Author
Released
3/21/2018We are a CompTIA Content Publishing Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.
- The goals of information security
- Risk assessment and risk management
- Ongoing risk management
- Security zones
- Network security techniques
- Securing endpoints
- Threat intelligence
- Correlating security event information
- Logging and SIEM technology
- Planning, designing, and executing a penetration test
- Reverse engineering software and hardware
Skill Level Intermediate
Duration
Views
- [Mike] Hi, I'm Mike Chapple and I've like to welcome you to our Cybersecurity Analyst Plus course on threat management. As we work our way through this course, we will focus on each topic covered by the first CSA Plus domain. You'll learn how to apply environmental reconnaissance techniques and scan systems and networks. You'll also learn how to analyze the results of network reconnaissance, how to implement appropriate countermeasures for network-based threats and how to analyze the common security practices used to secure a corporate computing environment.
The information that you learn in this course will help you pass the CSA Plus exam and also provide a critical foundation for your career in cybersecurity. In addition to the information I cover in this course, I encourage you to visit my website at certmike.com and join my free study group. I'll send you exam tips, practice test questions and reminders to help keep you on track with your test preparation. Let's get rolling.
Related Courses
-
Ethical Hacking: Penetration Testing
with Lisa Bock1h 29m Intermediate
-
Introduction
-
Welcome1m 8s
-
-
1. Overview of the Role of a Cybersecurity Analyst
-
2. Cybersecurity Threats and Controls
-
Risk assessment5m 20s
-
Risk management3m 41s
-
Audits and assessments5m 46s
-
Control management3m 44s
-
Ongoing risk management2m 34s
-
Risk management frameworks3m 43s
-
-
3. Networking Technologies
-
Security zones3m 23s
-
Introducing TCP/IP5m 16s
-
IP addresses3m 32s
-
Subnetting3m 47s
-
Port isolation1m 48s
-
DNS4m 4s
-
ICMP3m 32s
-
Security device placement6m 39s
-
-
4. Network Security Techniques
-
Restricting network access2m 39s
-
Network access control4m 29s
-
Firewall rule management4m 42s
-
Isolating sensitive systems2m 19s
-
Deception technologies3m 3s
-
Web security tools4m 28s
-
-
5. Monitoring
-
Network monitoring4m 20s
-
SNMP3m 18s
-
-
6. Securing Endpoints
-
Operating system security7m 33s
-
System hardening8m 58s
-
Malware prevention9m 14s
-
Application management6m 7s
-
Microsoft EMET3m 38s
-
Command line network tools14m 56s
-
Sysinternals5m 16s
-
-
7. Environmental Reconnaissance
-
Social engineering6m 6s
-
Threat intelligence2m 41s
-
DNS harvesting5m 30s
-
Network scanning7m 17s
-
Protocol analyzers9m 23s
-
Wireless reconnaissance7m 41s
-
-
8. Security Analytics
-
Monitor log files5m 35s
-
Logging and SIEM technology3m 26s
-
Network traffic analysis3m 47s
-
-
9. Penetration Testing
-
Exploitation frameworks7m 21s
-
Interception proxies5m 22s
-
Training and exercises2m 21s
-
10. Reverse Engineering
-
Reverse engineering hardware2m 48s
-
Conclusion
-
What's next?35s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Welcome