Guide
Exam Tips (4:31)
Quiz 1: Introduction
Identify Security Control Types
Cybersecurity Roles and Responsibilities (OBJ. 2.5) (6:44)
Identify Security Control Types (OBJ. 2.5) (1:25)
Security Operations Center (SOC) (OBJ. 2.5) (4:59)
Security Control Categories (OBJ. 2.5) (18:20)
Selecting Security Controls (OBJ. 2.5) (4:59)
Quiz 2: Identify Security Control Types
Threat Intelligence Sharing
Threat Intelligence Sharing (OBJ. 1.4) (1:14)
Security and Threat Intelligence (OBJ. 1.4) (5:13)
Intelligence Cycle (OBJ. 1.4) (9:43)
Intelligence Sources (OBJ. 1.4) (9:16)
Information Sharing and Analysis Centers (ISACS) (OBJ. 1.4) (4:25)
Threat Intelligence Sharing (OBJ. 1.4) (4:53)
Quiz 3: Threat Intelligence
Classifying Threats
Threat Classification (OBJ. 1.4) (9:07)
Classifying Threats (OBJ. 1.3, 1.4, 2.3, & 3.1) (1:53)
Threat Actors (OBJ. 1.4) (13:47)
Malware (OBJ. 1.4 & 2.3) (7:47)
Threat Research (OBJ. 1.4) (11:00)
Attack Frameworks (OBJ. 3.1) (11:12)
Indicator Management (OBJ. 1.4) (6:39)
Quiz 4: Classifying Threats
Threat Hunting
Threat Modeling (OBJ. 1.4 & 2.5) (8:20)
Threat Hunting (OBJ. 1.3, 1.4, & 2.5) (2:07)
Threat Hunting (OBJ. 1.4 & 2.5) (6:54)
Open-source Intelligence (OBJ. 1.4) (3:39)
Google Hacking (OBJ. 1.4) (7:40)
Profiling Techniques (OBJ. 1.4) (5:27)
Harvesting Techniques (OBJ. 1.3) (3:30)
AbuseIPDB (OBJ. 1.3) (3:34)
Deep Web and Dark Web (OBJ. 1.4) (4:11)
Bug Bounty (OBJ. 1.4) (3:13)
Quiz 5: Threat Hunting
Network Forensics
Network Forensic Tools (OBJ. 1.3) (4:16)
Network Forensics (OBJ. 1.3) (1:32)
tcpdump (OBJ. 1.3) (7:50)
Wireshark (OBJ. 1.3) (10:57)
Flow Analysis (OBJ. 1.3) (6:18)
IP and DNS Analysis (OBJ. 1.3) (6:33)
Conduct Packet Analysis (OBJ. 1.3) (6:03)
Quiz 6: Network Forensics
Appliance Monitoring
Firewall Logs (OBJ. 1.1 & 1.3) (11:24)
Appliance Monitoring (OBJ. 1.1 & 1.3) (1:32)
Firewall Configurations (OBJ. 1.1) (18:58)
Proxy Logs (OBJ. 1.3) (6:25)
Web Application Firewall Logs (OBJ. 1.3) (2:46)
IDS and IPS Configuration (OBJ. 1.3) (6:36)
IDS and IPS Logs (OBJ. 1.3) (8:57)
Port Security Configuration (OBJ. 1.1) (5:37)
NAC Configuration (OBJ. 1.1) (6:49)
Analysis of Security Appliances (OBJ. 1.3) (15:41)
Quiz 7: Appliance Monitoring
Endpoint Monitoring
Endpoint Analysis (OBJ. 1.3) (5:47)
Endpoint Monitoring (OBJ. 1.1 & 1.3) (2:08)
Sandboxing (OBJ. 1.3) (7:22)
Reverse Engineering (OBJ. 1.3) (11:15)
Malware Exploitation (OBJ. 1.3) (7:50)
Behavior Analysis (OBJ. 1.1 & 1.3) (11:35)
Malware Analysis (demo) (OBJ. 1.3) (25:39)
EDR Configuration (OBJ. 1.3) (4:56)
Block Lists and Allow Lists (OBJ. 1.1) (10:43)
