SKIP THE SHIPPING
Use code NOSHIP during checkout to save 40% on eligible eBooks, now through January 5. Shop now.
Register your product to gain access to bonus material or receive a coupon.
Video accessible from your Account page after purchase.
20 Hours of Video Instruction
20 hours of deep-dive training covering every objective in the CompTIA Cybersecurity Analyst CySA+ (CS0-002) exam.
Overview:
The CompTIA Cybersecurity Analyst (CySA+) CS0-002 Complete Video Course is a full and complete resource to successfully study for the CompTIA CySA+ exam. With 20 hours of video training this course provides learners with topic-focused coverage on key exam topics, deep-dive demos and examples, and an exploration of relevant cybersecurity foundations and principles to help you gain an in-depth understanding of each objective in the CompTIA CySA+ certification, as well as a deeper understanding of cyber security.
CompTIA Cybersecurity Analyst (CySA+) CS0-002 Complete Video Course contains 20 hours of training with content divided into 7 modules with 33 content targeted lessons. This title will surpass the traditional test prep training by providing an in-depth analysis of core concepts so that students understand all objectives in the CySA+ exam and will learn the fundamentals of preventing, detecting, and combatting cybersecurity threats. Taught by expert trainer, author, and cybersecurity expert Aamir Lakhani, this course uses trainer discussions, hands-on demos, and lightboard work to teach cyber security fundamentals in a way that is easy to access and implement in real world situations.
Topics include:
Module 1: Threat and Vulnerability Management
Lesson 1: Importance of Threat Data and Intelligence
Lesson 2: Utilizing Threat Intelligence to Support Organization Security
Lesson 3: Vulnerability Management Activities
Lesson 4: Analyze Output from Common Vulnerability Assessment Tools
Lesson 5: Threats and Vulnerabilities Associated with Specialized Technology
Lesson 6: Threats Associated with the Cloud
Lesson 7: Implement Controls to Mitigate Attacks
Lesson 8: Implement Controls for Software Vulnerabilities
Module 1 Summary
Module 2: Software and Systems Security
Lesson 9: Security Solutions for Infrastructure Management
Lesson 10: Software Assurance Best Practices
Lesson 11: Hardware Assurance Best Practices
Module 2 Summary
Module 3: Security Operations and Monitoring
Lesson 12: Analyzing Logs and Impact Analysis
Lesson 13: SIEMs and Query Writing
Lesson 14: E-Mail Analysis
Lesson 15: Change Control
Lesson 16: Proactive Threat Hunting
Lesson 17: Automation
Module 3 Summary
Module 4: Incident Response
Lesson 18: Communications Process
Lesson 19: Response Coordination Process
Lesson 20: Data Criticality Process
Lesson 21: Responding to an Incident
Module 4 Summary
Module 5: Compliance and Assessment
Lesson 22: Data Privacy and Protection
Lesson 23: Risk Mitigation
Lesson 24: Importance of Policies, Procedures, and Controls
Module 5 Summary
Module 6: Malware and Incident Response
Lesson 25: Threat Landscape
Lesson 26: Malware Labs
Lesson 27: Dynamic Analysis
Lesson 28: Malware Packet Analysis
Lesson 29: PE File Identification
Lesson 30: File Persistence
Lesson 31: String Analysis
Module 6 Summary
Module 7: Certification Exam
Lesson 32: Preparing and Taking the CySA+
Lesson 33: Next Steps