Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CySa | CompTIA CySa+ CS0-003 Cybersecurity Analyst Exam Prep
Security Operations
Log Ingestion (15:13)
Windows Registry (11:05)
System Processes (5:25)
Hardware Architecture (15:42)
Infrastructure Concepts (28:14)
Network Architecture (8:58)
Multi-Factor Authentication (MFA) (17:17)
Single Sign-On (SSO) (17:30)
Privileged Access Management (PAM) (23:50)
Passwordless Authentication (17:12)
Cloud Access Security Broker (CASB) (15:40)
Public Key Infrastructure (PKI) (9:40)
Secure Sockets Layer (SSL) Inspection (16:06)
Data Loss Prevention (DLP) (19:11)
Card Holder Data (CHD) (10:53)
Network-related Malicious Issues (42:19)
Host-related Malicious Issues (32:46)
Application-related Malicious Issues (12:15)
Social Engineering Attacks (20:26)
What is Wireshark (6:32)
TCPDump (5:26)
Security Information and Event Management (SIEM) (16:20)
Security Orchestration, Automation and Response (SOAR) (15:35)
Endpoint Detection and Response (EDR) (14:50)
WHOIS (15:18)
Joe Sandbox (14:29)
Pattern Recognition (6:45)
DomainKeys Identified Mail (DKIM) (6:40)
Domain-based Message Authentication, Reporting and Conformance (DMARC) (14:14)
Sender Policy Framework (SPF) (13:36)
User Behavior Analysis (UBA) (18:44)
PowerShell (9:06)
Threat Actors (9:57)
Tactics, Techniques and Procedures (TTP) (4:11)
Computer Emergency Response Team (CERT) (6:23)
Cybersecurity Incident Response Team (CSIRT) (10:09)
Threat Intelligence Sharing (8:30)
Indicators of Compromise (IoC) (5:59)
Vulnerability Management
What is Vulnerability Management? (3:46)
Vulnerability Management Lifecycle (2:25)
Asset Discovery (6:09)
Scanning Types Internal vs. External (10:38)
Credentialed vs. Non-Credentialed Scanning (9:41)
Active vs. Passive Scanning (10:02)
Vulnerability Scanning Tools (2:37)
Special Considerations in Vulnerability Scanning (5:49)
Agent vs. Agentless Scanning (9:29)
Static vs. Dynamic Analysis (9:01)
Analyzing Vulnerability Assessment Tools (6:03)
Network Scanning and Mapping Tools (9:45)
Web Application Scanners (16:34)
Vulnerability Scanners (7:21)
Multipurpose Tools (10:28)
Cloud Infrastructure Assessment Tools (7:18)
Debugging Tools for Vulnerability Assessment (8:12)
CVSS (Common Vulnerability Scoring System) (13:48)
Validation of Vulnerabilities (7:18)
Context Awareness (6:09)
Prioritizing Vulnerabilities (9:50)
Exploitability and Weaponization (7:08)
Assessing Asset Value in Vulnerability Management (6:29)
Mitigating Software Vulnerabilities (23:10)
Common Attack Vectors and Controls (8:41)
Patching and Configuration Management (11:56)
Risk Management in Vulnerability Handling (11:49)
Data Poisoning and Attack Vectors (7:54)
Broken Access Control and Other Vulnerabilities (27:54)
Insecure Design and Security Misconfiguration (18:13)
Vulnerabilities Related to Outdated Components (8:04)
Identification and Authentication Failures (10:44)
Server-Side and Client-Side Vulnerabilities (8:31)
Local File Inclusion (LFI) and Remote File Inclusion (RFI) (7:44)
Remote Code Execution and Privilege Escalation (9:26)
Zero-day Vulnerabilities (9:24)
Vulnerability Handling in Cloud Environments (15:42)
Industry Standards and Frameworks (31:12)
Industrial Control Systems (ICS) and SCADA Vulnerabilities (20:57)
Vulnerability Response Process (12:56)
Post-Vulnerability Assessment Reporting (11:41)
Control Types in Vulnerability Management (9:32)
Maintenance Windows and Exceptions (12:28)
Policies, Governance, and Service-Level Objectives (SLOs) (7:52)
Prioritization and Escalation in Vulnerability Response (8:27)
Secure Software Development Life Cycle (SDLC) (5:52)
Secure Coding Best Practices (8:31)
Threat Modeling (5:40)
Incident response management
Incident Management (1:44)
Incident Response (5:28)
Differences and Similarities Between Incident Management and Response (7:26)
Why is Incident Management and Response Important? (1:03)
Real-World Scenario (6:53)
Ethics in Cybersecurity (2:20)
Understanding ITIL and Its Role in Incident Response (3:28)
ISO/IEC 27035 - Information Security Incident Management (3:27)
Understanding ITIL in Incident Management (3:19)
ISO/IEC 27035 - Information Security Incident Response (3:37)
Comparing ITIL and ISO/IEC 27035 - Incident Management and Incident Response (4:06)
NIST SP 800-61 Revision 2: A Standard for Cyber Incident Response (2:26)
Incident Management Tools (2:01)
Incident Response Tools (2:54)
Advanced Detection and Monitoring (2:57)
Applications of AI and Machine Learning in Cybersecurity (2:32)
Incident Response Process (3:59)
Incident Management Process (3:01)
IM&R-S4-L3 (2:20)
Cloud and Virtualization Security (4:35)
Malware Analysis and Forensics (3:34)
Disaster Recovery and Business Continuity (3:09)
Threat Intelligence and Hunting (2:08)
Advanced Persistent Threats (APTs) (1:56)
Insider Threats and Mitigation (2:18)
Security Automation and Orchestration (2:17)
Digital Forensics and Incident Response (DFIR) (12:11)
Intro to Incident (1:34)
Preparation Phase (8:49)
Detection and Analysis (19:11)
Containment, Eradication, and Recovery (11:31)
Post-Incident Activity Phase (11:30)
Incident Management Life Cycle with Scenario (13:54)
Scenario Questions (4:15)
Understanding the Cyber Kill Chain (4:05)
The Diamond Model of Intrusion Analysis (3:43)
Introduction to MITRE ATT&CK Framework (3:44)
Open Source Security Testing Methodology Manual (OSS TMM) (4:20)
The OWASP Testing Guide (4:39)
Simulations and Drills (3:34)
Project and Conflict Management in Incident Response (2:07)
Crisis Handling Steps (3:43)
Incident Response in Cloud Environments (1:54)
Incident Management in Remote Work Environments (2:08)
Psychological Aspects of Incident Response (1:50)
Current Cyber Threats and Trends (3:21)
Building a Learning Organization (1:57)
Keeping Up with Technology and Innovations (2:30)
Certification and Professional Development (3:14)
Career Pathways and Professional Development in Cybersecurity (4:07)
Reporting and communication
Introduction to Course (4:10)
Vulnerability Management Reporting (13:53)
Vulnerabilities and Affected Hosts (21:47)
Risk Score (7:37)
Mitigation (8:56)
Recurrence (8:37)
Prioritization (10:28)
Compliance Reports (12:21)
Actions Plans (9:44)
Configuration Management (12:37)
Patching (11:42)
Compensating Controls (10:34)
Awareness, education, and training (5:57)
Changing Business Requirements (11:37)
Inhibitors to Remediation (7:59)
Momerandum of Understanding (9:52)
Service-level Agreement (SLA) (10:29)
Organizational Governance (10:21)
Business Process Interruption (9:34)
Degrading Functionality (11:37)
Legacy Systems (10:41)
Proprietary Systems (11:19)
Metrics and KPIs (13:48)
Trends (11:41)
Top 10 (12:33)
Critical Vulnerabilities and Zero Days (12:22)
SLOs (11:57)
Stakeholder Identification and Communication (13:30)
Incident Reponse Reporting and Communication (12:37)
Incident Declaration and Escalation (13:58)
Incident Response Reporting (11:32)
Executive Summary (9:57)
Who, What, When, Where, and Why in Incident Response Reporting (10:02)
Recommendations in Incident Response Reporting (12:20)
Timeline in Incident Response Reporting (10:21)
Impact in Incident Response Reporting (10:53)
Scope in Incident Response Reporting (10:09)
Evidence in Incident Response Reporting (10:01)
Communications (12:40)
Legal Considerations in Communications (11:27)
Public Relations in Communications During Incident Response (9:01)
Customer Communication in Public Relations During Incident Response (11:17)
Media in Public Relations During Incident Response (11:32)
Regulatory Reporting in Communications During Incident Response (11:13)
Law Enforcement in Communications During Incident Response (10:57)
Root Cause Analysis (10:41)
Lesson Learned (11:16)
Metrics and KPIs Summary (1:24)
Mean Time to Detect (13:02)
Mean Time to Respond (10:39)
Mean Time to Remediate (MTTR) in Metrics and KPIs (12:02)
Alert Volume in Metrics and KPIs (11:24)
Example Questions (60:39)
Quiz
Threat Modeling
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock