CS0-002: CompTIA CySA+ Certification Exam (CS0-002)

Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.
$14.99 / $24.99
Identify Security Control Types
-
1. Identify Security Control Types (Introduction)1m
-
2. Cybersecurity Roles and Responsibilities (OBJ 5.3)7m
-
3. Security Operations Center (SOC) (OBJ 5.3)5m
-
4. Security Control Categories (OBJ 5.3)15m
-
5. Selecting Security Controls (OBJ 5.3)5m
Threat Intelligence
-
1. Threat Intelligence Sharing (Introduction)1m
-
2. Security and Threat Intelligence (OBJ 1.1)5m
-
3. Intelligence Cycle (OBJ 1.1)10m
-
4. Intelligence Sources (OBJ 1.1)9m
-
5. Information Sharing and Analysis Centers (ISACS) (OBJ 1.1)4m
-
6. Threat Intelligence Sharing (OBJ 1.2)5m
Classifying Threats
-
1. Classifying Threats (Introduction)1m
-
2. Threat Classification (OBJ 1.1)9m
-
3. Threat Actors (OBJ 1.1)9m
-
4. Malware (OBJ 1.1)8m
-
5. Threat Research (OBJ 1.2)11m
-
6. Attack Frameworks (OBJ 1.2)11m
-
7. Indicator Management (OBJ 1.1)7m
Threat Hunting
-
1. Threat Hunting (Introduction)1m
-
2. Threat Modeling (OBJ 1.2)8m
-
3. Threat Hunting (OBJ 3.3)7m
-
4. Open-source Intelligence (OBJ 1.1)4m
-
5. Google Hacking (OBJ 1.1)8m
-
6. Profiling Techniques (OBJ 1.1)5m
-
7. Harvesting Techniques (OBJ 1.1)4m
Network Forensics
-
1. Network Forensics (Introduction)2m
-
2. Network Forensic Tools (OBJ 3.1)4m
-
3. tcpdump (OBJ 4.4)8m
-
4. Wireshark (OBJ 4.4)11m
-
5. Flow Analysis (OBJ 3.1)6m
-
6. IP and DNS Analysis (OBJ 3.1)7m
-
7. URL Analysis (OBJ 3.1)16m
-
8. Conduct Packet Analysis (OBJ 4.4)6m
Appliance Monitoring
-
1. Appliance Monitoring (Introduction)1m
-
2. Firewall Logs (OBJ 3.1)11m
-
3. Firewall Configurations (OBJ 3.2)19m
-
4. Proxy Logs (OBJ 3.1)6m
-
5. Web Application Firewall Logs (OBJ 3.1)3m
-
6. IDS and IPS Configuration (OBJ 3.2)7m
-
7. IDS and IPS Logs (OBJ 3.1)9m
-
8. Port Security Configuration (OBJ 3.2)6m
-
9. NAC Configuration (OBJ 3.2)7m
-
10. Analysis of Security Appliances (OBJ 3.2)16m
Endpoint Monitoring
-
1. Endpoint Monitoring (Introduction)2m
-
2. Endpoint Analysis (OBJ 3.1)6m
-
3. Sandboxing (OBJ 3.2)4m
-
4. Reverse Engineering (OBJ 3.1)11m
-
5. Malware Exploitation (OBJ 3.1)8m
-
6. Behavior Analysis (OBJ 3.1)12m
-
7. Malware Analysis (OBJ 3.1)26m
-
8. EDR Configuration (OBJ 3.2)5m
-
9. Blacklisting and Whitelisting (OBJ 3.2)9m
Email Monitoring
-
1. Email Monitoring (Introduction)2m
-
2. Email IOCs (OBJ 3.1)5m
-
3. Email Header Analysis (OBJ 3.1)11m
-
4. Email Content Analysis (OBJ 3.1)4m
-
5. Email Server Security (OBJ 3.1)8m
-
6. SMTP Log Analysis (OBJ 3.1)5m
-
7. Email Message Security (OBJ 3.1)6m
-
8. Analyzing Email Headers (OBJ 4.3)4m
Configuring Your SIEM
-
1. Configuring Your SIEM (Introduction)1m
-
2. SIEM (OBJ 3.1)9m
-
3. Security Data Collection (OBJ 3.1)5m
-
4. Data Normalization (OBJ 3.1)8m
-
5. Event Log (OBJ 3.1)4m
-
6. Syslog (OBJ 3.1)6m
-
7. Configuring a SIEM Agent (OBJ 3.1)20m
Analyzing Your SIEM
-
1. Analyzing Your SIEM (Introduction)1m
-
2. SIEM Dashboards (OBJ 3.1)12m
-
3. Analysis and Detection (OBJ 3.1)7m
-
4. Trend Analysis (OBJ 3.1)10m
-
5. Rule and Query Writing (OBJ 3.1)5m
-
6. Searching and Piping Commands (OBJ 3.1)18m
-
7. Scripting Tools (OBJ 3.1)9m
-
8. Analyzing, Filtering, and Searching Logs (OBJ 3.1)7m
Digital Forensics
-
1. Digital Forensics (Introduction)2m
-
2. Digital Forensic Analysts (OBJ 4.4)5m
-
3. Forensics Procedures (OBJ 4.4)9m
-
4. Work Product Retention (OBJ 4.4)3m
-
5. Data Acquisition (OBJ 4.4)5m
-
6. Forensics Tools (OBJ 4.4)8m
-
7. Memory Acquisition (OBJ 4.4)5m
-
8. Disk Image Acquisition (OBJ 4.4)12m
-
9. Hashing (OBJ 4.4)5m
-
10. Timeline Generation (OBJ 4.4)5m
-
11. Carving (OBJ 4.4)6m
-
12. Chain of Custody (OBJ 4.4)6m
-
13. Collecting and Validating Evidence (OBJ 4.4)9m
Analyzing Network IOCs
-
1. Analyzing Network IOCs (Introduction)1m
-
2. Analyzing Network IOCs (OBJ 4.3)2m
-
3. Traffic Spikes (OBJ 4.3)18m
-
4. Beaconing (OBJ 4.3)14m
-
5. Irregular P2P Communications (OBJ 4.3)8m
-
6. Rogue Devices (OBJ 4.3)11m
-
7. Scans and Sweeps (OBJ 4.3)5m
-
8. Nonstandard Port Usage (OBJ 4.3)11m
-
9. TCP Ports (OBJ 4.3)8m
-
10. UDP Ports (OBJ 4.3)7m
-
11. Data Exfiltration (OBJ 4.3)6m
-
12. Covert Channels (OBJ 4.3)8m
-
13. Analysis of Network IOCs (OBJ 4.3)13m
Analyzing Host-related IOCs
-
1. Analyzing Host-related IOCs (Introduction)1m
-
2. Host-related IOCs (OBJ 4.3)2m
-
3. Malicious Processes (OBJ 4.3)10m
-
4. Memory Forensics (OBJ 4.3)7m
-
5. Consumption (OBJ 4.3)9m
-
6. Disk and File System (OBJ 4.3)11m
-
7. Unauthorized Privilege (OBJ 4.3)5m
-
8. Unauthorized Software (OBJ 4.3)6m
-
9. Unauthorized Change/Hardware (OBJ 4.3)3m
-
10. Persistence (OBJ 4.3)10m
Analyzing Application-related IOCs
-
1. Analyzing Application-related IOCs (Introduction)2m
-
2. Application-related IOCs (OBJ 4.3)2m
-
3. Anomalous Activity (OBJ 4.3)4m
-
4. Service Interruptions (OBJ 4.3)5m
-
5. Application Logs (OBJ 4.3)13m
-
6. New Accounts (OBJ 4.3)6m
-
7. Virtualization Forensics (OBJ 4.3)6m
-
8. Mobile Forensics (OBJ 4.3)12m
Analyzing Lateral Movement and Pivoting IOCs
-
1. Analyzing Lateral Movement and Pivoting IOCs (Introduction)1m
-
2. Lateral Movement and Pivoting (OBJ 4.3)3m
-
3. Pass the Hash (OBJ 4.3)10m
-
4. Golden Ticket (OBJ 4.3)7m
-
5. Lateral Movement (OBJ 4.3)7m
-
6. Pivoting (OBJ 4.3)6m
Incident Response Preparation
-
1. Incident Response Preparation (Introduction)2m
-
2. Incident Response Phases (OBJ 4.2)12m
-
3. Documenting Procedures (OBJ 4.2)7m
-
4. Data Criticality (OBJ 4.1)14m
-
5. Communication Plan (OBJ 4.1)7m
-
6. Reporting Requirements (OBJ 4.1)5m
-
7. Response Coordination (OBJ 4.1)8m
-
8. Training and Testing (OBJ 4.2)7m
Detection and Containment
-
1. Detection and Containment (Introduction)2m
-
2. OODA Loop (OBJ 4.2)6m
-
3. Defensive Capabilities (OBJ 4.2)5m
-
4. Detection and Analysis (OBJ 4.2)7m
-
5. Impact Analysis (OBJ 3.1)8m
