CS0-002: CompTIA CySA+ Certification Exam (CS0-002)

CS0-002: CompTIA CySA+ Certification Exam (CS0-002)

Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.

$14.99 / $24.99

Identify Security Control Types

  • 1. Identify Security Control Types (Introduction)
    1m
  • 2. Cybersecurity Roles and Responsibilities (OBJ 5.3)
    7m
  • 3. Security Operations Center (SOC) (OBJ 5.3)
    5m
  • 4. Security Control Categories (OBJ 5.3)
    15m
  • 5. Selecting Security Controls (OBJ 5.3)
    5m

Threat Intelligence

  • 1. Threat Intelligence Sharing (Introduction)
    1m
  • 2. Security and Threat Intelligence (OBJ 1.1)
    5m
  • 3. Intelligence Cycle (OBJ 1.1)
    10m
  • 4. Intelligence Sources (OBJ 1.1)
    9m
  • 5. Information Sharing and Analysis Centers (ISACS) (OBJ 1.1)
    4m
  • 6. Threat Intelligence Sharing (OBJ 1.2)
    5m

Classifying Threats

  • 1. Classifying Threats (Introduction)
    1m
  • 2. Threat Classification (OBJ 1.1)
    9m
  • 3. Threat Actors (OBJ 1.1)
    9m
  • 4. Malware (OBJ 1.1)
    8m
  • 5. Threat Research (OBJ 1.2)
    11m
  • 6. Attack Frameworks (OBJ 1.2)
    11m
  • 7. Indicator Management (OBJ 1.1)
    7m

Threat Hunting

  • 1. Threat Hunting (Introduction)
    1m
  • 2. Threat Modeling (OBJ 1.2)
    8m
  • 3. Threat Hunting (OBJ 3.3)
    7m
  • 4. Open-source Intelligence (OBJ 1.1)
    4m
  • 5. Google Hacking (OBJ 1.1)
    8m
  • 6. Profiling Techniques (OBJ 1.1)
    5m
  • 7. Harvesting Techniques (OBJ 1.1)
    4m

Network Forensics

  • 1. Network Forensics (Introduction)
    2m
  • 2. Network Forensic Tools (OBJ 3.1)
    4m
  • 3. tcpdump (OBJ 4.4)
    8m
  • 4. Wireshark (OBJ 4.4)
    11m
  • 5. Flow Analysis (OBJ 3.1)
    6m
  • 6. IP and DNS Analysis (OBJ 3.1)
    7m
  • 7. URL Analysis (OBJ 3.1)
    16m
  • 8. Conduct Packet Analysis (OBJ 4.4)
    6m

Appliance Monitoring

  • 1. Appliance Monitoring (Introduction)
    1m
  • 2. Firewall Logs (OBJ 3.1)
    11m
  • 3. Firewall Configurations (OBJ 3.2)
    19m
  • 4. Proxy Logs (OBJ 3.1)
    6m
  • 5. Web Application Firewall Logs (OBJ 3.1)
    3m
  • 6. IDS and IPS Configuration (OBJ 3.2)
    7m
  • 7. IDS and IPS Logs (OBJ 3.1)
    9m
  • 8. Port Security Configuration (OBJ 3.2)
    6m
  • 9. NAC Configuration (OBJ 3.2)
    7m
  • 10. Analysis of Security Appliances (OBJ 3.2)
    16m

Endpoint Monitoring

  • 1. Endpoint Monitoring (Introduction)
    2m
  • 2. Endpoint Analysis (OBJ 3.1)
    6m
  • 3. Sandboxing (OBJ 3.2)
    4m
  • 4. Reverse Engineering (OBJ 3.1)
    11m
  • 5. Malware Exploitation (OBJ 3.1)
    8m
  • 6. Behavior Analysis (OBJ 3.1)
    12m
  • 7. Malware Analysis (OBJ 3.1)
    26m
  • 8. EDR Configuration (OBJ 3.2)
    5m
  • 9. Blacklisting and Whitelisting (OBJ 3.2)
    9m

Email Monitoring

  • 1. Email Monitoring (Introduction)
    2m
  • 2. Email IOCs (OBJ 3.1)
    5m
  • 3. Email Header Analysis (OBJ 3.1)
    11m
  • 4. Email Content Analysis (OBJ 3.1)
    4m
  • 5. Email Server Security (OBJ 3.1)
    8m
  • 6. SMTP Log Analysis (OBJ 3.1)
    5m
  • 7. Email Message Security (OBJ 3.1)
    6m
  • 8. Analyzing Email Headers (OBJ 4.3)
    4m

Configuring Your SIEM

  • 1. Configuring Your SIEM (Introduction)
    1m
  • 2. SIEM (OBJ 3.1)
    9m
  • 3. Security Data Collection (OBJ 3.1)
    5m
  • 4. Data Normalization (OBJ 3.1)
    8m
  • 5. Event Log (OBJ 3.1)
    4m
  • 6. Syslog (OBJ 3.1)
    6m
  • 7. Configuring a SIEM Agent (OBJ 3.1)
    20m

Analyzing Your SIEM

  • 1. Analyzing Your SIEM (Introduction)
    1m
  • 2. SIEM Dashboards (OBJ 3.1)
    12m
  • 3. Analysis and Detection (OBJ 3.1)
    7m
  • 4. Trend Analysis (OBJ 3.1)
    10m
  • 5. Rule and Query Writing (OBJ 3.1)
    5m
  • 6. Searching and Piping Commands (OBJ 3.1)
    18m
  • 7. Scripting Tools (OBJ 3.1)
    9m
  • 8. Analyzing, Filtering, and Searching Logs (OBJ 3.1)
    7m

Digital Forensics

  • 1. Digital Forensics (Introduction)
    2m
  • 2. Digital Forensic Analysts (OBJ 4.4)
    5m
  • 3. Forensics Procedures (OBJ 4.4)
    9m
  • 4. Work Product Retention (OBJ 4.4)
    3m
  • 5. Data Acquisition (OBJ 4.4)
    5m
  • 6. Forensics Tools (OBJ 4.4)
    8m
  • 7. Memory Acquisition (OBJ 4.4)
    5m
  • 8. Disk Image Acquisition (OBJ 4.4)
    12m
  • 9. Hashing (OBJ 4.4)
    5m
  • 10. Timeline Generation (OBJ 4.4)
    5m
  • 11. Carving (OBJ 4.4)
    6m
  • 12. Chain of Custody (OBJ 4.4)
    6m
  • 13. Collecting and Validating Evidence (OBJ 4.4)
    9m

Analyzing Network IOCs

  • 1. Analyzing Network IOCs (Introduction)
    1m
  • 2. Analyzing Network IOCs (OBJ 4.3)
    2m
  • 3. Traffic Spikes (OBJ 4.3)
    18m
  • 4. Beaconing (OBJ 4.3)
    14m
  • 5. Irregular P2P Communications (OBJ 4.3)
    8m
  • 6. Rogue Devices (OBJ 4.3)
    11m
  • 7. Scans and Sweeps (OBJ 4.3)
    5m
  • 8. Nonstandard Port Usage (OBJ 4.3)
    11m
  • 9. TCP Ports (OBJ 4.3)
    8m
  • 10. UDP Ports (OBJ 4.3)
    7m
  • 11. Data Exfiltration (OBJ 4.3)
    6m
  • 12. Covert Channels (OBJ 4.3)
    8m
  • 13. Analysis of Network IOCs (OBJ 4.3)
    13m

Analyzing Host-related IOCs

  • 1. Analyzing Host-related IOCs (Introduction)
    1m
  • 2. Host-related IOCs (OBJ 4.3)
    2m
  • 3. Malicious Processes (OBJ 4.3)
    10m
  • 4. Memory Forensics (OBJ 4.3)
    7m
  • 5. Consumption (OBJ 4.3)
    9m
  • 6. Disk and File System (OBJ 4.3)
    11m
  • 7. Unauthorized Privilege (OBJ 4.3)
    5m
  • 8. Unauthorized Software (OBJ 4.3)
    6m
  • 9. Unauthorized Change/Hardware (OBJ 4.3)
    3m
  • 10. Persistence (OBJ 4.3)
    10m

Analyzing Application-related IOCs

  • 1. Analyzing Application-related IOCs (Introduction)
    2m
  • 2. Application-related IOCs (OBJ 4.3)
    2m
  • 3. Anomalous Activity (OBJ 4.3)
    4m
  • 4. Service Interruptions (OBJ 4.3)
    5m
  • 5. Application Logs (OBJ 4.3)
    13m
  • 6. New Accounts (OBJ 4.3)
    6m
  • 7. Virtualization Forensics (OBJ 4.3)
    6m
  • 8. Mobile Forensics (OBJ 4.3)
    12m

Analyzing Lateral Movement and Pivoting IOCs

  • 1. Analyzing Lateral Movement and Pivoting IOCs (Introduction)
    1m
  • 2. Lateral Movement and Pivoting (OBJ 4.3)
    3m
  • 3. Pass the Hash (OBJ 4.3)
    10m
  • 4. Golden Ticket (OBJ 4.3)
    7m
  • 5. Lateral Movement (OBJ 4.3)
    7m
  • 6. Pivoting (OBJ 4.3)
    6m

Incident Response Preparation

  • 1. Incident Response Preparation (Introduction)
    2m
  • 2. Incident Response Phases (OBJ 4.2)
    12m
  • 3. Documenting Procedures (OBJ 4.2)
    7m
  • 4. Data Criticality (OBJ 4.1)
    14m
  • 5. Communication Plan (OBJ 4.1)
    7m
  • 6. Reporting Requirements (OBJ 4.1)
    5m
  • 7. Response Coordination (OBJ 4.1)
    8m
  • 8. Training and Testing (OBJ 4.2)
    7m

Detection and Containment

  • 1. Detection and Containment (Introduction)
    2m
  • 2. OODA Loop (OBJ 4.2)
    6m
  • 3. Defensive Capabilities (OBJ 4.2)
    5m
  • 4. Detection and Analysis (OBJ 4.2)
    7m
  • 5. Impact Analysis (OBJ 3.1)
    8m
  • 6. Incident Classification (OBJ 4.2)
    6m
  • 7. Containment (OBJ 4.2)
    6m

Eradication, Recovery, and Post-incident Actions

  • 1. Eradication, Recovery, and Post-incident Actions (Introduction)
    1m
  • 2. Eradication (OBJ 4.2)
    6m
  • 3. Eradication Actions (OBJ 4.2)
    4m
  • 4. Recovery (OBJ 4.2)
    3m
  • 5. Recovery Actions (OBJ 4.2)
    6m
  • 6. Post-Incident Activities (OBJ 4.2)
    6m
  • 7. Lessons Learned (OBJ 4.2)
    7m

Risk Mitigation

  • 1. Risk Mitigation (Introduction)
    1m
  • 2. Risk Identification Process (OBJ 5.2)
    8m
  • 3. Conducting an Assessment (OBJ 5.2)
    9m
  • 4. Risk Calculation (OBJ 5.2)
    12m
  • 5. Business Impact Analysis (OBJ 5.2)
    12m
  • 6. Risk Prioritization (OBJ 5.2)
    17m
  • 7. Communicating Risk (OBJ 5.2)
    8m
  • 8. Training and Exercises (OBJ 5.2)
    5m

Frameworks, Policies, and Procedures

  • 1. Frameworks, Policies, and Procedures (Introduction)
    1m
  • 2. Enterprise Security Architecture (OBJ 5.3)
    3m
  • 3. Prescriptive Frameworks (OBJ 5.3)
    4m
  • 4. Risk-based Frameworks (OBJ 5.3)
    5m
  • 5. Audits and Assessments (OBJ 5.3)
    7m
  • 6. Continuous Monitoring (OBJ 5.3)
    5m

Enumeration Tools

  • 1. Enumeration Tools (OBJ 1.4)
    8m
  • 2. Nmap Discovery Scans (OBJ 1.4)
    9m
  • 3. Nmap Port Scans (OBJ 1.4)
    6m
  • 4. Nmap Port States (OBJ 1.4)
    4m
  • 5. Nmap Fingerprinting Scans (OBJ 1.4)
    4m
  • 6. Using Nmap (OBJ 1.4)
    11m
  • 7. Hping (OBJ 1.4)
    6m
  • 8. Responder (OBJ 1.4)
    2m
  • 9. Wireless Assessment Tools (OBJ 1.4)
    6m
  • 10. Hashcat (OBJ 1.4)
    3m
  • 11. Testing Credential Security (OBJ 1.4)
    3m

Vulnerability Scanning

  • 1. Identifying Vulnerabilities (OBJ 1.3)
    4m
  • 2. Scanning Workflow (OBJ 1.3)
    7m
  • 3. Scope Considerations (OBJ 1.3)
    8m
  • 4. Scanner Types (OBJ 1.3)
    9m
  • 5. Scanning Parameters (OBJ 1.3)
    6m
  • 6. Scheduling and Constraints (OBJ 1.3)
    9m
  • 7. Vulnerability Feeds (OBJ 3.4)
    3m
  • 8. Scan Sensitivity (OBJ 1.3)
    5m
  • 9. Scanning Risks (OBJ 1.3)
    3m

Analyzing Output from Vulnerability Scanners

  • 1. Scan Reports (OBJ 1.4)
    3m
  • 2. Common Identifiers (OBJ 1.2)
    7m
  • 3. CVSS (OBJ 1.2)
    8m
  • 4. Vulnerability Reports (OBJ 1.3)
    11m
  • 5. Nessus (OBJ 1.4)
    7m
  • 6. OpenVAS and Qualys (OBJ 1.4)
    3m
  • 7. Assessing Scan Outputs (OBJ 1.4)
    14m

Mitigating Vulnerabilities

  • 1. Mitigating Vulnerabilities (Introduction)
    2m
  • 2. Remediation and Mitigation (OBJ 1.3)
    6m
  • 3. Configuration Baselines (OBJ 1.3)
    4m
  • 4. Hardening and Patching (OBJ 1.3)
    11m
  • 5. Remediation Issues (OBJ 1.3)
    9m

Identity and Access Management Solutions

  • 1. Identity and Access Management (OBJ 2.1)
    7m
  • 2. Password Policies (OBJ 5.3)
    6m
  • 3. SSO and MFA (OBJ 2.1)
    6m
  • 4. Certificate Management (OBJ 2.1)
    4m
  • 5. Federation (OBJ 2.1)
    5m
  • 6. Privilege Management (OBJ 2.1)
    6m
  • 7. IAM Auditing (OBJ 2.1)
    6m
  • 8. Conduct and Use Policies (OBJ 5.3)
    3m
  • 9. Account and Permissions Audits (OBJ 2.1)
    5m

Network Architecture and Segmentation

  • 1. Asset and Change Management (OBJ 2.1)
    10m
  • 2. Network Architecture (OBJ 2.1)
    9m
  • 3. Segmentation (OBJ 2.1)
    6m
  • 4. Jumpbox (OBJ 2.1)
    5m
  • 5. Virtualization (OBJ 2.1)
    6m
  • 6. Virtualized Infrastructure (OBJ 2.1)
    7m
  • 7. Honeypots (OBJ 2.1)
    7m
  • 8. Configuring Network Segmentation (OBJ 3.2)
    10m

Hardware Assurance Best Practices

  • 1. Supply Chain Assessment (OBJ 5.2)
    5m
  • 2. Root of Trust (OBJ 2.3)
    5m
  • 3. Trusted Firmware (OBJ 2.3)
    5m
  • 4. Security Processing (OBJ 2.3)
    4m

Specialized Technology

  • 1. Mobile Vulnerabilities (OBJ 1.5)
    12m
  • 2. IoT Vulnerabilities (OBJ 1.5)
    3m
  • 3. Embedded System Vulnerabilities (OBJ 1.5)
    7m
  • 4. ICS & SCADA Vulnerabilities (OBJ 1.5)
    8m
  • 5. Mitigating Vulnerabilities (OBJ 1.5)
    4m
  • 6. Premise System Vulnerabilities (OBJ 1.5)
    6m
  • 7. Vehicular Vulnerabilities (OBJ 1.5)
    7m

Non-technical Data and Privacy Controls

  • 1. Data Classification (OBJ 5.1)
    9m
  • 2. Data Types (OBJ 5.1)
    3m
  • 3. Legal Requirements (OBJ 5.1)
    9m
  • 4. Data Policies (OBJ 5.1)
    6m
  • 5. Data Retention (OBJ 5.1)
    7m
  • 6. Data Ownership (OBJ 5.1)
    4m
  • 7. Data Sharing (OBJ 5.1)
    6m

Technical Data and Privacy Controls

  • 1. Access Controls (OBJ 5.1)
    3m
  • 2. File System Permissions (OBJ 3.2)
    10m
  • 3. Encryption (OBJ 5.1)
    3m
  • 4. Data Loss Prevention (OBJ 5.1)
    4m
  • 5. DLP Discovery and Classification (OBJ 3.2)
    4m
  • 6. Deidentification Controls (OBJ 5.1)
    7m
  • 7. DRM and Watermarking (OBJ 5.1)
    4m
  • 8. Analyzing Share Permissions (OBJ 5.1)
    4m

Mitigate Software Vulnerabilities and Attacks

  • 1. SDLC Integration (OBJ 2.2)
    12m
  • 2. Overflow Attacks (OBJ 1.7)
    14m
  • 3. Race Conditions (OBJ 1.7)
    6m
  • 4. Improper Error Handling (OBJ 1.7)
    5m
  • 5. Design Vulnerabilities (OBJ 1.7)
    4m
  • 6. Platform Best Practices (OBJ 2.2)
    7m

Mitigate Web Application Vulnerabilities and Attacks

  • 1. Directory Traversal (OBJ 1.7)
    8m
  • 2. Cross-site Scripting (OBJ 1.7
    8m
  • 3. SQL Injection (OBJ 1.7)
    8m
  • 4. XML Vulnerabilities (OBJ 1.7)
    5m
  • 5. Secure Coding (OBJ 2.2)
    10m
  • 6. Authentication Attacks (OBJ 1.7)
    7m
  • 7. Session Hijacking (OBJ 1.7)
    7m
  • 8. Sensitive Data Exposure (OBJ 1.7)
    3m
  • 9. Clickjacking (OBJ 1.7)
    2m
  • 10. Web Applications Vulnerabilities (OBJ 1.7)
    9m

Analyzing Application Assessments

  • 1. Software Assessments (OBJ 2.2)
    8m
  • 2. Reverse Engineering (OBJ 1.4)
    7m
  • 3. Dynamic Analysis (OBJ 1.4)
    8m
  • 4. Web Application Scanners (OBJ 1.4)
    3m
  • 5. Burp Suite (OBJ 1.4)
    11m
  • 6. OWASP ZAP (OBJ 1.4)
    3m
  • 7. Analyzing Web Applications (OBJ 1.4)
    16m

Cloud and Automation

  • 1. Cloud Models (OBJ 1.6)
    16m
  • 2. Service Models (OBJ 1.6)
    11m
  • 3. Cloud-based Infrastructure (OBJ 2.1)
    7m
  • 4. CASB (OBJ 2.1)
    4m

Service-Oriented Architecture

  • 1. SOA and Microservices (OBJ 2.2)
    6m
  • 2. SOAP (OBJ 2.2)
    5m
  • 3. SAML (OBJ 2.2)
    7m
  • 4. REST (OBJ 2.2)
    10m
  • 5. API (OBJ 3.4)
    6m
  • 6. Scripting (OBJ 3.4)
    4m
  • 7. Workflow Orchestration (OBJ 3.4)
    6m
  • 8. FAAS and Serverless (OBJ 1.6)
    8m

Cloud Infrastructure Assessments

  • 1. Cloud Threats (OBJ 1.6)
    8m
  • 2. Cloud Tools (OBJ 1.4)
    4m
  • 3. Cloud Forensics (OBJ 4.4)
    4m

Automation Concepts and Technologies

  • 1. CI/CD (OBJ 3.4)
    7m
  • 2. DevSecOps (OBJ 2.2)
    5m
  • 3. IAC (OBJ 1.6)
    4m
  • 4. Machine Learning (OBJ 3.4)
    9m
  • 5. Data Enrichment (OBJ 3.4)
    4m
  • 6. SOAR (OBJ 3.4)
    3m