
$26.66
Identify Security Control Types | ||
---|---|---|
1. Identify Security Control Types (Introduction) | 1:00 | |
2. Cybersecurity Roles and Responsibilities (OBJ 5.3) | 7:00 | |
3. Security Operations Center (SOC) (OBJ 5.3) | 5:00 | |
4. Security Control Categories (OBJ 5.3) | 15:00 | |
5. Selecting Security Controls (OBJ 5.3) | 5:00 |
Classifying Threats | ||
---|---|---|
1. Classifying Threats (Introduction) | 1:00 | |
2. Threat Classification (OBJ 1.1) | 9:00 | |
3. Threat Actors (OBJ 1.1) | 9:00 | |
4. Malware (OBJ 1.1) | 8:00 | |
5. Threat Research (OBJ 1.2) | 11:00 | |
6. Attack Frameworks (OBJ 1.2) | 11:00 | |
7. Indicator Management (OBJ 1.1) | 7:00 |
Threat Hunting | ||
---|---|---|
1. Threat Hunting (Introduction) | 1:00 | |
2. Threat Modeling (OBJ 1.2) | 8:00 | |
3. Threat Hunting (OBJ 3.3) | 7:00 | |
4. Open-source Intelligence (OBJ 1.1) | 4:00 | |
5. Google Hacking (OBJ 1.1) | 8:00 | |
6. Profiling Techniques (OBJ 1.1) | 5:00 | |
7. Harvesting Techniques (OBJ 1.1) | 4:00 |
Network Forensics | ||
---|---|---|
1. Network Forensics (Introduction) | 2:00 | |
2. Network Forensic Tools (OBJ 3.1) | 4:00 | |
3. tcpdump (OBJ 4.4) | 8:00 | |
4. Wireshark (OBJ 4.4) | 11:00 | |
5. Flow Analysis (OBJ 3.1) | 6:00 | |
6. IP and DNS Analysis (OBJ 3.1) | 7:00 | |
7. URL Analysis (OBJ 3.1) | 16:00 | |
8. Conduct Packet Analysis (OBJ 4.4) | 6:00 |
Endpoint Monitoring | ||
---|---|---|
1. Endpoint Monitoring (Introduction) | 2:00 | |
2. Endpoint Analysis (OBJ 3.1) | 6:00 | |
3. Sandboxing (OBJ 3.2) | 4:00 | |
4. Reverse Engineering (OBJ 3.1) | 11:00 | |
5. Malware Exploitation (OBJ 3.1) | 8:00 | |
6. Behavior Analysis (OBJ 3.1) | 12:00 | |
7. Malware Analysis (OBJ 3.1) | 26:00 | |
8. EDR Configuration (OBJ 3.2) | 5:00 | |
9. Blacklisting and Whitelisting (OBJ 3.2) | 9:00 |
Configuring Your SIEM | ||
---|---|---|
1. Configuring Your SIEM (Introduction) | 1:00 | |
2. SIEM (OBJ 3.1) | 9:00 | |
3. Security Data Collection (OBJ 3.1) | 5:00 | |
4. Data Normalization (OBJ 3.1) | 8:00 | |
5. Event Log (OBJ 3.1) | 4:00 | |
6. Syslog (OBJ 3.1) | 6:00 | |
7. Configuring a SIEM Agent (OBJ 3.1) | 20:00 |
Analyzing Network IOCs | ||
---|---|---|
1. Analyzing Network IOCs (Introduction) | 1:00 | |
2. Analyzing Network IOCs (OBJ 4.3) | 2:00 | |
3. Traffic Spikes (OBJ 4.3) | 18:00 | |
4. Beaconing (OBJ 4.3) | 14:00 | |
5. Irregular P2P Communications (OBJ 4.3) | 8:00 | |
6. Rogue Devices (OBJ 4.3) | 11:00 | |
7. Scans and Sweeps (OBJ 4.3) | 5:00 | |
8. Nonstandard Port Usage (OBJ 4.3) | 11:00 | |
9. TCP Ports (OBJ 4.3) | 8:00 | |
10. UDP Ports (OBJ 4.3) | 7:00 | |
11. Data Exfiltration (OBJ 4.3) | 6:00 | |
12. Covert Channels (OBJ 4.3) | 8:00 | |
13. Analysis of Network IOCs (OBJ 4.3) | 13:00 |
Analyzing Host-related IOCs | ||
---|---|---|
1. Analyzing Host-related IOCs (Introduction) | 1:00 | |
2. Host-related IOCs (OBJ 4.3) | 2:00 | |
3. Malicious Processes (OBJ 4.3) | 10:00 | |
4. Memory Forensics (OBJ 4.3) | 7:00 | |