Quiz 8: Endpoint Monitoring
Email Monitoring
Email IOCs (OBJ. 1.3) (5:21)
Email Monitoring (OBJ. 1.3) (1:44)
Email Header Analysis (OBJ. 1.3) (11:11)
Email Content Analysis (OBJ. 1.3) (3:38)
Email Server Security (OBJ. 1.3) (8:04)
SMTP Log Analysis (OBJ. 1.3) (5:20)
Email Message Security (OBJ. 1.3) (6:28)
Analyzing Email Headers (OBJ. 1.3) (4:14)
Quiz 9: Email Monitoring
Configuring Your SIEM
SIEM (OBJ. 1.3) (8:50)
Configuring Your SIEM (OBJ. 1.1 & 1.3) (1:42)
Security Data Collection (OBJ. 1.1 & 1.3) (5:05)
Data Normalization (OBJ. 1.1) (7:41)
Event Log (OBJ. 1.1 & 1.3) (3:35)
Syslog (OBJ. 1.1 & 1.3) (6:26)
Configuring a SIEM Agent (OBJ. 1.3) (19:52)
Quiz 10: Configuring Your SIEM
Analyzing Your SIEM
SIEM Dashboards (OBJ. 1.3 & 4.1) (11:44)
Analyzing Your SIEM (OBJ. 1.3 & 4.1) (1:55)
Analysis and Detection (OBJ. 1.3) (7:14)
Trend Analysis (OBJ. 1.3) (10:05)
Rule and Query Writing (OBJ. 1.3) (4:42)
Searching and Piping Commands (OBJ. 1.3) (18:06)
Scripting Tools (OBJ. 1.3) (9:24)
Analyzing, Filtering, and Searching Logs (OBJ. 1.3) (7:23)
Quiy 11: Analyzing Your SIEM
Digital Forensics
Digital Forensic Analysts (OBJ. 3.2) (4:50)
Digital Forensics (OBJ. 3.2) (3:14)
Forensics Procedures (OBJ. 3.2) (9:16)
Work Product Retention (OBJ. 3.2) (2:50)
Data Acquisition (OBJ. 3.2) (4:58)
Forensics Tools (OBJ. 3.2) (7:11)
Memory Acquisition (OBJ. 3.2) (5:23)
Disk Image Acquisition (OBJ. 3.2) (11:54)
Hashing (OBJ. 1.3 & 3.2) (4:48)
Timeline Generation (OBJ. 3.2) (4:46)
Carving (OBJ. 3.2) (5:41)
Chain of Custody (OBJ. 3.2) (5:51)
Collecting and Validating Evidence (OBJ. 3.2) (9:06)
Quiz 12: Digital Forensics
Analyzing Network IOCs
Analyzing Network IOCs (OBJ. 1.2) (2:14)
Analyzing Network IOCs (OBJ. 1.2) (1:50)
Traffic Spikes (OBJ. 1.2) (18:00)
Beaconing (OBJ. 1.2) (13:40)
Irregular P2P Communications (OBJ. 1.2) (7:55)
Nonstandard Port Usage (OBJ. 1.2) (11:25)
TCP Ports (OBJ. 1.2) (7:57)
UDP Ports (OBJ. 1.2) (7:02)
Data Exfiltration (OBJ. 1.2) (6:22)
Covert Channels (OBJ. 1.2) (7:34)
Analysis of Network IOCs (OBJ. 1.2) (12:33)
Quiz 13: Analyzing Network IOCs
Analyzing Host-related IOCs
Host-related IOCs (OBJ. 1.2) (1:40)
Analyzing Host-related IOCs (OBJ. 1.2) (1:16)
Malicious Processes (OBJ. 1.2) (10:00)
Memory Forensics (OBJ. 1.2) (7:12)
Consumption (OBJ. 1.2) (9:00)
Disk and File System (OBJ. 1.2) (11:23)
Unauthorized Privilege (OBJ. 1.2) (5:14)
Unauthorized Software (OBJ. 1.2) (5:48)
Unauthorized ChangeHardware (OBJ. 1.2) (2:52)
Persistence (OBJ. 1.2) (10:01)
Quiz 14: Analyzing Host-related IOCs
Analyzing Application-related IOCs
