Library

Course: CompTIA Cybersecurity Analyst CSA+ CS0-001. The Total Course

CompTIA Cybersecurity Analyst CSA+ CS0-001. The Total Course

  • Life Time Access
  • Certificate on Completion
  • Access on Android and iOS App
About this Course

Welcome to CompTIA Cybersecurity Analyst CSA+ CS0-001. The Total Course from Total Seminars and Brent Chapman.

This course covers everything you need to know to pass your CompTIA CSA+ Certification (CS0-001) Exam. The first goal of the course is to make you an outstanding cybersecurity analyst and in the process, make sure you are ready to pass the CompTIA exam.

The course covers all the CompTIA CSA+ CS0-001 Objective Domains:

  • Threat Management: 27%
  • Vulnerability Management: 26%
  • Cyber Incident Response: 23%
  • Security Architecture and Tool Sets: 24%

Topics include:

  •  Threat and vulnerability management
  •  Conducting an analyzing reconnaissance 
  •  Responding to network-based threats
  •  Securing a corporate network
  •  Cyber incident response
  •  Determining the impact of incidents
  •  Preparing the incident response toolkit

CSA+ provides substantial earnings potential

A career in information security analysis ranked seventh on U.S. News and World Report’s list of the 100 best technology jobs for 2017. According to the Bureau of Labor Statistics, the median pay for an information security analyst is $90,120 per year.

CSA+ certified skills are in-demand

Properly trained IT security staff who can analyze, monitor and protect cybersecurity resources are in high demand. The U.S. Bureau of Labor Statistics (BLS) predicts that information security analysts will be the fastest growing overall job category, with 37 percent overall growth between 2012 and 2022.

Follow the CompTIA Cybersecurity Certification Pathway

IT Fundamentals > A+ > Network+ > Security+ > CSA+ > CASP

Who is the target audience?

  • This course is intended for anyone who is interested in a Cybersecurity position or looking to improve their security skills. The course will prepare you to pass the CompTIA CSA+ Certification Exam. It goes beyond certification and gives you the skills you need to be a better cybersecurity analyst
Basic knowledge
  • Basic familiarity with PCs and networks
  • There are no specific prerequisites as the course covers all the topics in detail
  • It is a good idea to have an understanding of CompTIA A+, Network+, and Security+ or to be certified in these topics. You can learn more about these certifications from our Mike Meyers - Total Seminars CompTIA A+, Network+, and Security+ Certification courses on Simpliv
What you will learn
  • This is a complete and comprehensive CompTIA CSA+ Certification (CS0-001) course. It is designed to prepare the student to be able to take and pass the Cybersecurity Analyst exam and become CompTIA CSA+ Certified
  • Learn skills to break into a career in information security analysis, which ranks 7th in the 100 best tech jobs for 2017, and is predicted to be the fastest growing overall job category between 2012-2022. Cybersecurity Analysts earn a median pay of $90,120
Curriculum
Number of Lectures: 51
Total Duration: 07:01:36
Introduction
  • Introduction  

    In this series, Brent will teach you everything you need to know about becoming a CompTIA CSA+ certified Cybersecurity Analyst. This introduction includes an additional resource link to the CompTIA CSA+ exam objectives. 

    At the beginning of each section, you'll find a downloadable PDF of the notes for each chapter. 

Conducting Reconnaissance
  • Thinking Like the Enemy  

    Learn how attackers are positioning & collecting information for targeting attacks. 

  • Tools of the Trade  

    Use scanning tools to identify network & system vulnerabilities. 

Analyzing Reconnaissance Results
  • Recon Results: Part 1  

    Explore recon methods & tools to look at single events & complete system-wide scans.

  • Recon Results: Part 2  

    Understand types & proper usage of analysis methods. 

  • Data Output  

    Learn the various types of information that can be found in your log files. 

Responding to Network-Based Threats
  • Protecting Your Territory  

    Understand the usage of physical & logical segmentation as a defense strategy. 

  • Hardening Strategies  

    Learn network-hardening techniques. 

Securing a Corporate Environment
  • Pen Testing  

    Understand pen testing methods & procedures. 

  • Training  

    Learn about the teaming process, & how to keep a security program in a “ready state.”

  • Reverse Engineering  

    Learn about detecting counterfeit hardware & fraudulent software files. 