5. Consumption (OBJ 4.3) | 9:00 | |
6. Disk and File System (OBJ 4.3) | 11:00 | |
7. Unauthorized Privilege (OBJ 4.3) | 5:00 | |
8. Unauthorized Software (OBJ 4.3) | 6:00 | |
9. Unauthorized Change/Hardware (OBJ 4.3) | 3:00 | |
10. Persistence (OBJ 4.3) | 10:00 |
Analyzing Application-related IOCs | ||
---|---|---|
1. Analyzing Application-related IOCs (Introduction) | 2:00 | |
2. Application-related IOCs (OBJ 4.3) | 2:00 | |
3. Anomalous Activity (OBJ 4.3) | 4:00 | |
4. Service Interruptions (OBJ 4.3) | 5:00 | |
5. Application Logs (OBJ 4.3) | 13:00 | |
6. New Accounts (OBJ 4.3) | 6:00 | |
7. Virtualization Forensics (OBJ 4.3) | 6:00 | |
8. Mobile Forensics (OBJ 4.3) | 12:00 |
Analyzing Lateral Movement and Pivoting IOCs | ||
---|---|---|
1. Analyzing Lateral Movement and Pivoting IOCs (Introduction) | 1:00 | |
2. Lateral Movement and Pivoting (OBJ 4.3) | 3:00 | |
3. Pass the Hash (OBJ 4.3) | 10:00 | |
4. Golden Ticket (OBJ 4.3) | 7:00 | |
5. Lateral Movement (OBJ 4.3) | 7:00 | |
6. Pivoting (OBJ 4.3) | 6:00 |
Incident Response Preparation | ||
---|---|---|
1. Incident Response Preparation (Introduction) | 2:00 | |
2. Incident Response Phases (OBJ 4.2) | 12:00 | |
3. Documenting Procedures (OBJ 4.2) | 7:00 | |
4. Data Criticality (OBJ 4.1) | 14:00 | |
5. Communication Plan (OBJ 4.1) | 7:00 | |
6. Reporting Requirements (OBJ 4.1) | 5:00 | |
7. Response Coordination (OBJ 4.1) | 8:00 | |
8. Training and Testing (OBJ 4.2) | 7:00 |
Detection and Containment | ||
---|---|---|
1. Detection and Containment (Introduction) | 2:00 | |
2. OODA Loop (OBJ 4.2) | 6:00 | |
3. Defensive Capabilities (OBJ 4.2) | 5:00 | |
4. Detection and Analysis (OBJ 4.2) | 7:00 | |
5. Impact Analysis (OBJ 3.1) | 8:00 | |
6. Incident Classification (OBJ 4.2) | 6:00 | |
7. Containment (OBJ 4.2) | 6:00 |
Eradication, Recovery, and Post-incident Actions | ||
---|---|---|
1. Eradication, Recovery, and Post-incident Actions (Introduction) | 1:00 | |
2. Eradication (OBJ 4.2) | 6:00 | |
3. Eradication Actions (OBJ 4.2) | 4:00 | |
4. Recovery (OBJ 4.2) | 3:00 | |
5. Recovery Actions (OBJ 4.2) | 6:00 | |
6. Post-Incident Activities (OBJ 4.2) | 6:00 | |
7. Lessons Learned (OBJ 4.2) | 7:00 |
Frameworks, Policies, and Procedures | ||
---|---|---|
1. Frameworks, Policies, and Procedures (Introduction) | 1:00 | |
2. Enterprise Security Architecture (OBJ 5.3) | 3:00 | |
3. Prescriptive Frameworks (OBJ 5.3) | 4:00 | |
4. Risk-based Frameworks (OBJ 5.3) | 5:00 | |
5. Audits and Assessments (OBJ 5.3) | 7:00 | |
6. Continuous Monitoring (OBJ 5.3) | 5:00 |
Enumeration Tools | ||
---|---|---|
1. Enumeration Tools (OBJ 1.4) | 8:00 | |
2. Nmap Discovery Scans (OBJ 1.4) | 9:00 | |
3. Nmap Port Scans (OBJ 1.4) | 6:00 | |
4. Nmap Port States (OBJ 1.4) | 4:00 | |
5. Nmap Fingerprinting Scans (OBJ 1.4) | 4:00 | |
6. Using Nmap (OBJ 1.4) | 11:00 | |
7. Hping (OBJ 1.4) | 6:00 | |
8. Responder (OBJ 1.4) | 2:00 | |
9. Wireless Assessment Tools (OBJ 1.4) | 6:00 | |
10. Hashcat (OBJ 1.4) | 3:00 | |
11. Testing Credential Security (OBJ 1.4) | 3:00 |
Vulnerability Scanning | ||
---|---|---|
1. Identifying Vulnerabilities (OBJ 1.3) | 4:00 | |
2. Scanning Workflow (OBJ 1.3) | 7:00 | |
3. Scope Considerations (OBJ 1.3) | 8:00 | |
4. Scanner Types (OBJ 1.3) | 9:00 | |
5. Scanning Parameters (OBJ 1.3) | 6:00 | |
6. Scheduling and Constraints (OBJ 1.3) | 9:00 | |
7. Vulnerability Feeds (OBJ 3.4) | 3:00 | |
8. Scan Sensitivity (OBJ 1.3) | 5:00 | |
9. Scanning Risks (OBJ 1.3) | 3:00 |
Analyzing Output from Vulnerability Scanners | ||
---|---|---|
1. Scan Reports (OBJ 1.4) | 3:00 | |
2. Common Identifiers (OBJ 1.2) | 7:00 | |
3. CVSS (OBJ 1.2) | 8:00 | |
4. Vulnerability Reports (OBJ 1.3) | 11:00 | |
5. Nessus (OBJ 1.4) | 7:00 | |
6. OpenVAS and Qualys (OBJ 1.4) | 3:00 | |
7. Assessing Scan Outputs (OBJ 1.4) | 14:00 |
Mitigating Vulnerabilities | ||
---|---|---|
1. Mitigating Vulnerabilities (Introduction) | 2:00 | |
2. Remediation and Mitigation (OBJ 1.3) | 6:00 | |
3. Configuration Baselines (OBJ 1.3) | 4:00 | |
4. Hardening and Patching (OBJ 1.3) | 11:00 | |
5. Remediation Issues (OBJ 1.3) | 9:00 |
Identity and Access Management Solutions | ||
---|---|---|
1. Identity and Access Management (OBJ 2.1) | 7:00 | |
2. Password Policies (OBJ 5.3) | 6:00 | |
3. SSO and MFA (OBJ 2.1) | 6:00 | |
4. Certificate Management (OBJ 2.1) | 4:00 | |
5. Federation (OBJ 2.1) | 5:00 | |
6. Privilege Management (OBJ 2.1) | 6:00 | |
7. IAM Auditing (OBJ 2.1) | 6:00 | |
8. Conduct and Use Policies (OBJ 5.3) | 3:00 | |
9. Account and Permissions Audits (OBJ 2.1) | 5:00 |
Network Architecture and Segmentation | ||
---|---|---|
1. Asset and Change Management (OBJ 2.1) | 10:00 | |
2. Network Architecture (OBJ 2.1) | 9:00 | |
3. Segmentation (OBJ 2.1) | 6:00 | |
4. Jumpbox (OBJ 2.1) | 5:00 | |
5. Virtualization (OBJ 2.1) | 6:00 | |
6. Virtualized Infrastructure (OBJ 2.1) | 7:00 | |
7. Honeypots (OBJ 2.1) | 7:00 | |
8. Configuring Network Segmentation (OBJ 3.2) | 10:00 |
Hardware Assurance Best Practices | ||
---|---|---|
1. Supply Chain Assessment (OBJ 5.2) | 5:00 | |
2. Root of Trust (OBJ 2.3) | 5:00 | |
3. Trusted Firmware (OBJ 2.3) | 5:00 | |
4. Security Processing (OBJ 2.3) | 4:00 |
Non-technical Data and Privacy Controls | ||
---|---|---|
1. Data Classification (OBJ 5.1) | 9:00 | |
2. Data Types (OBJ 5.1) | 3:00 | |
3. Legal Requirements (OBJ 5.1) | 9:00 | |
4. Data Policies (OBJ 5.1) | 6:00 | |
5. Data Retention (OBJ 5.1) | 7:00 | |
6. Data Ownership (OBJ 5.1) | 4:00 | |
7. Data Sharing (OBJ 5.1) | 6:00 |
Technical Data and Privacy Controls | ||
---|---|---|
1. Access Controls (OBJ 5.1) | 3:00 | |
2. File System Permissions (OBJ 3.2) | 10:00 | |
3. Encryption (OBJ 5.1) | 3:00 | |
4. Data Loss Prevention (OBJ 5.1) | 4:00 | |
5. DLP Discovery and Classification (OBJ 3.2) | 4:00 | |
6. Deidentification Controls (OBJ 5.1) | 7:00 | |
7. DRM and Watermarking (OBJ 5.1) | 4:00 | |
8. Analyzing Share Permissions (OBJ 5.1) | 4:00 |
Mitigate Software Vulnerabilities and Attacks | ||
---|---|---|
1. SDLC Integration (OBJ 2.2) | 12:00 | |
2. Overflow Attacks (OBJ 1.7) | 14:00 | |
3. Race Conditions (OBJ 1.7) | 6:00 | |
4. Improper Error Handling (OBJ 1.7) | 5:00 | |
5. Design Vulnerabilities (OBJ 1.7) | 4:00 | |
6. Platform Best Practices (OBJ 2.2) | 7:00 |
Mitigate Web Application Vulnerabilities and Attacks | ||
---|---|---|
1. Directory Traversal (OBJ 1.7) | 8:00 | |
2. Cross-site Scripting (OBJ 1.7 | 8:00 | |
3. SQL Injection (OBJ 1.7) | 8:00 | |
4. XML Vulnerabilities (OBJ 1.7) | 5:00 | |
5. Secure Coding (OBJ 2.2) | 10:00 | |
6. Authentication Attacks (OBJ 1.7) | 7:00 | |
7. Session Hijacking (OBJ 1.7) | 7:00 | |
8. Sensitive Data Exposure (OBJ 1.7) | 3:00 | |
9. Clickjacking (OBJ 1.7) | 2:00 | |
10. Web Applications Vulnerabilities (OBJ 1.7) | 9:00 |
Analyzing Application Assessments | ||
---|---|---|
1. Software Assessments (OBJ 2.2) | 8:00 | |
2. Reverse Engineering (OBJ 1.4) | 7:00 | |
3. Dynamic Analysis (OBJ 1.4) | 8:00 | |
4. Web Application Scanners (OBJ 1.4) | 3:00 | |
5. Burp Suite (OBJ 1.4) | 11:00 | |
6. OWASP ZAP (OBJ 1.4) | 3:00 | |
7. Analyzing Web Applications (OBJ 1.4) | 16:00 |
Cloud and Automation | ||
---|---|---|
1. Cloud Models (OBJ 1.6) | 16:00 | |
2. Service Models (OBJ 1.6) | 11:00 | |
3. Cloud-based Infrastructure (OBJ 2.1) | 7:00 | |
4. CASB (OBJ 2.1) | 4:00 |
Service-Oriented Architecture | ||
---|---|---|
1. SOA and Microservices (OBJ 2.2) | 6:00 | |
2. SOAP (OBJ 2.2) | 5:00 | |
3. SAML (OBJ 2.2) | 7:00 | |
4. REST (OBJ 2.2) | 10:00 | |
5. API (OBJ 3.4) | 6:00 | |
6. Scripting (OBJ 3.4) | 4:00 | |
7. Workflow Orchestration (OBJ 3.4) | 6:00 | |
8. FAAS and Serverless (OBJ 1.6) | 8:00 |
Cloud Infrastructure Assessments | ||
---|---|---|
1. Cloud Threats (OBJ 1.6) | 8:00 | |
2. Cloud Tools (OBJ 1.4) | 4:00 | |
3. Cloud Forensics (OBJ 4.4) | 4:00 |
Automation Concepts and Technologies | ||
---|---|---|
1. CI/CD (OBJ 3.4) | 7:00 | |
2. DevSecOps (OBJ 2.2) | 5:00 | |
3. IAC (OBJ 1.6) | 4:00 | |
4. Machine Learning (OBJ 3.4) | 9:00 | |
5. Data Enrichment (OBJ 3.4) | 4:00 | |
6. SOAR (OBJ 3.4) | 3:00 |
Get 100% Real Exam Questions, Accurate & Verified Answers As Seen in the Real Exam!
30 Days Free Updates, Instant Download!
Free CS0-002 Exam Questions & CompTIA CS0-002 Dumps | ||
Comptia.braindumps.cs0-002.v2020-11-17.by.freddie.73q.ete |
Views: 78
Downloads: 2
|
Size: 1.1 MB
Votes: 1
|
Comptia.train4sure.cs0-002.v2020-08-08.by.arthur.25q.ete |
Views: 129
Downloads: 11
|
Size: 244.66 KB
Votes: 2
|
Only Registered Members
Can View Online Video Courses
Please fill out your email address below in order to view Online Courses.. Registration is Free and Easy, You Simply need to provide an email address.
Log into your Prepaway Account
Please Log In to view Online Course
Registration is free and easy - just provide your E-mail address.
Click Here to Register