Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

CompTIA CySA+ (CS0-002) Cert Prep: 1 Threat Management

Description

Prepare to take and pass the CompTIA Cybersecurity Analyst (CySA+) exam. This course can prepare you for the Threat and Vulnerability Management domain of exam CS0-002.

Tags

Syllabus

Syllabus IntroductionHow to manage security threatsWhat you need to know1. Overview of the Role of a Cybersecurity AnalystThe goals of information securityRole of the cybersecurity analyst2. Understanding the Cybersecurity ThreatThreat actorsZero-days and the APTThreat classification3. Threat IntelligenceThreat intelligenceIntelligence cycleManaging threat indicatorsIntelligence sharing4. Threat ModelingThreat researchIdentifying threatsUnderstanding attacksThreat modelingThreat hunting5. Attack FrameworksMITRE ATT&CKDiamond Model of Intrusion AnalysisCyber kill chain analysis6. Malware ThreatsComparing viruses, worms, and TrojansComparing adware, spyware, and ransomwareUnderstanding backdoors and logic bombsLooking at advanced malwareUnderstanding botnets7. Environmental ReconnaissanceSocial engineeringDNS harvestingNetwork mappingEnumeration toolsProtocol analyzersWireless reconnaissanceThe importance of perspective8. Cloud SecurityWhat is the cloud?Cloud activities and the cloud reference architectureCloud deployment modelsPublic cloud tiersDevOpsCloud security risksConclusionWhat's next Read more


CompTIA CySA+ (CS0-002) Cert Prep: 1 Threat Management

Affiliate notice

Prepare to take and pass the CompTIA Cybersecurity Analyst (CySA+) exam. This course can prepare you for the Threat and Vulnerability Management domain of exam CS0-002.

Syllabus IntroductionHow to manage security threatsWhat you need to know1. Overview of the Role of a Cybersecurity AnalystThe goals of information securityRole of the cybersecurity analyst2. Understanding the Cybersecurity ThreatThreat actorsZero-days and the APTThreat classification3. Threat IntelligenceThreat intelligenceIntelligence cycleManaging threat indicatorsIntelligence sharing4. Threat ModelingThreat researchIdentifying threatsUnderstanding attacksThreat modelingThreat hunting5. Attack FrameworksMITRE ATT&CKDiamond Model of Intrusion AnalysisCyber kill chain analysis6. Malware ThreatsComparing viruses, worms, and TrojansComparing adware, spyware, and ransomwareUnderstanding backdoors and logic bombsLooking at advanced malwareUnderstanding botnets7. Environmental ReconnaissanceSocial engineeringDNS harvestingNetwork mappingEnumeration toolsProtocol analyzersWireless reconnaissanceThe importance of perspective8. Cloud SecurityWhat is the cloud?Cloud activities and the cloud reference architectureCloud deployment modelsPublic cloud tiersDevOpsCloud security risksConclusionWhat's next Read more