Analyzing Application-related IOCs (OBJ. 1.2 & 3.2) (1:27)
Application-related IOCs (OBJ. 1.2) (1:37)
Anomalous Activity (OBJ. 1.2) (4:06)
Service Interruptions (OBJ. 1.2) (5:05)
Application Logs (OBJ. 1.2) (12:37)
New Accounts (OBJ. 1.2) (5:37)
Virtualization Forensics (OBJ. 3.2) (5:56)
Mobile Forensics (OBJ. 3.2) (11:32)
Quiz 15: Analyzing Application-related IOCs
Analyzing Lateral Movement and Pivoting IOCs
Analyzing Lateral Movement and Pivoting IOCs (OBJ. 1.2) (1:17)
Lateral Movement and Pivoting (OBJ. 1.2) (3:21)
Pass the Hash (OBJ. 1.2) (10:11)
Golden Ticket (OBJ. 1.2) (7:09)
Lateral Movement (OBJ. 1.2) (6:39)
Pivoting (OBJ. 1.2) (6:03)
Quiz 16: Analyzing Lateral Movement and Pivoting IOCs
Incident Response Preparation
Incident Response Preparation (OBJ. 3.3 & 4.2) (2:44)
Incident Response Phases (OBJ. 3.3) (11:09)
Documenting Procedures (OBJ. 3.3) (7:12)
Data Criticality (OBJ. 3.3) (13:49)
Communication Plan (OBJ. 3.3 & 4.2) (7:07)
Reporting Requirements (OBJ. 3.3) (4:53)
Response Coordination (OBJ. 3.3) (7:27)
Business Continuity Plan (OBJ. 3.3) (13:42)
Training and Testing (OBJ. 3.3) (6:40)
Quiz 17: Incident Response Preparation
Detection and Containment
Detection and Containment (OBJ. 3.2) (1:28)
OODA Loop (OBJ. 3.2) (5:43)
Defensive Capabilities (OBJ. 3.2) (4:46)
Detection and Analysis (OBJ. 3.2) (6:44)
Impact Analysis (OBJ. 3.2) (7:50)
Incident Classification (OBJ. 3.2) (5:57)
Quiz 18: Detection and Containment
Containment, Eradication, Recovery, and Post-incident Actions
CER and Post-incident Actions (OBJ. 3.2, 3.3, & 4.2) (2:01)
Containment (OBJ. 3.2) (6:25)
Eradication (OBJ. 3.2) (6:18)
Eradication Actions (OBJ. 3.2) (4:29)
Recovery (OBJ. 3.2) (2:44)
Recovery Actions (OBJ. 3.2) (6:26)
Post-Incident Activities (OBJ. 3.3 & 4.2) (5:57)
Lessons Learned (OBJ. 3.3 & 4.2) (7:08)
Root Cause Analysis (OBJ. 3.3 & 4.2) (4:24)
Quiz 19: Containment, Eradication, Recovery, and Post-incident Actions
Risk Mitigation
Risk Identification Process (OBJ. 2.5 & 4.1) (7:55)
Risk Mitigation (OBJ. 2.5 & 4.1) (1:42)
Conducting an Assessment (OBJ. 2.5) (8:55)
Risk Calculation (OBJ. 2.5) (18:17)
Business Impact Analysis (OBJ. 2.5) (12:28)
Risk Prioritization (OBJ. 2.5) (16:56)
Communicating Risk (OBJ. 2.5 & 4.1) (8:07)
Training and Exercises (OBJ. 2.5) (4:59)
Quiz 20: Risk Mitigation
Frameworks, Policies, and Procedures
Enterprise Security Architecture (OBJ. 2.1) (2:43)
Frameworks, Policies, and Procedures (OBJ. 2.1 & 3.1) (1:16)
Prescriptive Frameworks (OBJ. 2.1) (4:30)
Risk-based Frameworks (OBJ. 2.1) (4:29)
Industry Frameworks (OBJ. 2.1 & 3.1) (15:13)
Audits and Assessments (OBJ. 2.1) (7:11)
Continuous Monitoring (OBJ. 2.1) (5:12)
Quiz 21: Frameworks, Policies, and Procedures
Enumeration Tools
Enumeration Tools (OBJ. 2.1 & 2.2) (1:41)
Enumeration Tools (OBJ. 2.1 & 2.2) (7:35)
Nmap Discovery Scans (OBJ. 2.2) (8:36)
Nmap Port Scans (OBJ. 2.2) (6:01)
Nmap Port States (OBJ. 2.2) (3:43)
Nmap Fingerprinting Scans (OBJ. 2.2) (4:19)
Using Nmap (OBJ. 2.2) (11:21)
Hping (OBJ. 2.2) (5:41)
Angry IP Scanner (OBJ. 2.2) (3:49)
Maltego (OBJ. 2.2) (3:28)
Responder (OBJ. 2.2) (1:36)
Wireless Assessment Tools (OBJ. 2.2) (5:31)
Recon-ng (OBJ. 2.2) (21:47)
Hashcat (OBJ. 2.2) (3:17)
Testing Credential Security (OBJ. 2.2) (2:36)
Quiz 22: Enumeration Tools
Vulnerability Scanning
Identifying Vulnerabilities (OBJ. 2.1) (3:37)
Vulnerability Scanning (Introduction) (OBJ. 2.1 & 2.2) (1:40)
Scanning Workflow (OBJ. 2.1) (6:45)
Scope Considerations (OBJ. 2.1) (8:09)
Scanner Types (OBJ. 2.1) (9:00)
Scanning Parameters (OBJ. 2.1) (6:16)
Scheduling and Constraints (OBJ. 2.1) (8:52)
Vulnerability Feeds (OBJ. 2.1) (3:21)
Scan Sensitivity (OBJ. 2.1) (5:07)
Scanning Risks (OBJ. 2.1) (2:52)
Conducting Scans (OBJ. 2.1 & 2.2) (31:25)
Quiz 23: Vulnerability Scanning
Analyzing Output from Vulnerability Scanners
Scan Reports (OBJ. 2.3 & 4.1) (3:21)
Analyzing Output from Vulnerability Scanners (OBJ. 2.1, 2.3, & 4.1) (2:02)
Common Identifiers (OBJ. 2.3) (6:31)
CVSS (OBJ. 2.3) (8:24)
Interpreting CVSS (OBJ. 2.3) (9:45)
Vulnerability Reports (OBJ. 2.1 & 2.3) (11:02)
Nessus (OBJ. 2.2) (6:54)
OpenVAS and Qualys (OBJ. 2.2) (3:10)
Assessing Scan Outputs (OBJ. 2.2 & 2.3) (13:37)
Quiz 24: Analyzing Output from Vulnerability Scanners
Mitigating Vulnerabilities
Remediation and Mitigation (OBJ. 2.5) (6:28)
Mitigating Vulnerabilities (OBJ. 2.1, 2.5, & 4.1) (1:37)
Configuration Baselines (OBJ. 2.1 & 2.5) (4:17)
Hardening and Patching (OBJ. 2.5) (11:05)
Remediation Issues (OBJ. 2.5 & 4.1) (8:35)
Quiz 25: Mitigating Vulnerabilities
Identity and Access Management Solutions
Identity and Access Management Solutions (OBJ. 1.1) (1:52)
Identity and Access Management (OBJ. 1.1) (7:08)
Password Policies (OBJ. 1.1) (6:10)
SSO and MFA (OBJ. 1.1) (5:40)
Certificate Management (OBJ. 1.1) (3:54)
Federation (OBJ. 1.1) (5:19)
Passwordless Authentication (OBJ. 1.1) (5:17)
Privilege Management (OBJ. 1.1) (5:52)
IAM Auditing (OBJ. 1.1) (6:13)
Conduct and Use Policies (OBJ. 1.1) (3:27)
Account and Permissions Audits (OBJ. 1.1) (4:33)
Quiz 26: Identity and Access Management Solutions
Network Architecture and Segmentation
Network Architecture and Segmentation (OBJ. 1.1, 1.4, & 2.5) (2:02)
Asset and Change Management (OBJ. 2.5) (10:06)
Network Architecture (OBJ. 1.1) (11:23)
Segmentation (OBJ. 1.1) (6:01)
Jumpbox (OBJ. 1.1) (5:04)
Virtualization (OBJ. 1.1) (5:50)
Virtualized Infrastructure (OBJ. 1.1) (6:35)
Honeypots (OBJ. 1.4) (6:25)
Zero Trust (OBJ. 1.1) (6:37)
Configuring Network Segmentation (OBJ. 1.1) (10:06)
Quiz 27: Network Architecture and Segmentation
Hardware Assurance Best Practices
Supply Chain Assessment (OBJ. 1.4) (5:24)
Hardware Assurance Best Practices (OBJ. 1.4 & 2.4) (1:47)
Root of Trust (OBJ. 2.4) (4:35)
Trusted Firmware (OBJ. 2.4) (4:55)
Secure Processing (OBJ. 2.4) (4:02)
Quiz 28: Hardware Assurance Best Practices
Specialized Technology
Specialized Technology (OBJ. 2.1 & 2.4) (1:40)
Mobile Vulnerabilities (OBJ. 2.1 & 2.4) (12:00)
IoT Vulnerabilities (OBJ. 2.1 & 2.4) (3:29)
Embedded System Vulnerabilities (OBJ. 2.1 & 2.4) (6:52)
ICS & SCADA Vulnerabilities (OBJ. 2.1 & 2.4) (8:19)
Mitigating Vulnerabilities (OBJ. 2.1 & 2.4) (3:29)
Premise System Vulnerabilities (OBJ. 2.1 & 2.4) (6:13)
Vehicular Vulnerabilities (OBJ. 2.1 & 2.4) (6:53)
Quiz 29: Specialized Technology
Non-technical Data and Privacy Controls
Data Classification (OBJ. 2.5) (9:13)
Non-technical Data and Privacy Controls (OBJ. 1.1 & 2.5) (2:47)
Data Types (OBJ. 1.1 & 2.5) (3:19)
Legal Requirements (OBJ. 1.1 & 2.5) (9:16)
Data Policies (OBJ. 2.5) (5:31)
Data Retention (OBJ. 2.5) (6:59)
Data Ownership (OBJ. 2.5) (4:06)
Data Sharing (OBJ. 2.5) (5:46)
Quiz 30: Non-technical Data and Privacy Controls
Technical Data and Privacy Controls
Access Controls (OBJ. 1.1) (3:03)
Technical Data and Privacy Controls (OBJ. 1.1) (1:23)
File System Permissions (OBJ. 1.1) (10:10)
Encryption (OBJ. 1.1) (3:16)
Data Loss Prevention (OBJ. 1.1) (4:23)
DLP Discovery and Classification (OBJ. 1.1) (3:58)
Deidentification Controls (OBJ. 1.1) (6:30)
DRM and Watermarking (OBJ. 1.1) (4:11)
Analyzing Share Permissions (OBJ. 1.1) (3:38)
Quiz 31: Technical Data and Privacy Controls
Mitigate Software Vulnerabilities and Attacks
Mitigate Software Vulnerabilities and Attacks (OBJ. 2.4 & 2.5) (1:40)
SDLC Integration (OBJ. 2.5) (12:12)
Execution and Escalation (OBJ. 2.4) (6:22)
Overflow Attacks (OBJ. 2.4) (13:31)
Race Conditions (OBJ. 2.5) (5:49)
Improper Error Handling (OBJ. 2.5) (5:16)
Design Vulnerabilities (OBJ. 2.4) (4:16)
Platform Best Practices (OBJ. 2.5) (6:29)
Metasploit Framework (OBJ. 2.2) (18:48)
Quiz 32: Mitigate Software Vulnerabilities and Attacks
