-33%
CompTIA CSA+Certified Cyber Security Analyst – Mohamed Atef
$8.00
The CompTIA Cybersecurity Analyst, or CSA+, is a CompTIA certification focusing on the knowledge and skills required to configure and use threat-detection tools, perform data analysis, and interpreting the results with the end goal of securing an organization’
- Description
- Reviews (0)
Description
The CompTIA Cybersecurity Analyst, or CSA+, is a CompTIA certification focusing on the knowledge and skills required to configure and use threat-detection tools, perform data analysis, and interpreting the results with the end goal of securing an organization’
What does CompTIA CSA+Certified Cyber Security Analyst – Mohamed Atef include?
Introduction
- 1. Introduction (3:17)
Threat Management
- 2- Threat Managment Introduction (3:18)
- 3. Footprinting (14:12)
- 4. Email Harvest (9:51)
- 5. Google Hacking (10:36)
- 6. MetaGoofil (10:18)
- 7.People Search Engine (6:13)
- 8. Internet Archives and Alerts (7:04)
- 9. Maltego (8:40)
- 10. Using Maltego (8:14)
- 11. Related Entities in Maltego (3:51)
- 12. More Maltego (6:05)
- 13.Important Scanning Defination (13:19)
- 14 .Identifying Live system (6:41)
- 15. Port Scanning (14:24)
- 16.Advamced Scanning Techniques (7:23)
- 17.Network Mapping (11:41)
Vulnerability Management
- 18. Vulnerability Management Introduction (11:29)
- 19.Penetration Testing Standards (11:29)
- 20.VA vs PT (11:29)
- 21. Types ot PT (11:29)
- 22.Social Engineering PT (11:29)
- 23.Vulnerability Assessment (11:29)
- 24.Nessus Report 1 (13:25)rt
- 25.Nessus Report 2 (11:29)
- 26.OWASP ZAP VA (11:29)
- 27. Nexpose VA-1 (11:29)
- 28.Nexpose VA-2 (11:29)
- 29.Penetration Testing (11:29)
- 30.MetaSploit Pro 1 (14:32)
- 31.MetaSploit Pro 2 (11:29)
- 32.MetaSploit Pro 3 (11:29)
- 33.MetaSploit Community (11:29)
- 34.Armitage (11:20)
- 35.SQL Injection Introduction (11:20)
- 36. What is SQL Injection (11:20)
- 37.Is The Site Infected with SQL Injection (11:20)
- 38.The Amazing SQLMAP (11:20)
- 39.Live Example (11:20)
Cyber Incident Response
- 40. Incident Management 2 (11:25)
- 41. Incident Response Team (11:25)
- 42. Incident Report (11:25)
- 43. BCP – DRP (11:25)
- 44. Business Continuity Plan (14:36)
- 45. Business Impact Analysis 2 (11:25)
- 46. MTR – RTO – RPO (11:44)rt
- 47. Disaster Recovery Plan (11:25)
- 48. Alternative Sites (11:25)
- 49. Common Security Architecture Frameworks (12:17)
- 50. Trusted Computing Base (11:16)
- 51. Security Models (17:08)
- 52. TCSEC (11:16)
- 53. ITSEC (11:16)
Reviews
There are no reviews yet.