Course curriculum

    1. 1.1 Course Introduction

    2. 1.2 Instructor Introduction

    3. 1.3 What is CySA

    4. 1.4 Exam Objectives

    5. 1.5 Cybersecurity Pathway

    6. 1.6 DoD Baseline Certfication

    1. 2.1 Domain 1 - Security Operations Overview

    2. 2.2 System and Network Architecture Concepts in Security Operations

    3. 2.3 Log Files

    4. 2.4 Operating Systems

    5. 2.5 Infrastructure Concepts

    6. 2.6 Network Architecture

    7. 2.7 Software Defined Networking

    8. 2.8 Whiteboard Discussion - Network Architectures

    9. 2.9 Identity and Access Management IAM Basics

    10. 2.10 Demonstration - IAM

    11. 2.11 Encryption

    12. 2.12 Sensitive Data

    13. 2.13 1.2 Analyze Indicators of Potentially Malicious Activity

    14. 2.14 Network Attack

    15. 2.15 Host Attacks

    16. 2.16 Application Related Attacks

    17. 2.17 Social Attacks

    18. 2.18 Tools or Techniques to Determine Malicious Activity Overview

    19. 2.19 Tools and Toolsets For Identifying Malicious Activity

    20. 2.20 Common Techniques

    21. 2.21 Programming Concerns

    22. 2.22 Threat-Intelligence and Threat-Hunting Concepts Overview

    23. 2.23 Threat Actors

    24. 2.24 Tactics, Techniques and Procedures

    25. 2.25 Confidence Levels IOC

    26. 2.26 Collection Sources

    27. 2.27 Threat Intelligence

    28. 2.28 Cyber Response Teams

    29. 2.29 Security Operations

    30. 2.30 Standardized Processes and Operations

    31. 2.31 Security Operations Tools and Toolsets

    32. 2.32 Module 2 Review

    1. 3.1 Domain 2 - Vulnerability Management Overview

    2. 3.2 Vulnerability Discovery and Scanning

    3. 3.3 Asset Discovery and Scanning

    4. 3.4 Industry Frameworks

    5. 3.5 Mitigating Attacks

    6. 3.6 CVSS and CVE

    7. 3.7 Common Vulnerability Scoring System (CVSS) interpretation

    8. 3.8 CVE Databases

    9. 3.9 Cross Site Scripting (XSS)

    10. 3.10 Vulnerability Response, Handling, and Management

    11. 3.11 Control Types (Defense in Depth, Zero Trust)

    12. 3.12 Patching and Configurations

    13. 3.13 Attack Surface Management

    14. 3.14 Risk Management Principles

    15. 3.15 Threat Modeling

    16. 3.16 Threat Models

    17. 3.17 Secure Coding and Development (SDLC)

    18. 3.18 Module 3 Review

    1. 4.1 Domain 3 - Incident Response and Management Overview

    2. 4.2 Attack Methodology Frameworks

    3. 4.3 Cyber Kill Chain

    4. 4.4 Frameworks to Know

    5. 4.5 Incident Response and Post Reponse

    6. 4.6 Detection and Analysis

    7. 4.7 Post Incident Activities

    8. 4.8 Containment, Eradication and Recovery

    9. 4.9 Module 4 Review

    1. 5.1 Domain 4 - Reporting and Communication Overview

    2. 5.2 Reporting Vulnerabilities Overview

    3. 5.2.1 Vulnerability Reporting

    4. 5.3 Compliance Reports

    5. 5.4 Inhibitors to Remediation

    6. 5.5 Metrics and KPI-s

    7. 5.6 Incident Response Reporting and Communications Overview

    8. 5.7 Incident Declaration

    9. 5.8 Communication with Stakeholders

    10. 5.9 Root Cause Analysis

    11. 5.10 Lessons Learned and Incident Closure

    12. 5.11 Module 5 Review

    1. 6.1 Course Closeout Overview

    2. 6.2 Practice Questions

    3. 6.3 Exam Process

    4. 6.4 Continuing Education

    5. 6.5 Course Closeout

About this course

  • £499.00
  • 127 lessons
  • 9 hours of video content

Discover your potential, starting today