CompTIA Cybersecurity Analyst CySA+ (CSA+). The Total Course
- Offered byEduonix
CompTIA Cybersecurity Analyst CySA+ (CSA+). The Total Course at Eduonix Overview
Duration | 39 hours |
Mode of learning | Online |
Schedule type | Self paced |
Difficulty level | Intermediate |
Credential | Certificate |
CompTIA Cybersecurity Analyst CySA+ (CSA+). The Total Course at Eduonix Highlights
- Practice Quizzes, Assignments, Videos & Readings
- Lifetime Access. No Limits!
- A great course for learning Cyber Security
- Self paced Course
CompTIA Cybersecurity Analyst CySA+ (CSA+). The Total Course at Eduonix Course details
- This course covers everything you need to know to pass your CompTIA CSA+ Certification (CS0-001) Exam. The first goal of the course is to make you an outstanding cybersecurity analyst and in the process, make sure you are ready to pass the CompTIA exam.
CompTIA Cybersecurity Analyst CySA+ (CSA+). The Total Course at Eduonix Curriculum
Section 1 : Introduction
Introduction Preview
Section 2 : Conducting Reconnaissance
Thinking Like the Enemy
Tools of the Trade
Section 3 : Analyzing Reconnaissance Results
Recon Results: Part 1 Preview
Recon Results: Part 2
Data Output
Section 4 : Responding to Network-Based Threats
Protecting Your Territory
Hardening Strategies
Section 5 : Securing a Corporate Environment 4 Lectures
Pen Testing Preview
Training
Reverse Engineering
Risk Evaluation
Section 6 : Vulnerability Management
Requirements Identification Preview
Scanning
Configuring and Executing Scans
Reporting and Remediating
Section 7 : Analyzing Vulnerabilities Scan Results
Common Vulnerabilities: Part 1
Common Vulnerabilities: Part 2
Section 8 : Incident Response
Incident Response Process Preview
IR Roles and Responsibilities
Section 9 : Preparation Phase
IR Active Preparation
Threat Trends
Section 10 : Forensic Tools
Digital Forensics Preview
Seizure and Acquisitions
Forensics Acquisition Tools
Forensics Analysis: Part 1
Forensics Analysis: Part 2
Section 11 : Common Symptoms of Compromise
Network Symptoms
Host Symptoms
Application Symptoms
Section 12 : Incident Recovery and Post-Incident Response Process
Moving Forward: Part 1 Preview
Moving Forward: Part 2
Section 13 : Frameworks, Common Policies, Controls, and Procedures
Frameworks
Policies
Controls & Procedures
Verifications
Section 14 : Identity and Access Management
Context-Based Authentication Preview
Identities
Managing Identities
Exploits
Section 15 : Defense Strategies
Data Analytics
Defense in Depth
Section 16 : Software Development Life Cycle (SDLC)
Secure Software Development
Best Coding Practices
Section 17 : Tools and Technologies
Preventative Tools: Part 1 Preview
Preventative Tools: Part 2
Collective Tools
Vulnerability Scanning
Packet Capture
Connectivity Tools
Pen Testing Tools