CompTIA CySA+ (CS0-002)
CompTIA Cybersecurity Analyst25 H 4 M
Just you? Training a whole team? There's an ITProTV plan that fits.
Start Training TodayThis course has a virtual lab
This course has a practice test
Episodes
Episodes
- Threat and Vulnerability Management
- Overview
- Intelligence Sources
- Indicator Management
- Confidence Levels
- Threat Classification
- Threat Actors
- Intelligence Cycle
- Commodity Malware
- Information Sharing and Analysis Centers
- Attack Frameworks
- Threat Research
- Threat Modeling Methodologies
- Threat Intelligence Sharing, Supported Functions
- Vulnerability Identification and Validation
- Vulnerability Remediation and Mitigation
- Vulnerability Scanning Parameters and Criteria
- Inhibitors to Remediation
- Web App Scanners
- Infrastructure Vulnerability Scanners
- Software Assessment Tools and Techniques
- Vulnerability Enumeration
- Wireless Assessment Tools
- Cloud Infrastructure Assessment Tools
- Mobile Technology Threats
- Premises and Vehicle Systems Threats
- Controller System Threats
- IoT and Embedded System Threats
- CVSS Metrics
- Cloud Deployment Model Threats
- Cloud Service Model Threats
- Other Cloud Service Threats
- Mitigate Specific Attack Types
- Mitigate Vulnerability Types
- Software and Systems Security
- Asset Tagging and Change Management
- Network Architecture and Segmentation
- Identity and Access Management
- Virtual Desktop Infrastructure, Containerization
- Honeypots and Active Defense
- Cloud Access Security Broker
- Certificate Management
- Hardware Assurance
- Software Assurance and Secure Coding
- Security Operations and Monitoring
- Trend Analysis
- URL Analysis
- DNS Analysis
- Packet and Protocol Analysis
- Flow Analysis
- Endpoint Behavior Analysis
- Malware Analysis
- Log Review
- Impact Analysis
- SIEM Review
- Email Analysis
- File System Permissions
- Blacklisting and Whitelisting
- Firewall Configurations
- Data Loss Prevention
- Network Access Control
- Blackholes and Sinkholes
- Malware Signatures
- Threat Hunting
- Scripting
- AI and Machine Learning
- Continuous Integration and Deployment
- Incident Response
- Incident Response Communication
- Incident Response Phases
- Indicators of Compromise
- Digital Forensics
- Compliance and Assessment
- Privacy vs. Security
- Non-Technical Controls - The Basics
- Non-Technical Controls - The Rest
- Technical Controls - The Basics
- Technical Controls - The Rest
- What is Risk
- How do we Calculate Risk
- How do we Analyze Risk
- How do we Prioritize, Communicate Risk
- How do we Document and Train for Risk
- Apply Risk Management to our Supply Chains
- Controls
- Policies and Procedures
- Frameworks, Audits and Policy
- IAM Policies and Procedures
Overview
5 M



- Episode Description
- Transcript
Welcome to the CompTIA CySA+ series. This series is intended to explore the topics necessary to prepare for the CySA+ exam. Here we cover many computer security related concepts and tools, exploring their best practices and practical application. This includes threats, threat management, reconnaissance, and countermeasures, common vulnerabilities, penetration testing, incident response, security architectures, and common tool sets.