->
Oreilly - Cyber Security Analyst and Enterprise Architecture - 200000006JH301
Oreilly - Cyber Security Analyst and Enterprise Architecture
by Joseph Holbrook | Publisher: Stone River eLearning | Release Date: March 2019 | ISBN: 200000006JH301


The CompTIACSA (cySa)Bootcamp is geared towards experienced ITSecurity pros to prepare for the CyberSecurity Analyst exam . This is an Intermediate level course and not meant for inexperienced ITSecurity professionals. CompTIA Cybersecurity Analyst (CSA+)is an international, vendor-neutral cybersecurity certification that applies behavioral analytics to improve the overall state of IT security. CSA+ validates critical knowledge and skills that are required to prevent, detect and combat cybersecurity threats.As attackers have learned to evade traditional signature-based solutions such as firewalls, an analytics-based approach within the IT securityindustry is increasingly important for most organizations. The behavioral analytics skills covered by CSA+ identify and combat malware, and advanced persistent threats (APTs), resulting in enhanced threat visibility across a broad attack surface. CompTIA CSA+ is for IT professionals looking to gain the following security analyst skills: 1) Configure and use threat detection tools. 2) Perform data analysis. 3) Interpret the results to identify vulnerabilities, threats and risks to an organization.
  1. Course Introduction
    • Welcome Aboard 00:04:04
    • Cyber Security Analyst 00:09:12
    • Cyber Security Analyst Domain 00:06:18
    • Cybersecurity Analyst Bootcamp Overview 00:15:21
  2. CySA Job Role
    • Cybersecurity Analysts Part 1 00:17:53
    • Cybersecurity Analysts Part 2 00:19:06
  3. Reconnaissance Techniques
    • Reconnaissance Techniques Part 1 00:16:15
    • Reconnaissance Techniques Part 2 00:17:46
    • Reconnaissance Techniques Part 3 00:19:48
    • Reconnaissance Techniques Part 4 00:06:34
    • Social Engineering Toolset 00:03:02
    • Netcraft 00:02:19
    • Htrack 00:02:44
    • Fireye 00:02:56
    • NMAP 00:02:23
    • Sysinternals 00:01:59
    • Enhanced Migration Tool 00:03:16
  4. Security Appliances
    • Security Appliances Part 1 00:19:20
    • Security Appliances Part 2 00:08:19
    • Palo Alto Networks 00:06:36
    • Fortinet 00:04:46
  5. Logging and Access
    • Logging and Analyst Part 1 00:19:40
    • Logging and Analyst Part 2 00:11:52
  6. Managing Vulnerabilities
    • Managing Vulnerabilities Part 1 00:18:29
    • Managing Vulnerabilities Part 2 00:14:37
    • Microsoft Security Baseline 00:00:57
    • Metasploit 00:01:19
    • NIST SCAP 00:01:47
    • Computer Security Resouce Center 00:01:06
  7. Remediating Vulnerabilities
    • Remediating Vulnerabilities part 1 00:19:12
    • Remediating Vulnerabilities part 2 00:09:44
    • SANS Institute 00:01:43
  8. Secure Software Development
    • Software Development Security Part 1 00:18:16
    • Software Development Security Part 2 00:14:37
    • Owasp 00:00:38
    • Incident Response 00:13:44
    • Computer Emergency Response team 00:02:12
  9. Computer Forensics
    • Forensics Tools Part 1 00:19:35
    • Forensics Tools Part 2 00:10:23
    • Guidance Encase 00:01:09
  10. Analyzing Analysis and Recovery
    • Incident Analysis And Recovery Part 1 00:19:16
    • Incident Analysis And Recovery Part 2 00:12:56
  11. Secure Network Design
    • Secure Network Design 00:15:39
    • Toms IT Pro 00:02:12
  12. Identity and Access Management (IAM)
    • Managing Identities and Access Part 1 00:19:16
    • Managing Identities and Access Part 2 00:12:43
    • Tripwire 00:02:03
  13. IT Security Frameworks
    • Security Frameworks and Policies Part 1 00:19:31
    • Security Frameworks and Policies Part 2 00:13:59
    • NIST Cybersecurity Framework 00:01:34
  14. Cloud Computing Security Tools
    • Top 10 Security Tools 00:01:50
    • O365 Cloud Security 00:02:18
    • MS Cloud Security Tools 00:04:59
    • Okta 00:01:34
    • Sophos 00:02:01
    • Sophos Lab 00:01:02
  15. Department of Defense Requirements (DOD)
    • Dept of Defense Workforce 00:01:35
    • Dept of Defense Workforce Directive (8570) 00:02:03
    • Dept of Defence Security Technical Implementation Guides (STIG) 00:03:03
    • Fedramp 00:01:21
  16. Taking the CySA Exam
    • CompTIA Certifications 00:07:28
    • CompTIA Exam Preparations 00:01:07
    • CompTIA Cybersecurity Roadmap 00:03:40
  17. CompTIA Continuing Education
    • CompTIA Certmetrics 00:02:42
    • CompTIA Certifcation Renewal 00:09:59
    • CompTIA Cybersecurity Hub 00:01:25
  18. Job Search Tips
    • Linked In Job Search 00:06:00
    • Cleared Connections 00:01:18
    • Dice 00:01:28
    • Intelligence Careers 00:02:49
  19. Course Closeout
    • CSA Exam Registration 00:08:50
    • Become a CompTIA Subject Matter Expert 00:05:15
  20. Oreilly - Cyber Security Analyst and Enterprise Architecture

    200000006JH301.Cyber.Security.Analyst.and.Enterprise.Architecture.part1.OR.rar

    200000006JH301.Cyber.Security.Analyst.and.Enterprise.Architecture.part2.OR.rar


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Coktum   |  

Information
Members of Guests cannot leave comments.




rss