Mitigate Web Application Vulnerabilities and Attacks
Directory Traversal (OBJ. 2.4) (8:07)
Mitigate Web Application Vulnerabilities and Attacks (OBJ. 2.4 & 2.5) (1:35)
Cross-site Scripting (OBJ. 2.4) (8:03)
SQL Injection (OBJ. 2.4) (7:41)
XML Vulnerabilities (OBJ. 2.4) (5:09)
Secure Coding (OBJ. 2.5) (9:31)
Authentication Attacks (OBJ. 2.4 & 2.5) (7:08)
Session Hijacking (OBJ. 2.4 & 2.5) (6:55)
Server-Side Request Forgery (OBJ. 2.4) (4:25)
Sensitive Data Exposure (OBJ. 2.5) (3:19)
Clickjacking (OBJ. 2.4 & 2.5) (2:21)
Web Application Vulnerabilities (OBJ. 2.4 & 2.5) (8:43)
Quiz 33: Mitigate Web Application Vulnerabilities and Attacks
Analyzing Application Assessments
Software Assessments (OBJ. 2.1) (7:35)
Analyzing Application Assessments (OBJ. 2.1 & 2.2) (1:03)
Reverse Engineering (OBJ. 2.1) (9:34)
Dynamic Analysis (OBJ. 2.1) (7:56)
Web Application Scanners (OBJ. 2.2) (3:13)
Burp Suite (OBJ. 2.2) (10:34)
OWASP ZAP (OBJ. 2.2) (2:54)
Analyzing Web Applications (OBJ. 2.2) (15:42)
Quiz 34: Analyzing Application Assessments
Cloud and Automation
Cloud and Automation (OBJ. 1.1) (1:07)
Cloud Models (OBJ. 1.1) (16:00)
Service Models (OBJ. 1.1) (10:43)
Cloud-based Infrastructure (OBJ. 1.1) (7:22)
CASB (OBJ. 1.1) (4:27)
Quiz 35: Cloud and Automation
Service-Oriented Architecture
SOA and Microservices (OBJ. 1.1) (6:03)
Service-Oriented Architecture (OBJ. 1.1, 1.5, & 2.4) (2:12)
SOAP (OBJ. 1.5 & 2.5) (4:40)
SAML (OBJ. 1.5) (6:54)
REST (OBJ. 1.5) (10:15)
APIs, Webhooks, and Plugins (OBJ. 1.5) (11:46)
Scripting (OBJ. 1.3 & 1.5) (4:28)
Workflow Orchestration (OBJ. 1.5) (6:16)
FAAS and Serverless (OBJ. 1.1) (8:13)
Quiz 36: Service-Oriented Architecture
Cloud Infrastructure Assessments
Cloud Threats (OBJ. 1.1) (8:13)
Cloud Infrastructure Assessments (OBJ. 1.1 & 2.2) (1:20)
Cloud Forensics (OBJ. 1.1) (4:01)
Auditing the Cloud (OBJ. 2.2) (5:06)
Conducting Cloud Audits (OBJ. 2.2) (14:02)
Quiz 37: Cloud Infrastructure Assessments
Automation Concepts and Technologies
Automation Concepts and Technologies (OBJ. 1.5) (2:18)
CICD (OBJ. 1.5) (7:09)
DevSecOps (OBJ. 1.5) (4:50)
IAC (OBJ. 1.5) (4:22)
Machine Learning (OBJ. 1.5) (8:28)
Data Enrichment (OBJ. 1.5) (3:41)
SOAR (OBJ. 1.5) (3:19)
Standardized Processes (OBJ. 1.5) (4:03)
Single Pane of Glass (OBJ. 1.5) (5:59)
Quiz 38: Automation Concepts and Technologies
Practice Test: CompTIA CySA+ (CS0-003) Practice Test
Practice Test: CompTIA CySA+ (CS0-003) Practice Test
Conclusion
Conclusion (11:56)
Audio Version of Training
Audio Download
Data Criticality (OBJ. 3.3)
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock