CourseInfo | SimpliTrain

CompTIA CySA+ (CS0-002) - ML

Learning plan iconE-Learning

Description

The Cybersecurity Analyst course will teach students about IT security and security analysis. Topics covered include threats and vulnerabilities, infrastructure management, monitoring security options, incident response, compliance and assessment, and more.

The Cybersecurity Analyst course will teach students about IT security and security analysis. Topics covered include threats and vulnerabilities, infrastructure management, monitoring security options, incident response, compliance and assessment, and more.

Lesson Id Title Description
1 Chapter 1 - Managing Threats and Vulnerabilities Instructor Introduction
Course Introduction
Managing Threats and Vulnerabilities
Topic A: Threat Data and Intelligence
Importance of Threat Data
Open-Source Intelligence
Proprietary / Closed Source Intelligence
Intelligence Characteristics
Demo - Threat Data
Indicator Management
STIX Domain Objects
Trusted Automated Exchange of Indicator Information (TAXII)
OpenIoC
Threat Classification
Threat Actors
Intelligence Cycle
Information Sharing
Topic B: Utilizing Threat Intelligence
Threat Intelligence and Operational Security
Attack Frameworks
MITRE ATT&CK
MITRE ATT&CK (cont.)
The Diamond Model of Intrusion Analysis
Kill Chain
Threat Research
Threat Modeling
Threat Intelligence Sharing with Supported Functions
Topic C: Vulnerability Management
Introduction to Vulnerability Management
Vulnerability Identification
Validation Options
Remediation and Mitigation
Understanding Scanning
Additional Scanning Considerations
Inhibitors to Remediation
Topic D: Using Vulnerability Assessment Tools
Web Application Scanners
Infrastructure Scanners
Demo - Infrastructure Scanners
Software Assessments
Enumeration
Demo - Enumeration
Wireless Assessments
Cloud Assessment
Chapter 1 Review
2 Chapter 2 - Specialized Threats and Vulnerabilities Specialized Threats and Vulnerabilities
Topic A: Threats and Vulnerabilities with Specialized Technology
Common Vulnerabilities
App Vulnerabilities
Internet of Things (IoT)
Other Specialized Devices
Other Specialized Devices (cont.)
Topic B: Threats and Vulnerabilities for Cloud Environments
Cloud Services Models
Software as a Service (SaaS)
Platform as a Service (PaaS)
Infrastructure as a Service (IaaS)
Cloud Deployment Models
Additional Cloud Concepts
Insecure Application Programming Interface (API)
Additional Cloud Vulnerabilities
Demo - Identifying Azure Security Vulnerabilities
Chapter 2 Review
3 Chapter 3 - Attacks and Software Vulnerability Mitigation Attacks and Software Vulnerability Mitigation
Topic A: Understanding Attack Types
Injection Attacks
Injection Attacks (cont.)
Directory Traversal
Buffer Overflow Attacks
Privilege Escalation
Authentication Attacks
Topic B: Software Vulnerabilities
Improper Error Handling
Dereferencing
Insecure Object Reference
Race Conditions
Sensitive Data Exposure
Additional Vulnerabilities
Chapter 3 Review
4 Chapter 4 - Infrastructure Management Infrastructure Management
Topic A: Network Security Solutions
Network Architecture
Physical Network
Software-Defined Network
Virtual Private Cloud Network
Virtual Private Network
Virtualization Solutions
Network Segmentation
Demo - Virtual Network Segmentation
Demo - Data Collector Sets
Topic B: Identity and Access Management
IAM Concepts
Privilege Management
Multifactor Authentication
Demo - MFA Implementation
Identity Federation
Access Control Types
Demo - Access Control
Cloud Access Security Broker
Topic C: Additional Solutions
Monitoring and Logging
Cryptography
Demo - Encrypting File System and Certification Management
Chapter 4 Review
5 Chapter 5 - Hardware and Software Assurance Hardware and Software Assurance
Topic A: Hardware Assurance Best Practices
Hardware Root of Trust
Trusted Platform Module
Demo - BitLocker Drive Encryption
Hardware Security Module
eFuse
Unified Extensible Firmware Interface (UEFI)
Measured Boot and Attestation
Additional Hardware Options
Topic B: Software Assurance Best Practices
Platforms and Software Architecture
Service-Oriented Architecture
Software Development Lifecycle
Software Assessment Methods
Secure Coding
Chapter 5 Review
6 Chapter 6 - Monitoring Security Options Monitoring Security Options
Topic A: Security Data Analytics
Monitoring Fundamentals
Aggregating Data
Data Analysis
Topic B: Endpoint and Network Analysis
Endpoint Security
Network Analysis
Log Review
Demo - Logging and Monitoring
Impact Analysis
Topic C: Email Analysis
Social Engineering
Anti-SPAM
Demo- Configuring Anti-Spam Options in Exchange Online
Chapter 6 Review
7 Chapter 7 - Implementing Security Changes Implementing Security Changes
Topic A: Security Configuration Management
Fundamental Identity Configuration
Software Controls
Firewalls
Intrusion Detection Systems (IDS)
Data Loss Prevention
Endpoint Detection and Response
Network Access Control
Additional Techniques
Topic B: Threat Hunting
Understanding Threat Hunting
Threat Hunting Process
Establishing Hypothesis
Profiling Threat Actors
Threat Hunting Tactics Attack Surface Reduction
Topic C: Automating Security
Security Automation Concepts
Workflow Orchestration
Orchestration Playbooks
Scripting
API Integration
REST Principles
Security Content Automation Protocol
Software Engineering
Chapter 7 Review
8 Chapter 8 - Incident Response Incident Response
Topic A: Importance of Incident Response
Incident Response Process
Establishing Communications Processes
Internal Communications
External Communications
Identifying Critical Data
Topic B: Incident Response Procedures
Incident Response Cycle
Preparation Phase
Detection and Analysis
Containment
Containment Types
Eradication and Recovery
Eradication and Recovery (cont.)
Post-Incident Activities
Topic C: Analyzing Indicators of Compromise
Network-related Indicators
Host-related Indicators
Application-related Indicators
Demo - Analyzing IoCs
Topic D: Utilizing Digital Forensics Techniques
Digital Forensics
Using Network Tools
Demo - Using Wireshark
Capturing Endpoint Systems
Additional Forensics Situations
Building a Forensics Kit
Chapter 8 Review
9 Chapter 9 - Compliance and Assessment Compliance and Assessment
Topic A: Data Privacy and Protection
Security vs. Privacy
Data Types
Legal Requirements
Nontechnical Controls
Data Retention Standards
Technical Controls
Data Loss Prevention
Demo - Implementing DLP
Topic B: Risk Mitigation
Business Impact Analysis
BIA Steps
Risk Assessment
Risk Identification Process
Risk Calculation
Risk Prioritization
Security Controls
Training and Exercises
Topic C: Policies and Procedures
Code of Conduct
Control Types
Audits and Assessment
Chapter 9 Review
Course Closure
Self-Paced

Free

Enroll icon
This course includes: :
Full lifetime access