CySA+ Cert Prep: 1 Threat Management

CySA+ Cert Prep: 1 Threat Management

English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 4h 49m | 540 MB

Earning the CompTIA Cybersecurity Analyst (CySA+) certification demonstrates to potential employers that you have a solid understanding of how to tackle cybersecurity threats using a behavioral analytics-based approach. This course-the first installment in the CySA+ Cert Prep series-can provide you with a foundational understanding of threat management practices, and prepare you to confidently approach the Threat Management domain of the CySA+ exam. Instructor Mike Chapple includes coverage of cybersecurity threats and controls, reconnaissance techniques, penetration testing, reverse engineering, and security analytics. He also covers network security and endpoint security topics.

Topics include:

  • The goals of information security
  • Risk assessment and risk management
  • Ongoing risk management
  • Security zones
  • Network security techniques
  • Securing endpoints
  • Threat intelligence
  • Correlating security event information
  • Logging and SIEM technology
  • Planning, designing, and executing a penetration test
  • Reverse engineering software and hardware
Table of Contents

Introduction
1 Welcome
2 What you need to know

Overview of the Role of a Cybersecurity Analyst
3 The goals of information security

Reverse Engineering
4 Reverse engineering software
5 Reverse engineering hardware

Conclusion
6 What’s next

Cybersecurity Threats and Controls
7 Risk assessment
8 Quantitative risk assessment
9 Risk management
10 Security control selection and implementation
11 Audits and assessments
12 Control management
13 Ongoing risk management
14 Risk management frameworks

Networking Technologies
15 Security zones
16 Introducing TCP_IP
17 IP addresses
18 Subnetting
19 VLANs and network segmentation
20 Port isolation
21 DNS
22 ICMP
23 Security device placement

Network Security Techniques
24 Restricting network access
25 Network access control
26 Firewall rule management
27 Router configuration security
28 Switch configuration security
29 Isolating sensitive systems
30 Deception technologies
31 Intrusion detection and prevention
32 Web security tools

Monitoring
33 Network monitoring
34 SNMP
35 Infrastructure monitoring tools

Securing Endpoints
36 Operating system security
37 System hardening
38 Malware prevention
39 Application management
40 Host-based network security controls
41 Microsoft EMET
42 Microsoft Baseline Security Analyzer
43 Command line network tools
44 Sysinternals

Environmental Reconnaissance
45 Social engineering
46 Threat intelligence
47 DNS harvesting
48 Network scanning
49 Protocol analyzers
50 Wireless reconnaissance
51 The importance of perspective

Security Analytics
52 Monitor log files
53 Correlating security event information
54 Continuous security monitoring
55 Logging and SIEM technology
56 Network traffic analysis

Penetration Testing
57 Planning a penetration test
58 Designing and executing a penetration test
59 Exploitation frameworks
60 Interception proxies
61 Penetration test reporting
62 Training and exercises