O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CompTIA Cybersecurity Analyst CSA+ CS0-001. The Total Course

Video Description

Total Seminars and Mike Meyers presents Ethical Hacking prep for the CompTIA Cyber Security Analyst CSA+ CS0-001 Exam.

About This Video

  • Basic familiarity with PCs and networks.
  • There are no specific prerequisites as the course covers all the topics in detail.
  • It is a good idea to have an understanding of CompTIA A+, Network+, and Security+ or to be certified in these topics.

In Detail

Welcome to CompTIA Cybersecurity Analyst CSA+ CS0-001. The Total Course from Total Seminars and Brent Chapman. This course covers everything you need to know to pass your CompTIA CSA+ Certification (CS0-001) Exam. The first goal of the course is to make you an outstanding cybersecurity analyst and in the process, make sure you are ready to pass the CompTIA exam. The course covers all the CompTIA CSA+ CS0-001 Objective Domains: Threat Management, Vulnerability Management, Cyber Incident Response, Security Architecture and Tool Sets. Topics include: Threat and vulnerability management, conducting an analyzing reconnaissance, responding to network-based threats, securing a corporate network, Cyber incident response, Determining the impact of incidents, Preparing the incident response toolkit.

Table of Contents

  1. Chapter 1 : Introduction
    1. Introduction 00:01:50
  2. Chapter 2 : Conducting Reconnaissance
    1. Thinking Like the Enemy 00:09:21
    2. Tools of the Trade 00:07:36
  3. Chapter 3 : Analysing Reconnaissance Results
    1. Recon Results: Part 1 00:13:06
    2. Recon Results: Part 2 00:04:52
    3. Data Output 00:05:02
  4. Chapter 4 : Responding to Network-Based Threats
    1. Protecting Your Territory 00:04:54
    2. Hardening Strategies 00:12:42
  5. Chapter 5 : Securing a Corporate Environment
    1. Pen Testing 00:05:42
    2. Training 00:04:04
    3. Reverse Engineering 00:07:42
    4. Risk Evaluation 00:02:35
  6. Chapter 6 : Vulnerability Management
    1. Requirements Identification 00:04:51
    2. Scanning 00:05:50
    3. Configuring and Executing Scans 00:07:47
    4. Reporting and Remediating 00:09:24
  7. Chapter 7 : Analysing Vulnerabilities Scan Results
    1. Common Vulnerabilities: Part 1 00:07:58
    2. Common Vulnerabilities: Part 2 00:07:42
  8. Chapter 8 : Incident Response
    1. Incident Response Process 00:06:41
    2. IR Roles and Responsibilities 00:07:43
  9. Chapter 9 : Preparation Phase
    1. IR Active Preparation 00:09:46
    2. Threat Trends 00:07:35
  10. Chapter 10 : Forensic Tools
    1. Digital Forensics 00:09:38
    2. Seizure and Acquisitions 00:04:57
    3. Forensics Acquisition Tools 00:08:58
    4. Forensics Analysis: Part 1 00:04:29
    5. Forensics Analysis: Part 2 00:07:51
  11. Chapter 11 : Common Symptoms of Compromise
    1. Network Symptoms 00:03:35
    2. Host Symptoms 00:08:08
    3. Application Symptoms 00:04:27
  12. Chapter 12 : Incident Recovery and Post-Incident Response Process
    1. Moving Forward: Part 1 00:13:07
    2. Moving Forward: Part 2 00:08:03
  13. Chapter 13 : Frameworks, Common Policies, Controls, and Procedures
    1. Frameworks 00:13:06
    2. Policies 00:07:32
    3. Controls & Procedures 00:07:44
    4. Verifications 00:06:16
  14. Chapter 14 : Identity and Access Management
    1. Context-Based Authentication 00:06:21
    2. Identities 00:15:18
    3. Managing Identities 00:09:44
    4. Exploits 00:08:13
  15. Chapter 15 : Defence Strategies
    1. Data Analytics 00:09:49
    2. Defence in Depth 00:14:14
  16. Chapter 16 : Software Development Life Cycle (SDLC)
    1. Secure Software Development 00:07:48
    2. Best Coding Practices 00:04:13
  17. Chapter 17 : Tools and Technologies
    1. Preventative Tools: Part 1 00:20:35
    2. Preventative Tools: Part 2 00:06:21
    3. Collective Tools 00:08:58
    4. Vulnerability Scanning 00:15:55
    5. Packet Capture 00:11:41
    6. Connectivity Tools 00:08:00
    7. Pen Testing Tools 00:11:55