  • Risk Evaluation  

    Learn about risk evaluation methods & logic for prioritization of threat responses.

Vulnerability Management
  • Requirements Identification  

    Understand the importance of correct policies & procedures used to protect assets. 

  • Scanning  

    Learn about setting up vulnerability scanning criteria, reviewing resources & scoping.

  • Configuring and Executing Scans  

    Create & configure a Nessus scan.

  • Reporting and Remediating  

    See how remediation can be addressed in various environments. 

Analyzing Vulnerabilities Scan Results
  • Common Vulnerabilities: Part 1  

    Learn about great vulnerability resources to use in security programs. 

  • Common Vulnerabilities: Part 2  

    Get insights on how to manage challenges with vulnerabilities. 

Incident Response
  • Incident Response Process  

    Understand the incident response process, phases, elements & plan.  

  • IR Roles and Responsibilities  

    Understand the importance of creating the IR communication policies, responsibilities, & roles. 

Preparation Phase
  • IR Active Preparation  

    Learn to spot indicators of compromise, & determine your IR response & scope of impact. 

  • Threat Trends  

    Understand the profile of attackers, & learn about their attributes. 

Forensic Tools
  • Digital Forensics  

    Learn the implications, methods, & processes of collecting digital forensic data. 

  • Seizure and Acquisitions  

    Learn the ins & outs of keeping a forensic investigation on track. 

  • Forensics Acquisition Tools  

    Learn to use hash methods to maintain the integrity of a file. 

  • Forensics Analysis: Part 1  

    Use Windows-based tools to manually collect evidence for forensic investigations. 

  • Forensics Analysis: Part 2  

    Use Linux-based tools to manually collect evidence for forensic investigations. 

Common Symptoms of Compromise
  • Network Symptoms  

    Learn to find common network symptoms of compromise to enable quick response times. 

  • Host Symptoms  

    Learn to use built-in tools to find common host symptoms of compromise. 

  • Application Symptoms  

    Discover various tools to pin-point application symptoms of compromise. 

Incident Recovery and Post-Incident Response Process
  • Moving Forward: Part 1  

    Discover the steps in the recovery process after an incident has occurred. 

  • Moving Forward: Part 2  

    Learn the steps to work through the reconstruction process.

Frameworks, Common Policies, Controls, and Procedures
  • Frameworks  

    Learn about the various best practices frameworks available for security implementation. 

  • Policies  

    Get familiar with some of the foundational core policies that every security program should include. 

  • Controls & Procedures  

    Learn the different controls & control types, & how & when they are used. 

  • Verifications  

    Explore the various methods of verification & the proper usage of each type. 

Identity and Access Management
  • Context-Based Authentication  

    Learn about identification methods & how through context, identities are verified.  

  • Identities  

    Understand authentication methods & processes to ensure you have the right controls in place to maintain a secure environment for a variety of interfaces. 

  • Managing Identities  

    Learn about the authentication protocols & identity management along with the weaknesses & the inherent exposures. 

  • Exploits  

    Explore authentication exploits & their executions, & where to harden a network through controls or policies. 

Defense Strategies
  • Data Analytics  

    Learn how to use analytics to think & respond more quickly. 

  • Defense in Depth  

    Learn important tips & controls to stay in front of issues that can affect a security model. 

Software Development Life Cycle (SDLC)
  • Secure Software Development  

    Understand when & where security should be injected into the software development life    cycle. 

  • Best Coding Practices  

    Review best top 10 coding practices for secure software development practices. 

Tools and Technologies
  • Preventative Tools: Part 1  

    Take a deeper dive to see intrusion detection & intrusion prevention using various tools. 

  • Preventative Tools: Part 2  

    Use security mitigation technologies & web application firewall tools to enhance security. 

  • Collective Tools  

    Learn how collection tools can be used to expose areas in your network that need to be hardened. 

  • Vulnerability Scanning  

    Use vulnerability analysis tools to quickly see areas of weakness, along with the available resources & solutions to address the issues. 

  • Packet Capture  

    Learn how to capture packets, analyze, & interpret them to see what’s happening across a wired or wireless network. 

  • Connectivity Tools  

    Explore the various network connectivity tools & how they are used to troubleshoot or gather information on protocols & connection activities on a network. 

  • Pen Testing Tools  

    Learn how to use pen testing tools to see vulnerabilities that can be hardened in a system.

Reviews (0)