CompTIA CySA+ Certification

Training Architect
course instructor image
Bob Salmans

Introduction

Course Introduction

About the Author
00:01:10
About the Course
00:02:35
About the Exam
00:02:14
Connecting to a Linux Lab Server with VNC
00:00:51
Connecting to a Windows Lab Server with RDP
00:00:53

Threat Management

Environmental Reconnaissance

Attack Procedures and Tools
00:16:42
Evasion Techniques, Social Engineering, and Attack Variables
00:09:25
Traffic Analysis
00:03:35

Network Analysis

Network Data Analysis
00:07:31
Network Data Correlation, Output, and Tools
00:12:57
Hands-On-Lab: Scanning a Host with NMAP
00:30:00

Attack Responses and Countermeasures

Network Segmentation and Honeypots
00:08:39
Group Policies, ACLs, Hardening, and NAC
00:11:09
Hands-On-Lab: Configuring a Host Firewall on Ubuntu using UFW
00:30:00

Security Practices

Pentesting — Part 1
00:11:13
Pentesting — Part 2
00:10:01
Reverse Engineering
00:06:51
Risk Evaluation
00:14:40
Hands-On-Lab: Analyzing Possible Malware
00:30:00

Vulnerability Management

The Vulnerability Management Process

Vulnerability Scan Requirements and Frequency
00:14:29
Vulnerability Reports, Remediation, and Continuous Monitoring
00:10:42
Hands-On-Lab: Installing and Configuring OpenVAS
00:30:00

Vulnerability Scan Results

Analyzing and Validating Vulnerability Scan Results
00:09:30
Hands-On-Lab: Analyzing an OpenVAS Vulnerability Scan Report
00:30:00

Common Vulnerabilities on Targets

Common Server, Endpoint, and Network Vulnerabilities
00:12:21
Common Virtual Infrastructure, Mobile Device, VPN, and ICS vulnerabilities
00:09:32

Cyber Incident Response

Determining Impact

Incident Response Process and Threat Classifications
00:08:29
Determining Impact Severity and Prioritization and Reviewing Data Classifications
00:08:24

The Incident Response Toolkit

Forensics Toolkit
00:08:10
Forensic Investigation Suite
00:04:06
Hands-On-Lab: Working with Syslog Data
00:30:00

Incident Response Communications

Communications Process, Stakeholders, and Responsibilities
00:07:54

Common Symptoms

Network Related Symptoms
00:15:37
Host Related Symptoms
00:11:48
Netcat and Application Related Symptoms
00:07:56
Hands-On-Lab: Identifying Malware on Windows Systems
00:30:00
Hands-On-Lab: Identifying Malware on Linux Systems
00:30:00
Hands-On-Lab: Using Wireshark to Identify Malicious Network Activity
00:30:00

The Incident Response Process

Containment, Eradication, Validation, and Corrective Actions
00:10:22
Setting Up Arpwatch to Identify New Devices on a Network
00:20:57

Security Architecture and Tool Sets

Frameworks, Policies, Controls, and Procedures

Regulatory Compliance, Frameworks, Policies, and Procedures
00:17:55

Identity and Access Management (IAM)

Identities, Repositories, Federation, SSO, and Exploits
00:11:02
Hands-On-Lab: Working with Windows Accounts and Security Policies
00:30:00
Hands-On-Lab: Working with Linux Accounts and Password Policies
00:30:00

Compensating Controls

Defense in Depth for Personnel, Processes, and Technologies
00:12:28

Application Security

SDLC and Software Development Best Practice
00:09:11

Tools and Technologies

Preventative and Collective Tools
00:09:28
Analytical, Exploit, and Forensic tools
00:07:29
Hands-On-Lab: Analyzing Windows Event Logs
00:30:00

Conclusion

Next Steps

Taking the CySA+ Certification Exam
00:02:10
Get Recognized
00:00:46
Live-Environment-Challenge: CySA+
02:00:00

Details

Welcome to the CompTIA Cybersecurity Analyst (CySA+) certification course!

Cybersecurity Analysts are the protectors of our networks. They perform many duties which include analysis of data to identify vulnerabilities, threats, and risks to an organization. Configuration and tuning of threat-detection tools, and ecuring applicaitons and systems within an orgnization.

As the skills of cyber attackers continues to grow, so should the skills of cybersecurity analysts. These attackers are finding new ways to bypass our tool sets and controls. Therefore, we must continue to adapt and advance our skills in order to combat the attackers and defent our networks.

If you're wanting to advance your cybersecurity defensive skills, the CompTIA CySA+ certificaiton is a great place to start your journey.

Study Guides

The Sentinels Shield

https://interactive.linuxacademy.com/diagrams/SentinelShieldDiagram.html

CySA-Study-Guide.pdf

Instructor Deck

Community

certificate ribbon icon

Earn a Certificate of Completion

When you complete this course, you’ll receive a certificate of completion as proof of your accomplishment.

Looking For Team Training?

Learn More