Course Curriculum
| Section 01: Introduction | |||
| Introduction | 00:02:00 | ||
| All about the Exam | 00:08:00 | ||
| What’s New on the CompTIA CySA+ Exam? | 00:05:00 | ||
| Meet the Instructors | 00:02:00 | ||
| Thinking like the Enemy | 00:09:00 | ||
| Tools of the Trade | 00:08:00 | ||
| Section 02: The Importance of Threat Data and Intelligence | |||
| Intelligence Sources and Confidence Levels | 00:08:00 | ||
| Threat Indicators and Actors | 00:08:00 | ||
| Threat Trends | 00:07:00 | ||
| Intelligence Cycle and ISACs | 00:06:00 | ||
| Section 03: Threat Intelligence in Support of Organisational Security | |||
| Attack Frameworks | 00:06:00 | ||
| Threat Research | 00:11:00 | ||
| Threat Modeling and Intelligence Sharing | 00:06:00 | ||
| Section 04: Vulnerability Management Activities | |||
| Vulnerability Identification | 00:07:00 | ||
| Scanning Parameters and Criteria | 00:09:00 | ||
| Scanning Special Considerations | 00:06:00 | ||
| Validation | 00:03:00 | ||
| Remediation and Mitigation | 00:08:00 | ||
| Inhibitors to Remediation | 00:07:00 | ||
| Section 05: Vulnerability Assessment Tools | |||
| Web Applications Scanners, Part 1 | 00:10:00 | ||
| Web Applications Scanners, Part 2 | 00:05:00 | ||
| Scanning | 00:06:00 | ||
| Configuring and Executing Scans | 00:08:00 | ||
| Vulnerability Scanning | 00:10:00 | ||
| Reverse Engineering | 00:08:00 | ||
| Enumeration | 00:06:00 | ||
| Wireless Assessment Tools | 00:08:00 | ||
| Cloud Assessment Tools | 00:04:00 | ||
| Section 06: Threats and Vulnerabilities Associated with Specialised Technology | |||
| Mobile and IoT | 00:10:00 | ||
| Embedded and Firmware Systems (RTOS, SoC, and FPGA) | 00:09:00 | ||
| Access and Vehicles Risk | 00:08:00 | ||
| Automation and Control Risk | 00:10:00 | ||
| Section 07: Threats and Vulnerabilities Associated with Operating in the Cloud | |||
| Cloud Models | 00:07:00 | ||
| Remote Service Invocation (FaaS, IaC, API) | 00:10:00 | ||
| Cloud Vulnerabilities | 00:06:00 | ||
| Section 08: Mitigating Controls for Attacks and Software Vulnerabilities | |||
| Injection and Overflow Attacks | 00:09:00 | ||
| Authentication Attacks | 00:07:00 | ||
| Exploits | 00:08:00 | ||
| Application Vulnerabilities, Part 1 | 00:08:00 | ||
| Application Vulnerabilities, Part 2 | 00:07:00 | ||
| Section 09: Security Solutions for Infrastructure Management | |||
| Network Architecture and Asset Management | 00:09:00 | ||
| Protecting Your Territory | 00:05:00 | ||
| Identity and Access Management | 00:11:00 | ||
| Encryption and Active Defense | 00:08:00 | ||
| Section 10: Software Assurance Best Practices | |||
| Platforms | 00:07:00 | ||
| SOA and DevSecOps | 00:09:00 | ||
| Secure Software Development | 00:08:00 | ||
| Best Coding Practices | 00:04:00 | ||
| Section 11: Hardware Assurance Best Practices | |||
| Data Analytics | 00:10:00 | ||
| Endpoint Security | 00:08:00 | ||
| Recon Results, Part 1 | 00:13:00 | ||
| Recon Results, Part 2 | 00:05:00 | ||
| Impact Analysis | 00:05:00 | ||
| Collective Tools | 00:09:00 | ||
| Query Writing | 00:07:00 | ||
| E-mail Analysis, Part 1 | 00:10:00 | ||
| E-mail Analysis, Part 2 | 00:08:00 | ||
| Section 12: Data Analysis in Security Monitoring Activities | |||
| Permissions | 00:09:00 | ||
| Firewalls | 00:08:00 | ||
| Intrusion Prevention Rules | 00:05:00 | ||
| DLP and Endpoint Detection | 00:05:00 | ||
| Frustration and attrition | 00:13:00 | ||
| Section 13: Implement Configuration Changes to Existing Controls to Improve Security | |||
| Threat Hunting and the Hypothesis | 00:06:00 | ||
| Threat Hunting Process | 00:07:00 | ||
| Results and Benefits | 00:05:00 | ||
| Section 14: The Importance of Proactive Threat Hunting | |||
| Workflow and Scripting | 00:07:00 | ||
| API and Malware Signature Creation | 00:08:00 | ||
| Threat Feeds and Machine Learning | 00:06:00 | ||
| Protocols, Standards, and Software Engineering | 00:05:00 | ||
| Section 15: Automation Concepts and Technologies | |||
| IR Roles and Responsibilities | 00:08:00 | ||
| IR Active Preparation | 00:10:00 | ||
| Section 16: The Importance of the Incident Response Process | |||
| Incident Response Process | 00:07:00 | ||
| Section 17: Appropriate Incident Response Procedures | |||
| Network Symptoms | 00:04:00 | ||
| Host Symptoms | 00:08:00 | ||
| Application Symptoms | 00:04:00 | ||
| Section 18: Analyse Potential Indicators of Compromise | |||
| Digital Forensics | 00:10:00 | ||
| Seizure and Acquisitions | 00:05:00 | ||
| Forensics Acquisition Tools | 00:09:00 | ||
| Mobile, Virtualization, and Cloud | 00:06:00 | ||
| Forensics Analysis, Part 1 | 00:04:00 | ||
| Forensics Analysis, Part 2 | 00:08:00 | ||
| Packet Capture | 00:12:00 | ||
| Section 19: Utilise Basic Digital Forensics Techniques | |||
| Data Privacy and Security | 00:06:00 | ||
| Nontechnical Controls | 00:09:00 | ||
| Technical Controls | 00:08:00 | ||
| Section 20: The Importance of Data Privacy and Protection | |||
| Business Impact Analysis | 00:05:00 | ||
| Risk Identification | 00:05:00 | ||
| Risk Calculation and Communication | 00:06:00 | ||
| Training | 00:04:00 | ||
| Supply Chain Assessment | 00:04:00 | ||
| Section 22: The Importance of Frameworks, Policies, Procedures, and Controls | |||
| Frameworks | 00:13:00 | ||
| Policies and Procedures | 00:05:00 | ||
| Controls and Procedures | 00:08:00 | ||
| Verification | 00:06:00 | ||
23 STUDENTS ENROLLED

