O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Learning CompTIA CSA+

Video Description

This course prepares you to pass the CompTIA CS0-001 Cybersecurity Analyst certification exam. It covers every topic tested during that exam and will help you gain the knowledge you need to further your career in cybersecurity. Taught by security expert Mark Long, the course works best for IT security analysts, vulnerability analysts, and threat intelligence analysts with 3-4 years of hands-on experience.

  • Prepare yourself to confidently take the CompTIA CSA+ certification exam
  • Review and master core concepts like vulnerabilities, threats, and risks
  • Learn how to configure and use threat detection tools
  • Discover how to design and implement a well-organized security plan
  • Master the concepts related to threat management and mitigation
  • Understand how to implement incident identification, response, and recovery
  • Broaden your abilities in penetration testing and vulnerability testing

Mark Long is a long time contributor to O'Reilly Media, having authored more than a dozen book and video titles, including multiple CompTIA and Microsoft certification preparation courses. A network security, network admin, and database design pro with more than 25 years of experience, Mark solves IT issues for Fortune 500 companies as the head of his own consulting company. He holds the A+ certification and many others, including Microsoft's MCSE, MCDBA, and MCT.

Table of Contents

  1. Introduction
    1. Welcome to the Course 00:02:10
    2. About the Author 00:02:41
    3. Course Overview 00:05:08
    4. CSA+ Audience 00:05:21
    5. About the Exam 00:10:47
    6. CSA+ Acronyms 00:07:28
  2. Security Basics
    1. Cybersecurity Basics 00:05:27
    2. Understanding Risk 00:10:28
    3. Identifying Threats 00:10:31
    4. Network Security 00:12:30
    5. Endpoint Security 00:10:39
    6. Penetration Testing 00:08:58
    7. Reverse Engineering 00:07:07
    8. Wireless vs. Wired 00:11:21
    9. Virtual vs. Physical pt. 1 00:08:14
    10. Virtual vs. Physical pt. 2 00:04:50
    11. On-premises vs. Cloud 00:09:21
  3. Threat Management
    1. Managing Threats 00:09:06
    2. Topology and Service Discovery 00:07:19
    3. OS Fingerprinting 00:07:33
    4. Router and Firewall Review 00:04:42
    5. Packet Capture 00:07:15
    6. Log Review 00:05:22
    7. Email Harvesting 00:06:02
    8. Getting Social 00:07:34
    9. DNS Harvesting pt. 1 00:05:12
    10. DNS Harvesting pt. 2 00:07:14
    11. Phishing 00:04:13
  4. Threat Mitigation
    1. Threat Mitigation Basics 00:04:50
    2. Network Segmentation 00:07:22
    3. LAN Segmentation 00:10:23
    4. Honeypots 00:04:43
    5. Group Policies pt. 1 00:08:53
    6. Group Policies pt. 2 00:04:22
    7. Endpoint Security 00:07:26
    8. Hardening 00:10:27
    9. Network Access Control 00:08:56
    10. ACLs 00:09:54
    11. Utilizing Sinkholes 00:05:53
    12. Penetration Testing 00:06:59
    13. Pen Test Tools 00:03:48
    14. Risk Evaluation 00:06:24
  5. Vulnerability Management
    1. Vulnerability Management 00:05:18
    2. Identifying Requirements 00:10:17
    3. Establish Scanning Frequency 00:08:49
    4. Tool Configuration 00:09:43
    5. Perform Scans 00:04:52
    6. Generate Reports 00:07:18
    7. Perform Remediation 00:08:15
    8. Ongoing Monitoring 00:04:48
    9. Analyzing Scan Results 00:10:53
    10. Web Server Vulnerabilities pt. 1 00:10:02
    11. Web Server Vulnerabilities pt. 2 00:05:15
    12. Endpoint Vulnerabilities 00:06:36
    13. Network Vulnerabilities 00:09:33
    14. Virtual Vulnerabilities 00:08:09
    15. Mobile Device Vulnerabilities 00:08:00
  6. Impact Identification
    1. Incident Response Overview 00:03:32
    2. Threat Classification 00:09:12
    3. Scope of Impact pt. 1 00:07:26
    4. Scope of Impact pt. 2 00:05:22
    5. Sensitive Data Types 00:06:13
    6. Forensics Tools 00:05:57
    7. Forensic Investigation Suite 00:05:40
    8. CSA Security Tools 00:04:53
  7. Incident Response Process
    1. Incident Response Basics 00:07:47
    2. Understanding Stakeholders 00:09:54
    3. Communication 00:10:31
    4. Role-Based Responsibilities 00:07:46
    5. Common Network Symptoms 00:08:08
    6. Common Host-Related Symptoms 00:06:12
    7. Common App-Related Symptoms 00:05:00
  8. Incident Recovery
    1. Incident Recovery Overview 00:04:39
    2. Containment 00:09:13
    3. Eradication 00:11:48
    4. Validation 00:08:32
    5. Post-Incident Actions 00:05:25
    6. Incident Summary Report 00:03:14
  9. Frameworks, Policies & Procedures
    1. FP&P Overview 00:04:40
    2. Regulatory Compliance 00:09:04
    3. Security Frameworks 00:08:42
    4. Security Policies 00:09:14
    5. Implementing Controls 00:08:49
    6. Operational Procedures 00:04:42
    7. Verification 00:04:45
  10. Security Architecture Review
    1. Security Architecture Overview 00:04:42
    2. Data Analytics 00:07:17
    3. Manual Review 00:05:09
    4. Defense in Depth 00:03:43
    5. Processes and Procedures 00:06:27
  11. Conclusion
    1. Wrap Up 00:04:33