Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA Cybersecurity Analyst+ Certification Bundle (CySA+) with Practice Exam
01 Introduction
Did you watch these prerequisites?
Introduction - Cysa+ (1:45)
Resources
02 Identify Security Control Types
01 Identify Security Control Types (0:58)
02 Security Operations Center (4:15)
03 Security Control Category (13:48)
04 Selecting Security Controls (3:34)
02 Resources
03 Threat Intelligence
01 Threat Intelligence Sharing (0:59)
02 Security And Threat Intelligence (3:42)
03 Intelligence Cycle (8:48)
04 Intelligence Sources (7:00)
05 Information Sharing And Analysis Center (3:29)
06 Threat Intelligence Sharing (7:00)
Resources
04 Classifying Threats
01 Classifying Threats (1:23)
02 Threat Classification (4:34)
03 Threat Actors (12:34)
04 Malware (5:45)
05 Threat Research (6:57)
06 Attack Framework (10:12)
07 Indicator Management (5:10)
Resources
05 Threat Hunting
01 Threat Hunting (1:45)
02 Threat Modelling (6:39)
03 Threat Hunting (5:12)
04 Open-Source Intelligence (2:34)
05 Google Hacking (3:30)
06 AbuseIPDB (3:23)
07 Deep Web & Dark Web (5:28)
08 Bug Bounty (2:47)
Resources
06 Network Forensics
01 Network Forensics (0:38)
02 Network Forensic Tool (2:24)
03 Flow Analysis (3:22)
04 IP And DNS Analysis (5:01)
05 URL Analysis (8:04)
Resources
08 Endpoint Monitoring
01 Endpoint Monitoring (0:59)
02 Endpoint Analysis (4:16)
03 Sandboxing (6:20)
04 Reverse Engineering (4:48)
05 Malware Exploitation (7:16)
06 Allow List & Block List (7:27)
Resources
09 Email Monitoring
01 Email Monitoring (0:57)
02 Email IOCs (3:22)
03 Email Header Analysis (3:26)
04 Email Content Analysis (3:47)
05 Email Server Security (2:37)
06 SMTP Log Analysis (3:55)
07 Email Message Security (3:08)
Resources
10 Configuring Your SIEM
01 Configuring Your SIEM (0:59)
02 SIEM (8:18)
03 Security Data Collection (5:39)
04 Data Normalization (6:16)
05 Event Logs (5:01)
06 Syslog (6:12)
Resources
11 Analyzing Your SIEM
01 Analyzing Your SIEM (1:13)
02 SIEM Dashboards (5:33)
03 Analysis & Detection (7:09)
04 Trend Analysis (4:14)
05 Rules And Query Writing (3:21)
06 Scripting Tools (3:42)
Resources
12 Digital Forensics
01 Digital Forensics (1:09)
02 Digital Forensics Analysts (4:35)
03 Forensic Procedures (5:59)
04 Work Product Retention (2:15)
05 Data Acquisition (4:34)
06 Hashing (3:56)
07 Chain Of Custody (2:27)
Resources
13 Incident Response Preparation
01 Incident Response Preparation (1:56)
02 Incident Response Phases (10:33)
03 Documenting Procedures (3:25)
04 Communication Plan (3:24)
05 Reporting Requirements (4:38)
06 Response Coordination (6:29)
07 Business Continuity Plan (8:22)
08 Training And Testing (5:42)
Resources
14 Detection and Containment
01 Detection And Containment (0:53)
02 Defensive Capabilities (4:18)
03 Detection And Analysis (8:03)
04 Impact Analysis (4:34)
05 Incident Classification (6:22)
Resources
15 Cloud and Automation
01 Cloud And Automation (0:55)
02 Cloud Models (14:31)
03 Service Models (6:46)
04 Cloud-Based Infrastructure (5:51)
05 CASB (5:34)
Resources
16 Cloud Infrastructure Assessments
01 Cloud Infrastrucutre Assessments (1:05)
02 Cloud Threats (11:09)
03 Cloud Forensics (5:40)
04 Auditing The Cloud (5:25)
Resources
17 Automation Concepts and Technologies
01 Automation Concept And Technologies (2:48)
02 CI/CD (8:53)
03 DevSecOps (7:24)
04 IAC (5:32)
05 Data Enrichment (4:22)
06 SOAR (4:58)
07 Standardized Processes (5:40)
