CompTIA Cybersecurity Analyst (CySA )

Lessons
Lab
TestPrep
AI Tutor (Hinzufügen Auf)
Instructor-Led (Hinzufügen Auf)
Holen Sie sich eine kostenlose Testversion

Über diesen Kurs

Fähigkeiten, die Sie erwerben werden

Holen Sie sich die Unterstützung, die Sie brauchen. Melden Sie sich für unseren Kurs mit Lehrer an.

1

Introduction

  • What Does This Course Cover?
  • Objectives Map for CompTIA Cybersecurity Analyst (CySA+) Exam CS0-002
2

Today’s Cybersecurity Analyst

  • Cybersecurity Objectives
  • Privacy vs. Security
  • Evaluating Security Risks
  • Building a Secure Network
  • Secure Endpoint Management
  • Penetration Testing
  • Reverse Engineering
  • The Future of Cybersecurity Analytics
  • Summary
  • Exam Essentials
3

Using Threat Intelligence

  • Threat Data and Intelligence
  • Threat Classification
  • Attack Frameworks
  • Applying Threat Intelligence Organizationwide
  • Summary
  • Exam Essentials
4

Reconnaissance and Intelligence Gathering

  • Mapping and Enumeration
  • Passive Footprinting
  • Gathering Organizational Intelligence
  • Detecting, Preventing, and Responding to Reconnaissance
  • Summary
  • Exam Essentials
5

Designing a Vulnerability Management Program

  • Identifying Vulnerability Management Requirements
  • Configuring and Executing Vulnerability Scans
  • Developing a Remediation Workflow
  • Overcoming Risks of Vulnerability Scanning
  • Vulnerability Scanning Tools
  • Summary
  • Exam Essentials
6

Analyzing Vulnerability Scans

  • Reviewing and Interpreting Scan Reports
  • Validating Scan Results
  • Common Vulnerabilities
  • Summary
  • Exam Essentials
7

Cloud Security

  • Understanding Cloud Environments
  • Operating in the Cloud
  • Cloud Infrastructure Security
  • Summary
  • Exam Essentials
8

Infrastructure Security and Controls

  • Understanding Defense-in-Depth
  • Improving Security by Improving Controls
  • Analyzing Security Architecture
  • Summary
  • Exam Essentials
9

Identity and Access Management Security

  • Understanding Identity
  • Threats to Identity and Access
  • Identity as a Security Layer
  • Federation and Single Sign-On
  • Summary
  • Exam Essentials
10

Software and Hardware Development Security

  • Software Assurance Best Practices
  • Designing and Coding for Security
  • Software Security Testing
  • Hardware Assurance Best Practices
  • Summary
  • Exam Essentials
11

Security Operations and Monitoring

  • Security Monitoring
  • Summary
  • Exam Essentials
12

Building an Incident Response Program

  • Security Incidents
  • Phases of Incident Response
  • Building the Foundation for Incident Response
  • Creating an Incident Response Team
  • Coordination and Information Sharing
  • Classifying Incidents
  • Summary
  • Exam Essentials
13

Analyzing Indicators of Compromise

  • Analyzing Network Events
  • Investigating Host-Related Issues
  • Investigating Service and Application-Related Issues
  • Summary
  • Exam Essentials
14

Performing Forensic Analysis and Techniques

  • Building a Forensics Capability
  • Understanding Forensic Software
  • Conducting Endpoint Forensics
  • Network Forensics
  • Cloud, Virtual, and Container Forensics
  • Conducting a Forensic Investigation
  • Forensic Investigation: An Example
  • Summary
  • Exam Essentials
15

Containment, Eradication, and Recovery

  • Containing the Damage
  • Incident Eradication and Recovery
  • Wrapping Up the Response
  • Summary
  • Exam Essentials
16

Risk Management

  • Analyzing Risk
  • Managing Risk
  • Security Controls
  • Summary
  • Exam Essentials
17

Policy and Compliance

  • Understanding Policy Documents
  • Complying with Laws and Regulations
  • Adopting a Standard Framework
  • Implementing Policy-Based Controls
  • Security Control Verification and Quality Control
  • Summary
  • Exam Essentials

1

Today’s Cybersecurity Analyst

  • Einrichten eines Honeypots unter Kali Linux
  • Verwenden des Befehls iptables zum Erstellen einer persönlichen Firewall unter Linux
2

Reconnaissance and Intelligence Gathering

  • Verwendung des hping-Programms
  • Scanning the Local Network
  • Aufklärung in einem Netzwerk durchführen
  • Identifizieren von Suchoptionen in Metasploit
  • Syslog-Einträge lesbar machen
  • Using nslookup for Passive Reconnaissance
3

Designing a Vulnerability Management Program

  • Durchführen von Schwachstellenscans mit Nessus
  • Mit OWASP ZAP
  • Untersuchung der Sicherheitslücke im Quellcode des Echo-Servers
  • Durchführen von Session Hijacking mit Burp Suite
  • Mit Nikto
  • Performing Vulnerability Scanning Using OpenVAS
4

Analyzing Vulnerability Scans

  • Angriff auf eine Website mithilfe von XSS-Injection
  • Ausnutzen einer Website mithilfe von SQL-Injection
  • Durchführen eines MITM-Angriffs
  • Rootkits erkennen
5

Software and Hardware Development Security

  • Encrypting and Decrypting Messages Using Kleopatra
  • Verschlüsseln und Entschlüsseln einer Datei mit AES Crypt
6

Security Operations and Monitoring

  • Wireshark herunterladen und installieren
7

Analyzing Indicators of Compromise

  • Snort konfigurieren
  • Simulation des DDoS-Angriffs
  • Bestätigung des Spoofing-Angriffs in Wireshark
  • Erfassen eines Pakets mit Wireshark
  • Durchführen eines speicherbasierten Angriffs
  • Untersuchen geprüfter Ereignisse
  • Enabling Logging for Audited Objects
8

Performing Forensic Analysis and Techniques

  • Verwendung des MD5-Hash-Algorithmus
  • Verwenden von Apktool zum Dekodieren und Analysieren der APK-Datei

CompTIA Cybersecurity Analyst (CySA )

$279.99

Kaufe jetzt

Ähnliche Kurse

Alle Kurse
Scrolle nach oben