Previous Lesson
Complete and Continue
Back to Course Curriculum
CompTIA CySA+ Course
Understanding Vulnerability Response, Handling, & Management
Introduction (2:16)
Understanding Cybersecurity Leadership Concepts (8:58)
Exploring the Lab Environment (25:07)
Exploring Control Types and Methods (12:50)
Configuring Controls (39:02)
Explaining Patch Management Concepts (11:04)
Exploring Threat Intelligence and Threat Hunting Concepts
Introduction (2:31)
Exploring Threat Actor Concepts (10:54)
Reviewing IoC and Threat Intelligence Sources (32:29)
Identifying Active Threats (15:34)
Exploring Threat-Hunting Concepts (12:40)
Performing Threat Hunting (42:41)
Explaining Important System and Network Architecture Concepts
Introduction (1:43)
Reviewing System and Network Architecture Concepts (24:08)
Exploring Identity and Access Management (IAM) (9:51)
Configuring Centralized Logging (33:45)
Maintaining Operational Visibility (10:21)
Understanding Process Improvement in Security Operations
Introduction (1:28)
Understanding Technology for Security Operations (4:54)
Implementing Vulnerability Scanning Methods
Introduction (1:13)
Explaining Compliance Requirements (17:13)
Understanding Vulnerability Scanning Methods (24:13)
Exploring Special Considerations in Vulnerability Scanning (7:02)
Performing Asset Discovery (16:18)
Performing Vulnerability Analysis
Introduction (1:34)
Understanding Vulnerability Scoring Concepts (10:09)
Exploring Vulnerability Context Considerations (6:46)
Establishing Context Awareness (19:45)
Communicating Vulnerability Information
Introduction (1:18)
Explaining Effective Communication Concepts (17:06)
Analyzing Vulnerability Reports (20:24)
Understanding Vulnerability Reporting Outcomes and Action Plans (12:18)
Explaining Incident Response Activities
Introduction (1:20)
Exploring Incident Response Planning (22:19)
Performing Incident Response Activities (15:40)
Demonstrating Incident Response Communication
Introduction (1:36)
Understanding Incident Response Communication (10:01)
Analyzing Incident Response Activities (8:01)
Applying Tools to Identify Malicious Activity
Introduction (1:16)
Identifying Malicious Activity (10:41)
Explaining Attack Methodology Frameworks (7:44)
Explaining Techniques for Identifying Malicious Activity (20:14)
Analyzing Potentially Malicious Activity
Introduction (1:34)
Exploring Network Attack Indicators (19:40)
Exploring Host Attack Indicators (16:28)
Exploring Vulnerability Assessment Tools (19:46)
Understanding Application Vulnerability Assessment
Introduction (1:13)
Analyzing Web Vulnerabilities (5:39)
Analyzing Cloud Vulnerabilities (2:42)
Analyzing Cloud Vulnerabilities (5:25)
Exploring Scripting Tools and Analysis Concepts
Introduction (1:10)
Understanding Scripting Languages (19:55)
Identifying Malicious Activity Through Analysis (8:17)
Understanding Application Security and Attack Mitigation Best Practices
Introduction (1:08)
Exploring Secure Software Development Practices (15:04)
Recommending Controls to Mitigate Successful Application Attacks (12:07)
Implementing Controls to Prevent Attacks (2:03)
Understanding Incident Response Communication
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock