Author
Updated
4/3/2020Released
1/28/2020
As cybersecurity threats become more sophisticated and pervasive, the need for IT professionals with security analytics expertise has grown exponentially. Earning the CompTIA Cybersecurity Analyst (CySA+) certification shows potential employers that you understand how to tackle cybersecurity threats using a behavioral analytics-based approach. This course—the first installment in the CySA+ (CS0-002) Cert Prep series—can provide you with a foundational understanding of threat management practices, and prepare you for the Threat and Vulnerability Management domain of exam CS0-002. Instructor Mike Chapple includes coverage of cybersecurity threats, reconnaissance techniques, and attack frameworks. He also goes over a variety of malware threats and key cloud security topics.
We are a CompTIA Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.
We are a CompTIA Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.
Topics include:
- The goals of information security
- Assessing and classifying threats
- Managing threat indicators
- Conducting threat research
- Threat modeling
- Using attack frameworks to structure your work
- Advanced malware concepts, including rootkits
- Social engineering attacks
- Wireless reconnaissance techniques
- Security implications of the DevOps approach
- Cloud security risks
Skill Level Advanced
2h 26m
Duration
10,164
Views
Show More
Show Less
Resume Transcript Auto-Scroll
Related Courses
-
Threat Modeling: Spoofing In Depth
with Adam Shostack55m 24s Intermediate -
Threat Modeling: Tampering in Depth
with Adam Shostack32m 13s Intermediate -
Learning Threat Modeling for Security Professionals
with Adam Shostack41m 41s Intermediate -
Threat Modeling: Information Disclosure in Depth
with Adam Shostack29m 23s Intermediate
-
Introduction
-
1. Overview of the Role of a Cybersecurity Analyst
-
2. Understanding the Cybersecurity Threat
-
Threat actors2m 39s
-
Zero-days and the APT3m 40s
-
Threat classification4m 5s
-
-
3. Threat Intelligence
-
Threat intelligence3m 7s
-
Intelligence cycle3m 13s
-
Managing threat indicators4m 12s
-
Intelligence sharing2m 31s
-
-
4. Threat Modeling
-
Threat research1m 40s
-
Identifying threats2m 27s
-
Understanding attacks5m 18s
-
Threat modeling3m 22s
-
Threat hunting3m 32s
-
-
5. Attack Frameworks
-
MITRE ATT&CK2m 35s
-
Cyber kill chain analysis1m 55s
-
-
6. Malware Threats
-
Looking at advanced malware4m 25s
-
7. Environmental Reconnaissance
-
Social engineering6m 6s
-
DNS harvesting5m 30s
-
Network mapping7m 17s
-
Enumeration tools6m 50s
-
Protocol analyzers9m 23s
-
Wireless reconnaissance8m 23s
-
-
8. Cloud Security
-
What is the cloud?3m 57s
-
Cloud deployment models2m 45s
-
Public cloud tiers6m 2s
-
DevOps4m 5s
-
Cloud security risks2m 43s
-
-
Conclusion
-
What's next41s
-
Show MoreShow Less
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: