00001 Welcome to the Course
00002 All About the Exam
00003 What s New in the CompTIA CySA+ Exam
00004 Meet the Instructors
00005 Thinking Like the Enemy
00006 Tools of the Trade
00007 Intelligence Sources and Confidence Levels
00008 Threat Indicators and Actors
00009 Threat Trends
00010 Intelligence Cycle and ISACs
00011 Attack Frameworks
00012 Threat Research
00013 Threat Modelling and Intelligence Sharing
00014 Vulnerability Identification
00015 Scanning Parameters and Criteria
00016 Scanning Special Considerations
00017 Validation
00018 Remediation and Mitigation
00019 Inhibitors to Remediation
00020 Web Applications Scanners Part 1
00021 Web Applications Scanners Part 2
00022 Scanning
00023 Configuring and Executing Scans
00024 Vulnerability Scanning
00025 Reverse Engineering
00026 Enumeration
00027 Wireless Assessment Tools
00028 Cloud Assessment Tools
00029 Mobile and IoT
00030 Embedded and Firmware Systems RTOS SoC and FPGA
00031 Access and Vehicles Risk
00032 Automation and Control Risk
00033 Cloud Models
00034 Remote Service Invocation FaaS IaC API
00035 Cloud Vulnerabilities
00036 Injection and Overflow Attacks
00037 Authentication Attacks
00038 Exploits
00039 Application Vulnerabilities Part 1
00040 Application Vulnerabilities Part 2
00041 Network Architecture and Asset Management
00042 Protecting Your Territory
00043 Identity and Access Management
00044 Encryption and Active Defense
00045 Platforms
00046 SOA and DevSecOps
00047 Secure Software Development
00048 Best Coding Practices
00049 Trusted Hardware
00050 Hardware Encryption
00051 Hardware Security
00052 Data Analytics
00053 Endpoint Security
00054 Recon Results Part 1
00055 Recon Results Part 2
00056 Impact Analysis
00057 Collective Tools
00058 Query Writing
00059 Email Analysis Part 1
00060 Email Analysis Part 2
00061 Permissions
00062 Firewalls
00063 Intrusion Prevention Rules
00064 DLP and Endpoint Detection
00065 Threat Hunting and the Hypothesis
00066 Threat Hunting Process
00067 Results and Benefits
00068 Workflow and Scripting
00069 API and Malware Signature Creation
00070 Threat Feeds and Machine Learning
00071 Protocols Standards and Software Engineering
00072 IR Roles and Responsibilities
00073 IR Active Preparation
00074 Incident Response Process
00075 Network Symptoms
00076 Host Symptoms
00077 Application Symptoms
00078 Digital Forensics
00079 Seizure and Acquisitions
00080 Forensics Acquisition Tools
00081 Mobile Virtualization and Cloud
00082 Forensics Analysis Part 1
00083 Forensics Analysis Part 2
00084 Packet Capture
00085 Data Privacy and Security
00086 Nontechnical Controls
00087 Technical Controls
00088 Business Impact Analysis
00089 Risk Identification
00090 Risk Calculation and Communication
00091 Training
00092 Supply Chain Assessment
00093 Frameworks
00094 Policies and Procedures
00095 Controls and Procedures
00096 Verification