08 Single Pane Of Glass (8:53)
Resources
18 Non Technical Data and Privacy Control
01 Non-Technical Data And Privacy Controls- Script (3:42)
02 Data Classification (11:04)
03 Data Types (5:13)
04 Legal Requirements (13:37)
05 Data Policies (6:39)
06 Data Retention (9:43)
07 Data Ownership (6:23)
08 Data Sharing (9:13)
Resources
19 Technical Data and Privacy Controls
01 Technical Data And Privacy Controls (1:09)
02 Access Control (3:06)
03 File System Permissions (8:49)
04 Encryption (5:11)
05 Data Loss Prevention (6:10)
06 DLP Discovery And Classification (6:54)
07 DRM And Watermarking (2:52)
Resources
20 Mitigating Software Vulnerabilities
01 Mitigating Software Vulnerabilities (1:23)
02 SDLC Integration (17:39)
03 Execution And Escalation (8:35)
04 Overflow Attacks (9:14)
05 Race Conditions (7:43)
06 Improper Error Handling (5:17)
07 Design Vulnerability (6:59)
08 Platform Best Practices (10:46)
Resource
21 Mitigating Web Application Vulnerabilities
01 Mitigating Web Application Vulnerabilities (1:51)
02 Directory Traversal (10:08)
03 Cross-Site Scripting (9:20)
04 SQL Injection (6:46)
05 XML Vulnerabilities (5:55)
06 Secure Coding (8:59)
07 Authentication Attacks (10:00)
08 Session Hijacking (12:23)
09 Server-Site Request Forgery (7:36)
10 Sensitive Data Exposure (5:14)
11 Clickjacking (3:59)
Resources
22 Analyzing Application Assessments
01 Analyzing Application Assessments (0:44)
02 Software Assessments (6:17)
03 Reverse Engineering (9:53)
04 Dynamic Analysis (10:28)
05 Web Application Scanners (2:40)
06 Burp Suite (1:42)
07 OWASP ZAP (2:48)
Resources
23 Service Oriented Architecture
01 Service Oriented Architecture (2:08)
02 SOA And Microservices (8:55)
03 SOAP (7:21)
04 SAML (6:28)
05 REST (13:50)
06 API, Webhooks And Plugins (9:30)
07 Scripting (4:26)
08 Workflow Orchestration (8:22)
09 FaaS And Serverless (9:10)
Resources
24 Analyzing Host related IOCs
01 Analyzing Host Related IOCs (1:36)
02 Host-Related IOCs (1:54)
03 Malicious Processes (11:27)
04 Memory Forensics (3:34)
05 Consumption (9:04)
06 Disk And File System (12:51)
07 Unauthorized Privilege (7:49)
08 Unauthorized Software (6:15)
09 Unauthorized Change Or Hardware (4:16)
10 Persistence (12:55)
Resources
25 Analyzing Application related IOCs
01 Analyzing Application Related IOCs (1:52)
02 Application-Related IOCs (2:20)
03 Anomalous Activity (4:36)
04 Service Interruption (6:08)
05 New Accounts (5:22)
06 Virtualization Forensics (8:47)
07 Mobile Forensics (12:03)
Resources
26 Analyzing Lateral Movement and Pivoting IOCs
01 Analyzing Lateral Movement And Pivoting IOCs (1:39)
02 Lateral Movement And Pivoting (2:32)
03 Pass The Hash (11:31)
04 Golden Ticket (5:53)
05 Lateral Movement (7:59)
06 Pivoting (8:10)
Resources
27 Risk Mitigation
01 Risk Mitigation (2:02)
02 Risk Identification Process (10:04)
03 Conducting An Assessment (9:21)
04 Risk Calculation (16:55)
05 Business Impact Anallysis (14:57)
06 Risk Prioritization (14:34)
07 Communicating Risk (12:35)
08 Training And Exercises (8:11)
Resources
28 Mitigating Vulnerabilities
01 Mitigating Vulnerabilities (1:47)
02 Remediation And Mitigation- (10:15)
03 Configuration Baseline (5:14)
04 Hardening And Patching (14:33)
05 Remediation Issues (11:08)
Resources
Test Your Knowledge
Practice Exam
09 FaaS And Serverless
Lesson content will be unlocked within 30 minutes.
Teachable is working on this bug.
No further action will be required on your part
.
Thank you for your patience