Security Analysis for CompTIA CySA+
As a cybersecurity analyst, you must be able to show the value of security intelligence and threat analysis. This course will teach you the foundational skills required as a CySA+ professional including threat hunting, data privacy, and risk mitigation.
What you'll learn
The security market is changing rapidly, in fact most enterprises believe that security management has become significantly more difficult. Why? Most companies are reactive instead of proactive when it comes to securing their networks, resources and data.
In this course, Security Analysis for CompTIA CySA+, you’ll learn the foundational skills required as a CySA+ professional. First, you’ll explore the importance of treating data and intelligence that every industry should consider. Next, you’ll discover how to evaluate the risk mitigation of any organization, including chain-supply assessment. Finally, you’ll learn how to proactively hunt for threats, understand your nemesis, and protect your data. When you’re finished with this course, you’ll have the skills and knowledge of a cybersecurity analyst needed to monitor and protect your organization.
Table of contents
- Course Introduction: Don't Miss This! 6m
- The Current Landscape 10m
- Security and Threat Intelligence 3m
- Security Intelligence Lifecycle: Collection and Analysis 2m
- Security Intelligence Lifecycle: Dissemination 1m
- Security Intelligence Lifecycle: Feedback 3m
- Impact Analysis 1m
- Historical Analysis 1m
- External Teams 1m
- The Continuity Plan 6m
- Risk Evaluation 6m
- Hardware Assurance: Supply Chain Assessment 3m
- Hardware Assurance: Root of Trust (RoT) 2m
- Hardware Assurance: Trusted Firmware 3m
- Hardware Assurance: Secure Processing 3m
- Reverse Engineering 3m
- Why Penetration Tests? 5m
- PenTest: Rules Are Rules 7m
- PenTest: Teams Involved 3m
- Risk Responses 5m
- Utilizing Threat Modeling and Hunting Methods 5m
- Attack Vector 3m
- Threat Hunting 4m
- Open Source Intelligence (OSINT) Tools 4m
- Understanding Google 3m
- Google Hacking: The Operators 3m
- Google Hacking: Advanced Operators 5m
- Using the Operators 6m
- Google Hacking Database (GHDB) 5m
- Shodan 5m
- theHarvester 3m
- Using DNS Tools 8m