-
6. Incident Classification (OBJ 4.2)6m
-
7. Containment (OBJ 4.2)6m
Eradication, Recovery, and Post-incident Actions
-
1. Eradication, Recovery, and Post-incident Actions (Introduction)1m
-
2. Eradication (OBJ 4.2)6m
-
3. Eradication Actions (OBJ 4.2)4m
-
4. Recovery (OBJ 4.2)3m
-
5. Recovery Actions (OBJ 4.2)6m
-
6. Post-Incident Activities (OBJ 4.2)6m
-
7. Lessons Learned (OBJ 4.2)7m
Risk Mitigation
-
1. Risk Mitigation (Introduction)1m
-
2. Risk Identification Process (OBJ 5.2)8m
-
3. Conducting an Assessment (OBJ 5.2)9m
-
4. Risk Calculation (OBJ 5.2)12m
-
5. Business Impact Analysis (OBJ 5.2)12m
-
6. Risk Prioritization (OBJ 5.2)17m
-
7. Communicating Risk (OBJ 5.2)8m
-
8. Training and Exercises (OBJ 5.2)5m
Frameworks, Policies, and Procedures
-
1. Frameworks, Policies, and Procedures (Introduction)1m
-
2. Enterprise Security Architecture (OBJ 5.3)3m
-
3. Prescriptive Frameworks (OBJ 5.3)4m
-
4. Risk-based Frameworks (OBJ 5.3)5m
-
5. Audits and Assessments (OBJ 5.3)7m
-
6. Continuous Monitoring (OBJ 5.3)5m
Enumeration Tools
-
1. Enumeration Tools (OBJ 1.4)8m
-
2. Nmap Discovery Scans (OBJ 1.4)9m
-
3. Nmap Port Scans (OBJ 1.4)6m
-
4. Nmap Port States (OBJ 1.4)4m
-
5. Nmap Fingerprinting Scans (OBJ 1.4)4m
-
6. Using Nmap (OBJ 1.4)11m
-
7. Hping (OBJ 1.4)6m
-
8. Responder (OBJ 1.4)2m
-
9. Wireless Assessment Tools (OBJ 1.4)6m
-
10. Hashcat (OBJ 1.4)3m
-
11. Testing Credential Security (OBJ 1.4)3m
Vulnerability Scanning
-
1. Identifying Vulnerabilities (OBJ 1.3)4m
-
2. Scanning Workflow (OBJ 1.3)7m
-
3. Scope Considerations (OBJ 1.3)8m
-
4. Scanner Types (OBJ 1.3)9m
-
5. Scanning Parameters (OBJ 1.3)6m
-
6. Scheduling and Constraints (OBJ 1.3)9m
-
7. Vulnerability Feeds (OBJ 3.4)3m
-
8. Scan Sensitivity (OBJ 1.3)5m
-
9. Scanning Risks (OBJ 1.3)3m
Analyzing Output from Vulnerability Scanners
-
1. Scan Reports (OBJ 1.4)3m
-
2. Common Identifiers (OBJ 1.2)7m
-
3. CVSS (OBJ 1.2)8m
-
4. Vulnerability Reports (OBJ 1.3)11m
-
5. Nessus (OBJ 1.4)7m
-
6. OpenVAS and Qualys (OBJ 1.4)3m
-
7. Assessing Scan Outputs (OBJ 1.4)14m
Mitigating Vulnerabilities
-
1. Mitigating Vulnerabilities (Introduction)2m
-
2. Remediation and Mitigation (OBJ 1.3)6m
-
3. Configuration Baselines (OBJ 1.3)4m
-
4. Hardening and Patching (OBJ 1.3)11m
-
5. Remediation Issues (OBJ 1.3)9m
Identity and Access Management Solutions
-
1. Identity and Access Management (OBJ 2.1)7m
-
2. Password Policies (OBJ 5.3)6m
-
3. SSO and MFA (OBJ 2.1)6m
-
4. Certificate Management (OBJ 2.1)4m
-
5. Federation (OBJ 2.1)5m
-
6. Privilege Management (OBJ 2.1)6m
-
7. IAM Auditing (OBJ 2.1)6m
-
8. Conduct and Use Policies (OBJ 5.3)3m
-
9. Account and Permissions Audits (OBJ 2.1)5m
Network Architecture and Segmentation
-
1. Asset and Change Management (OBJ 2.1)10m
-
2. Network Architecture (OBJ 2.1)9m
-
3. Segmentation (OBJ 2.1)6m
-
4. Jumpbox (OBJ 2.1)5m
-
5. Virtualization (OBJ 2.1)6m
-
6. Virtualized Infrastructure (OBJ 2.1)7m
-
7. Honeypots (OBJ 2.1)7m
-
8. Configuring Network Segmentation (OBJ 3.2)10m
Hardware Assurance Best Practices
-
1. Supply Chain Assessment (OBJ 5.2)5m
-
2. Root of Trust (OBJ 2.3)5m
-
3. Trusted Firmware (OBJ 2.3)5m
-
4. Security Processing (OBJ 2.3)4m
Specialized Technology
-
1. Mobile Vulnerabilities (OBJ 1.5)12m
-
2. IoT Vulnerabilities (OBJ 1.5)3m
-
3. Embedded System Vulnerabilities (OBJ 1.5)7m
-
4. ICS & SCADA Vulnerabilities (OBJ 1.5)8m
-
5. Mitigating Vulnerabilities (OBJ 1.5)4m
-
6. Premise System Vulnerabilities (OBJ 1.5)6m
-
7. Vehicular Vulnerabilities (OBJ 1.5)7m
Non-technical Data and Privacy Controls
-
1. Data Classification (OBJ 5.1)9m
-
2. Data Types (OBJ 5.1)3m
-
3. Legal Requirements (OBJ 5.1)9m
-
4. Data Policies (OBJ 5.1)6m
-
5. Data Retention (OBJ 5.1)7m
-
6. Data Ownership (OBJ 5.1)4m
-
7. Data Sharing (OBJ 5.1)6m
Technical Data and Privacy Controls
-
1. Access Controls (OBJ 5.1)3m
-
2. File System Permissions (OBJ 3.2)10m
-
3. Encryption (OBJ 5.1)3m
-
4. Data Loss Prevention (OBJ 5.1)4m
-
5. DLP Discovery and Classification (OBJ 3.2)4m
-
6. Deidentification Controls (OBJ 5.1)7m
-
7. DRM and Watermarking (OBJ 5.1)4m
-
8. Analyzing Share Permissions (OBJ 5.1)4m
Mitigate Software Vulnerabilities and Attacks
-
1. SDLC Integration (OBJ 2.2)12m
-
2. Overflow Attacks (OBJ 1.7)14m
-
3. Race Conditions (OBJ 1.7)6m
-
4. Improper Error Handling (OBJ 1.7)5m
-
5. Design Vulnerabilities (OBJ 1.7)4m
-
6. Platform Best Practices (OBJ 2.2)7m
Mitigate Web Application Vulnerabilities and Attacks
-
1. Directory Traversal (OBJ 1.7)8m
-
2. Cross-site Scripting (OBJ 1.78m
-
3. SQL Injection (OBJ 1.7)8m
-
4. XML Vulnerabilities (OBJ 1.7)5m
-
5. Secure Coding (OBJ 2.2)10m
-
6. Authentication Attacks (OBJ 1.7)7m
-
7. Session Hijacking (OBJ 1.7)7m
-
8. Sensitive Data Exposure (OBJ 1.7)3m
-
9. Clickjacking (OBJ 1.7)2m
-
10. Web Applications Vulnerabilities (OBJ 1.7)9m
Analyzing Application Assessments
-
1. Software Assessments (OBJ 2.2)8m
-
2. Reverse Engineering (OBJ 1.4)7m
-
3. Dynamic Analysis (OBJ 1.4)8m
-
4. Web Application Scanners (OBJ 1.4)3m
-
5. Burp Suite (OBJ 1.4)11m
-
6. OWASP ZAP (OBJ 1.4)3m
-
7. Analyzing Web Applications (OBJ 1.4)16m
Cloud and Automation
-
1. Cloud Models (OBJ 1.6)16m
-
2. Service Models (OBJ 1.6)11m
-
3. Cloud-based Infrastructure (OBJ 2.1)7m
-
4. CASB (OBJ 2.1)4m
Service-Oriented Architecture
-
1. SOA and Microservices (OBJ 2.2)6m
-
2. SOAP (OBJ 2.2)5m
-
3. SAML (OBJ 2.2)7m
-
4. REST (OBJ 2.2)10m
-
5. API (OBJ 3.4)6m
-
6. Scripting (OBJ 3.4)4m
-
7. Workflow Orchestration (OBJ 3.4)6m
-
8. FAAS and Serverless (OBJ 1.6)8m
Cloud Infrastructure Assessments
-
1. Cloud Threats (OBJ 1.6)8m
-
2. Cloud Tools (OBJ 1.4)4m
-
3. Cloud Forensics (OBJ 4.4)4m
Automation Concepts and Technologies
-
1. CI/CD (OBJ 3.4)7m
-
2. DevSecOps (OBJ 2.2)5m
-
3. IAC (OBJ 1.6)4m
-
4. Machine Learning (OBJ 3.4)9m
-
5. Data Enrichment (OBJ 3.4)4m
-
6. SOAR (OBJ 3.4)3m