CySA+ (CS0-002) Prep
محتوى الدورة
مكتمل – Lessons
-
40:15
-
01- Explaining the Importance of Security Controls and Security Intelligence
55:29 -
02.1- Utilizing Threat Data and Intelligence – Part 1
58:23 -
02.2- Utilizing Threat Data and Intelligence – Part 2
57:53 -
02.3- Utilizing Threat Data and Intelligence – Part 3
38:46 -
03.1- Analyzing Security Monitoring Data – Part 1
33:56 -
03.2- Analyzing Security Monitoring Data – Part 2
39:54 -
03.3- Analyzing Security Monitoring Data – Part 3
48:58 -
03.4- Analyzing Security Monitoring Data – Part 4
55:25 -
03.5- [Lab] Discovering the Lab Environment
37:50 -
03.6- [Lab] Analyzing Output from Network Security Monitoring Tools
47:50 -
03.7- Analyzing Security Monitoring Data – Part 5
57:33 -
03.8- [Lab] Analyzing Output from Security Appliance Logs
01:18:35 -
03.9- Analyzing Security Monitoring Data – Part 6
49:31 -
03.10- [Lab] Analyzing Output from Endpoint Security Monitoring Tools
01:02:09 -
03.12- [BONUS] Metasploit and Meterpreter
01:02:39 -
03.13- [BONUS] Metasploit Lab
01:25:14 -
04.1- Collecting and Querying Security Monitoring Data – Part 1
01:07:47 -
04.2.1- [Lab] Configuring SIEM Agents and Collectors – Part 1
01:20:05 -
04.2.2- [Lab] Configuring SIEM Agents and Collectors – Part 2
11:39 -
04.3- Collecting and Querying Security Monitoring Data – Part 2
53:10 -
04.4- [Lab] Analyzing, Filtering, and Searching Event Log and Syslog Output
44:01 -
05.1- Utilizing Digital Forensics and Indicator Analysis Techniques – Part 1
42:22 -
05.2- Utilizing Digital Forensics and Indicator Analysis Techniques – Part 2
50:59 -
05.3- [Lab] Collecting and Validating Digital Evidence
47:52 -
05.4- Utilizing Digital Forensics and Indicator Analysis Techniques – Part 3
49:40 -
05.5- [Lab] Analyzing Network-related IoCs
34:50 -
05.6- Utilizing Digital Forensics and Indicator Analysis Techniques – Part 4
56:32 -
05.7- [Lab] Analyzing Host and Application IoCs
01:06:08 -
06.1- Applying Incident Response Procedures
00:00 -
06.2- [Lab] Observing IoCs during a Security Incident
01:20:02 -
07.1- Applying Risk Mitigation and Security Frameworks
00:00 -
07.2- [BONUS] Summarizing Risk Management Concepts
44:00 -
08.1- Performing Vulnerability Management – Part 1
00:00 -
08.2- [Lab] Analyzing Output from Topology and Host Enumeration Tools
29:18 -
08.3- Performing Vulnerability Management – Part 2
30:34 -
08.4- [Lab] Testing Credential Security
25:53 -
08.5- Performing Vulnerability Management – Part 3
24:03 -
08.6- [Lab] Configuring Vulnerability Scanning and Analyzing Outputs
32:07 -
08.7- [Lab] Assessing Vulnerability Scan Outputs
37:05 -
09.1- Applying Security Solutions for Infrastructure Management
00:00 -
09.2- [Lab] Performing Account and Permissions Audits
26:39 -
09.3- [Lab] Configuring Network Segmentation and Security
44:28 -
10.2- [Lab] Configuring and Analyzing Share Permissions
00:00 -
11.1- Applying Security Solutions for Software Assurance – Part 1
00:00
تقييمات ومراجعات الطلاب
لا مراجعة حتى الآن