Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cyber Security Analyst and Enterprise Architecture
Course Introduction
Welcome Aboard (4:03)
Cyber Security Analyst (9:12)
Cyber Security Analyst Domain (6:18)
Cybersecurity Analyst Bootcamp Overview (15:21)
CySA Job Role
Cybersecurity Analysts Part 1 (17:52)
Cybersecurity Analysts Part 2 (19:06)
Reconnaissance Techniques
Reconnaissance Techniques part 1 (16:14)
Reconnaissance Techniques part 2 (17:46)
Reconnaissance Techniques part 3 (19:48)
Reconnaissance Techniques part 4 (6:33)
Social Engineering Toolset (3:02)
Netcraft (2:18)
Htrack (2:44)
Fireye (2:56)
NMAP (2:23)
Sysinternals (1:58)
Enhanced Migration Tool (3:16)
Security Appliances
Security Appliances Part 1 (19:20)
Security Appliances Part 2 (8:18)
Palo Alto Networks (6:36)
Fortinet (4:46)
Logging and Access
Logging and Analyst Part 1 (19:39)
Logging and Analyst Part 2 (11:51)
Managing Vulnerabilities
Managing Vulnerabilities Part 1 (18:29)
Managing Vulnerabilities Part 2 (14:36)
Microsoft Security Baseline (0:57)
Metasploit (1:19)
NIST SCAP (1:47)
Computer Security Resource Center (1:06)
Remediating Vulnerabilities
Remediating Vulnerabilities part 1 (19:12)
Remediating Vulnerabilities part 2 (9:44)
SANS Institute (1:43)
Secure Software Development
Software Development Security part 1 (18:16)
Software Development Security Part 2 (14:37)
Owasp (0:38)
Incident Response (13:43)
Computer Emergency Response team (2:12)
Computer Forensics
Forensics Tools Part 1 (19:35)
Forensics Tools Part 2 (10:23)
Guidance Encase (1:08)
Analyzing Analysis and Recovery
Incident Analysis And Recovery Part 1 (19:15)
Incident Analysis And Recovery Part 2 (12:55)
Secure Network Design
Secure Network Design (15:39)
Toms IT Pro (2:12)
Identity and Access Management (IAM)
Managing Identities and Access Part 1 (19:16)
Managing Identities and Access Part 2 (12:43)
Tripwire (2:03)
IT Security Frameworks
Security Frameworks and Policies Part 1 (19:30)
Security Frameworks and Policies Part 2 (13:58)
NIST Cybersecurity Framework (1:34)
Cloud Computing Security Tools
Top 10 Security Tools (1:49)
O365 Cloud Security (2:17)
MS Cloud Security Tools (4:59)
Okta (1:34)
Sophos (2:01)
Sophos Lab (1:01)
Department of Defense Requirements (DOD)
Dept of Defense Workforce (1:35)
Dept of Defense Workforce Directive (8570) (2:02)
Dept of Defence Security Technical Implementation Guides (STIG) (3:03)
Fedramp (1:21)
Taking the CySA Exam
CompTIA Certifications (7:28)
CompTIA Exam Preparations (1:06)
CompTIA Cybersecurity Roadmap (3:39)
CompTIA Continuing Education
CompTIA Certmetrics (2:42)
CompTIA Certifcation Renewal (9:58)
CompTIA Cybersecurity Hub (1:25)
Job Search Tips
Linked In Job Search (5:59)
Cleared Connections (1:18)
Dice (1:28)
Intelligence Careers (2:48)
Course Closeout
CSA Exam Registration (8:50)
Become a CompTIA Subject Matter Expert (5:15)
CYSA Practice Exams (0:31)
Welcome Aboard
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock