Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA CySA+ (CS0-003)
Cybersecurity Concepts
Course Overview (3:15)
Common Log Ingestion Concepts (17:06)
Common Operating System Concepts (26:02)
Common Infrastructure Concepts (19:24)
Common IAM Concepts (24:00)
Common Encryption Concepts (18:02)
Protecting Sensitive Data (11:29)
Common Network Architecture (16:34)
Malicious Network Activity (18:01)
Malicious Host Activity (22:13)
Malicious Application Activity (18:16)
Other Malicious Activity (14:00)
Packet Capture Tools (17:50)
Log Analysis Tools (15:21)
Endpoint Detection and Response (15:46)
DNS and IP Reputation Tools (14:43)
File Analysis Tools (21:25)
Sandboxing Tools (11:17)
Email Analysis Tools (15:50)
User and Entity Behavior Analytics (8:52)
Scripting and Programming (17:29)
Threat Actor Types (24:41)
TTPs (10:29)
CTI Confidence Levels (14:58)
CTI Sources (15:08)
CTI Sharing (12:28)
Threat Hunting (17:11)
Process Standardization (9:33)
Streamlining Operations (8:08)
Integrating Tools and Technology Into Security Operations (14:45)
Vulnerability Types and Concepts
Asset Discovery and Mapping (20:27)
Vulnerability Scanning Types and Considerations (25:31)
Vulnerability Scanning Frameworks (17:53)
Analyze Vulnerability Assessment Scanner Output (29:48)
CVSS (24:02)
Vulnerability Prioritization (18:54)
Software Vulnerability Mitigations (26:59)
SDLC (12:09)
Threat Modeling (12:48)
Compensating Controls (17:10)
System Maintenance Procedures (10:16)
Risk Management Principles (8:51)
Policies, Governance, and SLOs (7:41)
Prioritization and Escalation (12:46)
Attack Surface Management (11:50)
Secure Coding Best Practices (17:33)
Managing Cybersecurity Incident Response
Attack Methodology Frameworks (18:19)
Detection and Analysis (20:59)
Containment, Eradication, and Recovery (14:26)
Preparation Phase (8:05)
Post-Incident Activity (8:50)
Communicating Cybersecurity Findings Effectively
Communicate Vulnerability Management Reporting (19:43)
Communicate Incident Response Metrics and KPIs (11:20)
Communicate Compliance Reporting (12:10)
Communicate Inhibitors to Remediation (8:29)
Communicate Incident Response Reports (17:46)
Communicate Root Cause Analysis (13:00)
Communicate Vulnerability Metrics and KPIs (9:37)
Common Operating System Concepts
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock