Duration : 10.5 Hours
126 Lessons
Welcome to the Course
Exam Foundations
Domain 1: Threat Management (27%)
02:40:59
Domain 1: Threat Management
CIA Triad
Risk Consideration
Risk Assessment
Identify Threats
Identify Vulnerabilities
Likelihood, Impact, and Risk
Qualitative and Quantitative Assessments
Reviewing Controls
Network Perimeter Security
Network Segmentation
Network Access Control
Defense Deception Methods
Secure Endpoint Management
Penetration Testing
Security Exercises and Training
Reverse Engineering
Reconnaissance and Intelligence
Footprinting the Network
Network Mapping
Port Scanning
Other Port Scanners
NMAP - Demonstration of the world's most popular port scanning tool
Passive Reconnaissance
Passive Recon - Network Devices
Passive Recon - Netstat
DHCP Logs and Configs
Firewall Logs and Configs
System and Host Log Files
DNS Harvesting
Domain Names and IP Ranges
DNS Zone Transfers
Whois and Host Commands
Information Gathering and Aggregation
Organizational Intelligence
Detecting, Preventing, and Responding to Reconnaissance
Domain 2: Vulnerability Management (26%)
02:02:21
Domain 2: Vulnerability Management
Regulatory Requirements
Corporate Requirements
Scanning Tools
Scoping Scans
Configuring Scans
Scanning Sensitivity
Scanning Perspective
Authenticated Scanning
Maintaining Scanners
Standardizing Vulnerabilities
Workflow for Remediation
Vulnerability Reporting
Remediation Priority
Implementing and Testing
Nessus Vulnerability Scanner: A Walkthrough
Interpreting Scan Results
Interpreting CVSS
Calculating the CVSS Score
CVSS Temporal Score
Validation of Results
Common Vulnerabilities
Server and Host Vulnerabilities
Network Vulnerabilities
Virtualization Vulnerabilities
Web Application Vulnerabilities
Internet of Things (IoT) Vulnerabilities
Domain 3: Cyber Incident Response (23%)
02:17:45
Domain 3: Cyber Incident Response
Security Incidents
Incident Response Teams
Incident Response Phases
Incident Response Policy and Procedures
Communication and Info Sharing
Incident Classification
Network Event Monitoring
Network Monitoring Tools
Detecting Network Events
Network Probes and Attacks
Server and Host Events
Service and Application Events
Digital Forensics
Forensic Toolkit Components
Mobile Forensic Toolkits
Forensic Software
Training and Certification
Forensic Investigation Process
Disk Imaging
Disk Imaging Using dd
Disk Imaging Using FTK Imager
Incident Containment
Eradication and Recovery
Finishing the Response
Domain 4: Security Architecture and Toolsets (24%)
02:52:35
Domain 4: Security Architecture and Tool Sets
Policy Documents
Standard Frameworks
Policy-based Controls
Audits and Assessments
Laws and Regulations
Defense in Depth
Types of Controls
Layered Network Defense
Layered Host Security
Data Analytics
Personnel Security
Outsourcing Concerns
User Awareness Training
Analyzing Secure Architectures
What Is Identity?
Identity Systems
Threats to Identity Systems
Attacking AAA Protocols and Systems
Targeting Account Lifecycle
Identity Exploits
Credential Theft
Securing Authentication and Authorization System
Identity as a Service (IDaaS)
Detecting Identity Attacks
Federated Identity Systems
Software Development Life Cycle (SDLC)
Software Development Models
Coding for Security
Testing Application Security
Finding Security Flaws
Web Application Vulnerability Scanners
Conclusion
Practice Exam
Simulations and Performance-Based Questions (PBQs)
CompTIA CySA+ 2019 Cybersecurity Analyst Plus CS0-001 2019 Video Course
If you Select DVD It will delivery only in INDIA
Download Links Will Send to foreign Buyers
If you select Download via email links.
Download Links will send to your email address with in 12 Hours of purchase
You just click and downloading Instantly your course Anywhere from that Download links