CompTIA Cybersecurity Analyst CSA+ CS0-001. The Total Course

CompTIA Cybersecurity Analyst CSA+ CS0-001. The Total Course

English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 7h 01m | 2.26 GB

Total Seminars and Mike Meyers presents Ethical Hacking prep for the CompTIA Cyber Security Analyst CSA+ CS0-001 Exam.

Welcome to CompTIA Cybersecurity Analyst CSA+ CS0-001. The Total Course from Total Seminars and Brent Chapman. This course covers everything you need to know to pass your CompTIA CSA+ Certification (CS0-001) Exam. The first goal of the course is to make you an outstanding cybersecurity analyst and in the process, make sure you are ready to pass the CompTIA exam. The course covers all the CompTIA CSA+ CS0-001 Objective Domains: Threat Management, Vulnerability Management, Cyber Incident Response, Security Architecture and Tool Sets. Topics include: Threat and vulnerability management, conducting an analyzing reconnaissance, responding to network-based threats, securing a corporate network, Cyber incident response, Determining the impact of incidents, Preparing the incident response toolkit.

A 7hour course on certification which gives you a good idea to have an understanding of CompTIA A+.

What You Will Learn

  • This is a complete and comprehensive CompTIA CSA+ Certification (CS0-001) course. It is designed to prepare the student to be able to take and pass the Cybersecurity Analyst exam and become CompTIA CSA+ Certified.
  • Learn skills to break into a career in information security analysis, which ranks 7th in the 100 best tech jobs for 2017, and is predicted to be the fastest growing overall job category between.
Table of Contents

01 Introduction
02 Thinking Like the Enemy
03 Tools of the Trade
04 Recon Results – Part 1
05 Recon Results – Part 2
06 Data Output
07 Protecting Your Territory
08 Hardening Strategies
09 Pen Testing
10 Training
11 Reverse Engineering
12 Risk Evaluation
13 Requirements Identification
14 Scanning
15 Configuring and Executing Scans
16 Reporting and Remediating
17 Common Vulnerabilities – Part 1
18 Common Vulnerabilities – Part 2
19 Incident Response Process
20 IR Roles and Responsibilities
21 IR Active Preparation
22 Threat Trends
23 Digital Forensics
24 Seizure and Acquisitions
25 Forensics Acquisition Tools
26 Forensics Analysis – Part 1
27 Forensics Analysis – Part 2
28 Network Symptoms
29 Host Symptoms
30 Application Symptoms
31 Moving Forward – Part 1
32 Moving Forward – Part 2
33 Frameworks
34 Policies
35 Controls & Procedures
36 Verifications
37 Context-Based Authentication
38 Identities
39 Managing Identities
40 Exploits
41 Data Analytics
42 Defence in Depth
43 Secure Software Development
44 Best Coding Practices
45 Preventative Tools – Part 1
46 Preventative Tools – Part 2
47 Collective Tools
48 Vulnerability Scanning
49 Packet Capture
50 Connectivity Tools
51 Pen Testing Tools