Module 1 | Introduction | |
---|---|---|
Unit 1 | 1. Instructor Welcome Aboard! | |
Unit 2 | 2. Cyber Security Analyst | |
Unit 3 | 3. CompTIA Cyber Security Analyst (CSA) Domain Objectives | |
Unit 4 | 4. Cyber Security Analyst Bootcamp Overview | |
Module 2 | Cyber Security Analyst Role | |
Unit 1 | 1. Cyber Security Analyst Role Part 1 | |
Unit 2 | 2. Cyber Security Analyst Role part 2 | |
Module 3 | Reconnaissance Techniques Section | |
Unit 1 | 1. Reconnaissance Techniques Part 1 | |
Unit 2 | 2. Reconnaissance Techniques Part 2 | |
Unit 3 | 3. Reconnaissance Techniques Part 3 | |
Unit 4 | 4. Reconnaissance Techniques Part 4 | |
Unit 5 | 5. Trusted Sec Social Engineering Toolset | |
Unit 6 | 6. Netcraft = Domain Analysis Tool | |
Unit 7 | 7. HttRack= Website Ripping Tool | |
Unit 8 | 8. Fireeye = Cyber Security and Endpoint | |
Unit 9 | 9. NMAP | |
Unit 10 | 10. Windows Sysinternals | |
Unit 11 | 11. Enhanced Mitigation Experience Toolkit | |
Module 4 | Security Appliances | |
Unit 1 | 1. Security Appliances Part 1 | |
Unit 2 | 2. Security Appliances Part 2 | |
Unit 3 | 3. Palo Alto Networks | |
Unit 4 | 4. Fortinet | |
Module 5 | Logging and Analysis | |
Unit 1 | 1. Logging and Analysis | |
Unit 2 | 2. Logging and Analysis Part 2 | |
Module 6 | Managing Vulerabilities | |
Unit 1 | 1. Vulnerability Management | |
Unit 2 | 2. Vulnerability Management Part 2 | |
Unit 3 | 3. Microsoft Baseline Security Analyzer (MBSA) | |
Unit 4 | 4. Metasploit | |
Unit 5 | 5. NIST SCAP | |
Unit 6 | 6. COMPUTER SECURITY RESOURCE CENTER | |
Module 7 | Remediating Vulnerabilities | |
Unit 1 | 1. Remediating Vulnerabilities | |
Unit 2 | 2. Remediating Vulnerabilities Part 2 | |
Unit 3 | 3. SANS Institute | |
Module 8 | Security and Software Developement | |
Unit 1 | 1. Software Development Security | |
Unit 2 | 2. Software Development Security Part 2 | |
Unit 3 | 3. Owasp | |
Module 9 | Incident Response | |
Unit 1 | 1. Incident Response | |
Unit 2 | 2. Computer Emergency Response Team (CERT) | |
Module 10 | Forensic Tools | |
Unit 1 | 1. Forensics Tools | |
Unit 2 | 2. Forensic Tools Part 2 | |
Unit 3 | 3. Guidance Encase | |
Module 11 | Analyzing Incidents and Recovery | |
Unit 1 | 1. Incident Analysis and Recovery | |
Unit 2 | 2. Incident Recovery and Analysis Part 2 | |
Module 12 | Secure Network Design | |
Unit 1 | 1. Secure Network Design | |
Unit 2 | 2. Toms IT Pro SIEM Resources | |
Module 13 | Identity and Access Management (IAM) | |
Unit 1 | 1. Managing Identities and Access | |
Unit 2 | 2. Managing Identity and Access Part 2 | |
Unit 3 | 3. Tripwire | |
Module 14 | Security Frameworks | |
Unit 1 | 1. Security Frameworks and Policies | |
Unit 2 | 2. Security Frameworks and Policies part 2 | |
Unit 3 | 3. NIST Cybersecurity Framework | |
Module 15 | Cloud Security Tools | |
Unit 1 | 1. Cloud Security Tools | |
Unit 2 | 2. O365 Cloud Security | |
Unit 3 | 3. Cloud Security Tools - MS | |
Unit 4 | 4. Zscaler | |
Unit 5 | 5. Okta | |
Unit 6 | 6. Sophos | |
Unit 7 | 7. Time for a short Youtube about IT Security and the Cloud Courtesy of Sophos | |
Module 16 | DOD Certifications and State Dept Requirements (For those interested) | |
Unit 1 | 1. Department of Defense (DOD) Workforce Certification | |
Unit 2 | 2. Department Of Defense 8570 Directive | |
Unit 3 | 3. Security Technical Implementation Guides (STIGs) | |
Unit 4 | 4. Fedramp | |
Module 17 | Taking The CSA Exam | |
Unit 1 | 1. CompTIA Certifications | |
Unit 2 | 2. Exam Preparation | |
Unit 3 | 3. CompTIA Cybersecurity Roadmap | |
Module 18 | CompTIA Continuing Education | |
Unit 1 | 1. CompTIA Certmetrics | |
Unit 2 | 2. CompTIA Continuing Education Requirements | |
Unit 3 | 3. CompTIA CyberSecurity Hub | |
Module 19 | Job Search Tips | |
Unit 1 | 1. Linkedin Job Search Tips | |
Unit 2 | 2. Cleared Connections | |
Unit 3 | 3. Dice | |
Unit 4 | 4. Intelligencecareers.com | |
Module 20 | Course Closeout | |
Unit 1 | 1. Obtain a CompTIA Exam Voucher and Register for Exam | |
Unit 2 | 2. Become a CompTIA Subject Matter Expert! |
Powered By WP Courseware