Oreilly - CompTIA Cybersecurity Analyst CSA+ CS0-001. The Total Course - 9781789138672
Oreilly - CompTIA Cybersecurity Analyst CSA+ CS0-001. The Total Course
by Brent Chapman, Total Seminars | Publisher: Packt Publishing | Release Date: January 2018 | ISBN: 9781789138672


Total Seminars and Mike Meyers presents Ethical Hacking prep for the CompTIA Cyber Security Analyst CSA+ CS0-001 Exam.About This VideoBasic familiarity with PCs and networks.There are no specific prerequisites as the course covers all the topics in detail.It is a good idea to have an understanding of CompTIA A+, Network+, and Security+ or to be certified in these topics.In DetailWelcome to CompTIA Cybersecurity Analyst CSA+ CS0-001. The Total Course from Total Seminars and Brent Chapman. This course covers everything you need to know to pass your CompTIA CSA+ Certification (CS0-001) Exam. The first goal of the course is to make you an outstanding cybersecurity analyst and in the process, make sure you are ready to pass the CompTIA exam. The course covers all the CompTIA CSA+ CS0-001 Objective Domains: Threat Management, Vulnerability Management, Cyber Incident Response, Security Architecture and Tool Sets. Topics include: Threat and vulnerability management, conducting an analyzing reconnaissance, responding to network-based threats, securing a corporate network, Cyber incident response, Determining the impact of incidents, Preparing the incident response toolkit.
  1. Chapter 1 : Introduction
    • Introduction 00:01:50
  2. Chapter 2 : Conducting Reconnaissance
    • Thinking Like the Enemy 00:09:21
    • Tools of the Trade 00:07:36
  3. Chapter 3 : Analysing Reconnaissance Results
    • Recon Results: Part 1 00:13:06
    • Recon Results: Part 2 00:04:52
    • Data Output 00:05:02
  4. Chapter 4 : Responding to Network-Based Threats
    • Protecting Your Territory 00:04:54
    • Hardening Strategies 00:12:42
  5. Chapter 5 : Securing a Corporate Environment
    • Pen Testing 00:05:42
    • Training 00:04:04
    • Reverse Engineering 00:07:42
    • Risk Evaluation 00:02:35
  6. Chapter 6 : Vulnerability Management
    • Requirements Identification 00:04:51
    • Scanning 00:05:50
    • Configuring and Executing Scans 00:07:47
    • Reporting and Remediating 00:09:24
  7. Chapter 7 : Analysing Vulnerabilities Scan Results
    • Common Vulnerabilities: Part 1 00:07:58
    • Common Vulnerabilities: Part 2 00:07:42
  8. Chapter 8 : Incident Response
    • Incident Response Process 00:06:41
    • IR Roles and Responsibilities 00:07:43
  9. Chapter 9 : Preparation Phase
    • IR Active Preparation 00:09:46
    • Threat Trends 00:07:35
  10. Chapter 10 : Forensic Tools
    • Digital Forensics 00:09:38
    • Seizure and Acquisitions 00:04:57
    • Forensics Acquisition Tools 00:08:58
    • Forensics Analysis: Part 1 00:04:29
    • Forensics Analysis: Part 2 00:07:51
  11. Chapter 11 : Common Symptoms of Compromise
    • Network Symptoms 00:03:35
    • Host Symptoms 00:08:08
    • Application Symptoms 00:04:27
  12. Chapter 12 : Incident Recovery and Post-Incident Response Process
    • Moving Forward: Part 1 00:13:07
    • Moving Forward: Part 2 00:08:03
  13. Chapter 13 : Frameworks, Common Policies, Controls, and Procedures
    • Frameworks 00:13:06
    • Policies 00:07:32
    • Controls & Procedures 00:07:44
    • Verifications 00:06:16
  14. Chapter 14 : Identity and Access Management
    • Context-Based Authentication 00:06:21
    • Identities 00:15:18
    • Managing Identities 00:09:44
    • Exploits 00:08:13
  15. Chapter 15 : Defence Strategies
    • Data Analytics 00:09:49
    • Defence in Depth 00:14:14
  16. Chapter 16 : Software Development Life Cycle (SDLC)
    • Secure Software Development 00:07:48
    • Best Coding Practices 00:04:13
  17. Chapter 17 : Tools and Technologies
    • Preventative Tools: Part 1 00:20:35
    • Preventative Tools: Part 2 00:06:21
    • Collective Tools 00:08:58
    • Vulnerability Scanning 00:15:55
    • Packet Capture 00:11:41
    • Connectivity Tools 00:08:00
    • Pen Testing Tools 00:11:55
  18. Oreilly - CompTIA Cybersecurity Analyst CSA+ CS0-001. The Total Course


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Coktum   |  

Information
Members of Guests cannot leave comments.


SermonBox - Seasonal Collection

SermonBox - The Series Pack Collection

Top Rated News

  • Christmas Material
  • Laser Cut & Print Design Elements Bundle - ETSY
  • Daz3D - All Materials - SKU 37000-37999
  • Cgaxis - All Product - 2019 - All Retail! - UPDATED!!!
  • DigitalXModels Full Collections
  • Rampant Design Tools Full Collections Total: $4400
  • FilmLooks.Com Full Collection
  • All PixelSquid Product
  • The Pixel Lab Collection
  • Envato Elements Full Sources- 3200+ Files
  • Ui8.NET Full Sources
  • The History of The 20th Century
  • The Dover Collections
  • Snake Interiors Collections
  • Inspirational Collections
  • Veer Fancy Collections
  • All Ojo Images
  • All ZZVE Collections
  • All Sozaijiten Collections
  • All Image Broker Collections
  • Shuterstock Bundle Collections
  • Tattoo Collections
  • Blend Images Collections
  • Authors Tuorism Collections
  • Motion Mile - Big Bundle
  • PhotoBacks - All Product - 2018
  • Dekes Techniques - Photoshop & Illustrator Course - 1 to 673
Telegram GFXTRA Group
Udemy - Turkce Gorsel Ogrenme Setleri - Part 2
Videohive Wow Pack Series


rss