CompTIA Cybersecurity Analyst (CySA+) CS0-003

Video description

10+ Hours of Video Instruction

Get prepared to take on the CompTIA Cybersecurity Analyst (CySA+) exam!

The CompTIA Cybersecurity Analyst (CySA+) CS0-003 video course equips you with the knowledge and skills to detect, analyze, and respond to cybersecurity threats effectively. This comprehensive training program is designed to prepare you for the CySA+ certification exam while providing practical insights into the ever-evolving field of cybersecurity.

In this course, Aamir Lakhani takes you along a journey to become a proficient cybersecurity analyst capable of identifying and mitigating threats, protecting critical information, and ensuring the security of your organization's systems and data. Whether you're an aspiring cybersecurity professional looking to kickstart your career or an experienced IT professional seeking to enhance your knowledge, this course is tailored to meet your needs.

Sign up for cybersecurity live training classes by Aamir Lakhani

Topics covered include:

  •  Security Operations is the primary job and skill set a SOC analyst will need. Topics include System and Network Architecture, analyzing potential Malicious activity and tools, threat hunting, and the importance of efficiency in security operations.
  • Vulnerability management is about identifying vulnerabilities, understanding risks associated to vulnerabilities, and prioritizing remediation plans to deal with vulnerabilities. Here we will cover how to implement vulnerability scanning methods and tools, prioritize vulnerabilities, and recommend controls to mitigate attacks and software vulnerabilities.
  • Incident Response and Management are the techniques used when responding to a cyber-attack. We will take a look at several parts of a cyber-attack and cover specific areas of incident response as well as concepts of attack methodology frameworks, incident response activities, and the incident management life cycle.
  • Reporting and Communication skills are one of the most important things a cybersecurity professional must master. Here we will discuss the improtance of vulnerability management reporting and communication.
  • Certification Prep is a look at tips and tricks to help you pass the CySA+ certification exam. We discuss techniques that help you prepare for the test and share some last-minute prep items that can increase your chances of passing the exam. 

About the Instructor

Aamir Lakhani is a leading senior security strategist. He is responsible for providing IT security solutions to major enterprises and government organizations.

Mr. Lakhani creates technical security strategies and leads security implementation projects for Fortune 500 companies. Industries of focus include healthcare providers, educational institutions, financial institutions and government organizations. Aamir has designed offensive counter-defense measures for the Department of Defense and national intelligence agencies. He has also assisted organizations with safeguarding IT and physical environments from attacks perpetrated by underground cybercriminal groups. Mr. Lakhani is considered an industry leader for creating detailed security architectures within complex computing environments. His areas of expertise include cyber defense, mobile application threats, malware management, Advanced Persistent Threat (APT) research, and investigations relating to the Internet’s dark security movement. He is the author or contributor of several books, and has appeared on FOX Business News, National Public Radio, and other media outlets as an expert on cybersecurity.

Writing under the pseudonym Dr. Chaos, Mr. Lakhani also operates the popular security social media blog which is hosted at DrChaos.com. In its recent list of 46 Federal Technology Experts to Follow on Twitter, Forbes magazine described Aamir Lakhani as “a blogger, InfoSec specialist, superhero…and all around good guy.”

Skill Level:

  • Intermediate

Learn How To:

  • Prepare for every objective on the CompTIA Cybersecurity Analyst CySA+ exam
  • Leverage intelligence and threat detection techniques
  • Analyze and interpret data
  • Identify and address vulnerabilities
  • Suggest preventative measures
  • Effectively respond to and recover from incidents
  • Real-world cyber security configuration and detection skills
  • How to perform data analysis and interpret results to identify vulnerabilities, threats, and risks

Who Should Take This Course:

  • Anyone preparing for the CompTIA Cybersecurity Analyst CySA+ examination.
  • Anyone interested in learning cyber security fundamentals.

About Pearson Video Training:

Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video

Table of contents

  1. Introduction
    1. CompTIA Cybersecurity Analyst (CySA+) CS0-003: Introduction
  2. Module 1: Security Operations
    1. Module Introduction
  3. Lesson 1: Importance of System and Network Architecture Concepts in Security Operations
    1. Learning objectives
    2. 1.1 Log ingestion–Part 1
    3. 1.2 Log ingestion–Part 2
    4. 1.3 Operating system (OS) concepts
    5. 1.4 Infrastructure concepts
    6. 1.5 Network architecture
    7. 1.6 Identity and access management
    8. 1.7 Encryption
    9. 1.8 Sensitive data protection
  4. Lesson 2: Analyze Indicators of Potentially Malicious Activity
    1. Learning objectives
    2. 2.1 Network-related
    3. 2.2 Host-related
    4. 2.3 Application-related
    5. 2.4 Other
  5. Lesson 3: Tools or Techniques to Determine Malicious Activity
    1. Learning objectives
    2. 3.1 Tools
    3. 3.2 Tools–Part 2
    4. 3.3 Common techniques
    5. 3.4 Common techniques–Part 2
    6. 3.5 Common techniques–Part 3
    7. 3.6 Programming languages/scripting
  6. Lesson 4: Threat-Intelligence and Threat-Hunting Concepts
    1. Learning objectives
    2. 4.1 Threat actors
    3. 4.2 Threat actors-Part 2
    4. 4.3 Collection methods and sourcesConfidence levels
    5. 4.4 Threat hunting
  7. Lesson 5: Importance of Efficiency and Process Improvement in Security Operations
    1. Learning objectives
    2. 5.1 Standardize processes
    3. 5.2 Streamline operations
    4. 5.3 Technology and tool integration
  8. Module 2: Vulnerability Management
    1. Module Introduction
  9. Lesson 6: Implement Vulnerability Scanning Methods and Concepts
    1. Learning objectives
    2. 6.1 Asset discovery
    3. 6.2 Special considerations
    4. 6.3 Internal versus external scanning
    5. 6.4 Agent versus agentless
    6. 6.5 Credentialed versus non-credentialed
    7. 6.6 Passive versus active
    8. 6.7 Static versus dynamic
    9. 6.8 Critical infrastructure
    10. 6.9 Critical infrastructure–Part 2
  10. Lesson 7: Analyze Output from Vulnerability Assessment Tools
    1. Learning objectives
    2. 7.1 Network scanning and mapping
    3. 7.2 Web application scanners
    4. 7.3 Vulnerability scanners
    5. 7.4 Debuggers
    6. 7.5 Multipurpose
    7. 7.6 Cloud infrastructure assessment
    8. 7.7 Secure coding best practices
    9. 7.8 Input validation
    10. 7.9 Output encoding
    11. 7.10 Session management
    12. 7.11 Authentication
  11. Lesson 8: Analyze Data to Prioritize Vulnerabilities
    1. Learning objectives
    2. 8.1 Common Vulnerability Scoring System (CVSS) interpretation
    3. 8.2 Validation
    4. 8.3 Context awareness
    5. 8.4 Exploitability/weaponization
    6. 8.5 Asset value
    7. 8.6 Zero-day
  12. Lesson 9: Recommend Controls to Mitigate Attacks and Software Vulnerabilities
    1. Learning objectives
    2. 9.1 Cross-site scripting
    3. 9.2 Overflow vulnerabilities
    4. 9.3 Data poisoning
    5. 9.4 Broken access control
    6. 9.5 Cryptographic failures
    7. 9.6 Injection flaws
    8. 9.7 Cross-site request forgery
    9. 9.8 Directory traversal
    10. 9.9 Insecure design
    11. 9.10 Security misconfiguration
    12. 9.11 End-of-life or outdated components
    13. 9.12 Identification and authentication failures
    14. 9.13 Server-side request forgery
    15. 9.14 Remote code execution
    16. 9.15 Privilege escalation
    17. 9.16 Local file inclusion (LFI)/remote file inclusion (RFI)
  13. Lesson 10: Analyze Data to Prioritize Vulnerabilities
    1. Learning objectives
    2. 10.1 Compensating controls
    3. 10.2 Control types
    4. 10.3 Patching and configuration management
    5. 10.4 Maintenance windows
    6. 10.5 Exceptions
    7. 10.6 Risk management principles
    8. 10.7 Policies, governance, and service-level objectives (SLOs)
    9. 10.8 Prioritization and escalation
    10. 10.9 Attack surface management
    11. 10.10 Secure coding best practices
    12. 10.11 Secure software development life cycle (SDLC)
    13. 10.12 Threat modeling
  14. Module 3: Incident Response and Management
    1. Module Introduction
  15. Lesson 11: Concepts Related to Attack Methodology Frameworks
    1. Learning objectives
    2. 11.1 Cyber kill chains
    3. 11.2 Diamond Model of Intrusion Analysis
    4. 11.3 MITRE ATT
    5. 11.4 MITRE ATT–Part 2
    6. 11.5 Open Source Security Testing Methodology Manual (OSS TMM)
    7. 11.6 OWASP Testing Guide
  16. Lesson 12: Incident Response Activites
    1. Learning objectives
    2. 12.1 Detection and analysis
    3. 12.2 Containment, eradication, and recovery
  17. Lesson 13: Preparation and Post-incident Activity Phases of the Incident Management Life Cycle
    1. Learning objectives
    2. 13.1 Preparation
    3. 13.2 Post-incident activity
  18. Module 4: Reporting and Communication
    1. Module Introduction
  19. Lesson 14: Vulnerability Management Reporting and Communication
    1. Learning objectives
    2. 14.1 Vulnerability management reporting
    3. 14.2 Compliance reports
    4. 14.3 Action plans
    5. 14.4 Inhibitors to remediation
    6. 14.5 Metrics and key performance indicators (KPIs)
    7. 14.6 Stakeholder identification and communication
  20. Module 5: Certification Exam
    1. Module Introduction
  21. Lesson 15: Preparing for and Taking the CySA+
    1. Learning objectives
    2. 15.1 Understanding the test
    3. 15.2 Types of test questions
    4. 15.3 Increasing your chances for passing the test
  22. Lesson 16: Next Steps
    1. Learning objectives
    2. 16.1 What I learned
  23. Summary
    1. CompTIA Cybersecurity Analyst (CySA+) CS0-003: Summary

Product information

  • Title: CompTIA Cybersecurity Analyst (CySA+) CS0-003
  • Author(s): Aamir Lakhani
  • Release date: December 2023
  • Publisher(s): Pearson
  • ISBN: 013832025X