Welcome to Expert Training The Online Course Shop!
-50%

CompTIA CySA+ (CS0?001) Course & PDF Guides

$6.00

Price: 6.00 USD | Size: 1.58 GB | 

BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD

SKU: XN-CMP-CYS-CS0 Category:

OR

Description

Price: 6.00 USD | Size: 1.58 GB | 

BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD

 

CompTIA CySA+ (CS0‑001) Course & PDF Guides

Content

01 – 1.0 Threat Management_ Vocabulary Related to Threats and Attacks

02 – 1.0 Threat Management_ Attack Categories, Types, and Vectors

03 – 1.0 Threat Management_ Reconnaissance and Footprinting Overview

04 – 1.0 Threat Management_ Using DNS for Reconnaissance

05 – 1.0 Threat Management_ Direct Network Scanning Overview

06 – 1.0 Threat Management_ Direct Network Scanning Methodology

07 – 1.0 Threat Management_ Port Discovery Overview

08 – 1.0 Threat Management_ OS and App Fingerprinting

09 – 1.0 Threat Management_ Using NMAP for Host, Port, and OS Discovery_ VLab

10 – 1.0 Threat Management_ Vulnerability Scanning Tools

11 – 1. Threat Management_ Vulnerability Scan Scenario

12 – 1. Threat Management_ Network Mapping

13 – 1. Threat Management_ Understanding System Hacking

14 – 1. Threat Management_ Honeypot Overview

15 – 1. Threat Management_ Using a Network Scanner To See a Honeypot

16 – 1. Threat Management_ Social Engineering Overview

17 – 1. Threat Management_ Phases and Methods of Social Engineering

18 – 1. Threat Management_ Phishing Overview

19 – 1. Threat Management_ Defending Against Phishing

20 – 1. Threat Management_ Packet Capture and Analysis Overview

21 – 1. Threat Management_ Practicing Packet Capture and Protocol Analysis_ VLab

22 – 1. Threat Management_ Logging Overview

23 – 1. Threat Management_ Firewall_Router ACL Review

24 – 1. Threat Management_ Trend Awareness

25 – 1. Threat Management_ Hardening and Other Best Practices

26 – 1. Threat Management_ Whitelisting and Access Control

27 – 1. Threat Management_ Evaluating Risk

28 – 1. Threat Management_ Network Access Control (NAC)

29 – 1. Threat Management_ Uncovering Vulnerabilities

30 – 2. Vulnerability Management_ Motivators for Vulnerability Management

31 – 2. Vulnerability Management_ SCAP Overview

32 – 2. Vulnerability Management_ What to Ask When Doing Focused Vulnerability Scanning

33 – 2. Vulnerability Management_ Remediation Considerations

34 – 2. Vulnerability Management_ Review and Interpret Output_ Web Server Version

35 – 2. Vulnerability Management_ Analyzing Vulnerability Scan Output_ Enumeration of Shares

36 – 2. Vulnerability Management_ Vulnerabilities in Servers

37 – 2. Vulnerability Management_ Vulnerabilities in Endpoints

38 – 2. Vulnerability Management_ Vulnerabilities in Infrastructure Devices

39 – 2. Vulnerability Management_ Vulnerabilities in Mobile Devices_ Weak Policy

40 – 2. Vulnerability Management_ Vulnerabilities in Mobile Devices_ Traveling

41 – 2. Vulnerability Management_ Vulnerabilities in Mobile Devices_ Remote Wipe

42 – 2. Vulnerability Management_ Vulnerabilities Regarding Interconnected Networks

43 – 2. Vulnerability Management_ Physical and Virtual Device Vulnerabilities

44 – 2. Vulnerability Management_ Using ACLs and VPNs to Reduce Vulnerabilities

45 – 3. Cyber Incident Response_ Threat Classification

46 – 3. Cyber Incident Response_ Factors Contributing to Incident Severity and Prioritization

47 – 3. Cyber Incident Response_ Building a Forensic Tool Kit

48 – 3. Cyber Incident Response_ Tool Categories in a Forensic Investigation Suite

49 – 3. Cyber Incident Response_ Communication During an Incident Response

50 – 3. Cyber Incident Response_ Abnormal Traffic Patterns that May Indicate a Cyber Incident

51 – 3. Cyber Incident Response_ Network Scans as a Symptom of a Cyber Incident

52 – 3. Cyber Incident Response_ Host-Related Cybersecurity Symptoms

53 – 3. Cyber Incident Response_ Application-Related Cyber Incident Symptoms

54 – 3. Cyber Incident Response_ Containment and Eradication Techniques

55 – 3. Cyber Incident Response_ Validation of Post-Incident Remediation

56 – 3. Cyber Incident Response_ Corrective Actions, Updates, and Reports

57 – 4.0 Security Architecture_ Security Frameworks for IT

58 – 4.0 Security Architecture_ Regulatory Compliance and Control Types

59 – 4.0 Security Architecture_ Verification and Validation of Controls

60 – 4.0 Security Architecture_ Having Policies to Improve Security

61 – 4.0 Security Architecture_ Having Procedures to Improve Security

62 – 4.0 Security Architecture_ Identity Context and Repositories

63 – 4.0 Security Architecture_ SSO and Federations

64 – 4.0 Security Architecture_ Exploits Related to Identity and Access

65 – 4.0 Security Architecture_ Recommending Compensating Controls

66 – 4.0 Security Architecture_ Best Practices During Software Development

67 – 4.0 Security Architecture_ Secure Coding Best Practices

68 – 4.0 Security Architecture_ Identifying Preventive Tools and Technologies

69 – 4.0 Security Architecture_ Selecting and Applying Appropriate Preventive Tools

70 – 4.0 Security Architecture_ Tools and Technologies for Information Collection

71 – 4.0 Security Architecture_ Tools and Tech for Analysis, Exploits, and Forensics

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

×
×

Cart