We couldn't find any listings for your search. Explore our online options and related educators below to see if they help you.
Know someone teaching this? Help them become an Educator on Cademy.
Classroom based, instructor led workshop with proctor at home exam. The lab-intensive Certified SOC Analyst (CSA) program emphasizes the holistic approach to deliver the advanced knowledge of how to identify, validate and defend against cyber-attacks.
Are you looking to enhance your Information Security Manager skills? If yes, then you have come to the right place. Our comprehensive course on Information Security Manager will assist you in producing the best possible outcome by mastering the Information Security Manager skills. The Information Security Manager course is for those who want to be successful. In the Information Security Manager course, you will learn the essential knowledge needed to become well versed in Information Security Manager. Our Information Security Manager course starts with the basics of Information Security Manager and gradually progresses towards advanced topics. Why would you choose the Information Security Manager course from Compliance Central: Lifetime access to Information Security Manager course materials Full tutor support is available from Monday to Friday with the Information Security Manager course Learn Information Security Manager skills at your own pace from the comfort of your home Gain a complete understanding of Information Security Manager course Accessible, informative Information Security Manager learning modules designed by experts Get 24/7 help or advice from our email and live chat teams with the Information Security Manager Curriculum Breakdown of the Information Security Manager Course Course Outline: Module 01: Introduction Module 02: Organisational Security Management Module 03: Risk Analysis and Risk Reduction Module 04: Physical and Information Security Protection Module 05: Business Resilience and Crisis Management Module 06: Cyber Security and Fraud Prevention Module 07: Security Investigations and Threat Awareness Module 08: Laws and Regulations CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? The Information Security Manager course helps aspiring professionals who want to obtain the knowledge and familiarise themselves with the skillsets to pursue a career in Information Security Manager. Requirements To enrol in this Information Security Manager course, all you need is a basic understanding of the English Language and an internet connection. Career path Information Security Analyst: £40,000 to £70,000 per year Cybersecurity Consultant: £45,000 to £80,000 per year IT Risk Manager: £50,000 to £90,000 per year Security Operations Center (SOC) Analyst: £35,000 to £60,000 per year Penetration Tester (Ethical Hacker): £40,000 to £75,000 per year Chief Information Security Officer (CISO): £70,000 to £150,000 per year Certificates CPD Accredited PDF Certificate Digital certificate - Included CPD Accredited PDF Certificate CPD Accredited Hard Copy Certificate Hard copy certificate - £10.79 CPD Accredited Hard Copy Certificate Delivery Charge: Inside the UK: Free Outside of the UK: £9.99 each
Are you looking to enhance your Computer Networks Security skills? If yes, then you have come to the right place. Our comprehensive course on Computer Networks Security will assist you in producing the best possible outcome by mastering the Computer Networks Security skills. The Computer Networks Security course is for those who want to be successful. In the Computer Networks Security course, you will learn the essential knowledge needed to become well versed in Computer Networks Security. Our Computer Networks Security course starts with the basics of Computer Networks Security and gradually progresses towards advanced topics. Therefore, each lesson of this Computer Networks Security course is intuitive and easy to understand. Why would you choose the Computer Networks Security course from Compliance Central: Lifetime access to Computer Networks Security course materials Full tutor support is available from Monday to Friday with the Computer Networks Security course Learn Computer Networks Security skills at your own pace from the comfort of your home Gain a complete understanding of Computer Networks Security course Accessible, informative Computer Networks Security learning modules designed by expert instructors Get 24/7 help or advice from our email and live chat teams with the Computer Networks Security bundle Study Computer Networks Security in your own time through your computer, tablet or mobile device. A 100% learning satisfaction guarantee with your Computer Networks Security Course Improve your chance of gaining in demand skills and better earning potential by completing the Computer Networks Security Computer Networks Security Curriculum Breakdown of the Computer Networks Security Course Introduction Section 01: An Introduction to Computer Networks Section 02: ISO/OSI Model Section 03: TCP/IP Protocols Section 04: Wireless Networks Section 05: Network Security Section 06: Firewalls and Honeypots Section 07: Intrusion Detection and Prevention System Section 08: Wireless Network Security Section 09: Physical Security and Incident Handling Section 10: Network Security: Conclusion CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? The Computer Networks Security course helps aspiring professionals who want to obtain the knowledge and familiarise themselves with the skillsets to pursue a career in Computer Networks Security. It is also great for professionals who are already working in Computer Networks Security and want to get promoted at work. Requirements To enrol in this Computer Networks Security course, all you need is a basic understanding of the English Language and an internet connection. Career path The Computer Networks Security course will enhance your knowledge and improve your confidence. Network Security Specialist: £40,000 to £65,000 per year Information Security Analyst: £35,000 to £55,000 per year Cybersecurity Consultant: £45,000 to £70,000 per year Penetration Tester (Ethical Hacker): £35,000 to £60,000 per year Security Operations Center (SOC) Analyst: £30,000 to £50,000 per year Certificates CPD Accredited Certificate of Completion Free Digital certificate - Included CPD Accredited PDF Certificate CPD Accredited Certificate of Completion Free Hard copy certificate - £10.79 CPD Accredited Hard Copy Certificate Delivery Charge: Inside the UK: Free Outside of the UK: £9.99 each
Duration 5 Days 30 CPD hours This course is intended for This course is intended for Ethical Hackers, Penetration Testers, Network Server Administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment Professionals, Cybersecurity Forensic Analyst, Cyberthreat Analyst, Cloud Security, Analyst Information Security Consultant, Application Security Analyst, Cybersecurity Assurance Engineer, Security Operations Center (SOC) Analyst, Technical Operations Network Engineer, Information Security Engineer, Network Security Penetration Tester, Network Security Engineer, Information Security Architect. Overview Upon successful completion of this course, students will master their Penetration Testing skills, perform the repeatable methodology, become committed to the code of ethics, and present analyzed results through structured reports. The main course outcomes include: 100% mapped with the NICE framework. Maps to the job role of a Penetration Tester and security analyst, based on major job portals. 100% methodology-based Penetration Testing program. Provides strong reporting writing guidance. Blended with both manual and automated Penetration Testing approaches. Gives a real-world experience through an Advanced Penetration Testing Range. Designed based on the most common Penetration Testing services offered by the best service providers in the market. Offers standard templates that can help during a Penetration test. This is a multidisciplinary course with extensive hands-on training in a wide range of crucial skills, including advanced Windows attacks, Internet of Things (IoT) and Operational Technology (OT) systems, filtered network bypass techniques, exploit writing, single and double pivoting, advanced privilege escalation, and binary exploitation. Course Outline Introduction to Penetration Testing Penetration Testing Scoping and Engagement Open Source Intelligence (OSINT) Social Engineering Penetration Testing Network Penetration Testing ? External Network Penetration Testing ? Internal Network Penetration Testing - Perimeter Devices Web Application Penetration Testing Wireless Penetration Testing IoT Penetration Testing OT/SCADA Penetration Testing Cloud Penetration Testing Binary Analysis and Exploitation Report Writing and Post-Testing Actions Additional course details: Nexus Humans Certified Penetration Testing Professional (CPENT) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Penetration Testing Professional (CPENT) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
QLS Endorsed + CPD QS Accredited - Dual Certification | Instant Access | 24/7 Tutor Support | All-Inclusive Cost
Are you considering a career in the booming cybersecurity industry? Becoming a cybersecurity expert can be tricky and filled with many questions. Looking for answers on what skills you need, what kinds of jobs can you apply for, and what kinds of certifications do you need to possess? Then, this course on careers in cybersecurity is just for you.
Course Overview: Cyber security is one of the most essential topics in the world today. In the UK alone, businesses lose an average of £1.3 million per year to cybercrime. And as the world becomes increasingly interconnected, the threat of cyber attacks will only grow. That's where Cyber Security Awareness Training comes to play. That's why it's so important for everyone to be aware of cyber security risks and how to protect themselves. This course will teach you everything you need to know about cyber security, from computer security basics to the latest threats and trends. We aim to equip you with the knowledge and skills to protect yourself and your digital assets from cyber threats. This course has been meticulously designed to address the growing demand for cybersecurity awareness in today's digital landscape. Enrol in this Cyber Security Awareness Training course today and start learning about cyber security! Key Features of the Course: You will be awarded a prestigious CPD certificate upon completing the Cyber Security Awareness Training. Our dedicated team of experts stands ready to support you at every step of your learning journey, providing round-the-clock assistance whenever needed. Immerse yourself in various captivating learning materials, from interactive videos to thought-provoking case studies. Who is This Course For? This Cyber Security Awareness Training course, is for individuals from diverse backgrounds, all sharing a common desire to fortify their digital resilience. Whether you're an aspiring IT professional, a small business owner, or a concerned individual who values online security, this course will equip you with the essential knowledge and skills to safeguard your digital presence effectively. What You Will Learn: Embark on a transformative journey as you explore the core modules of our Cyber Security Awareness Training. Throughout our comprehensive curriculum, you will gain valuable insights into: Cyber Attacks: Understand the various types of cyber attacks and the strategies employed by malicious actors. Cybercrimes: Explore the world of cybercrimes and the impact they have on individuals and organisations. Password Management:Master creating solid and secure passwords to fortify your digital accounts. Internet Browsing: Discover safe browsing practices and effective measures to mitigate online risks. Office and Remote Work Security: Learn how to protect sensitive data and maintain security while working in office or remote environments. Device Management: Acquire essential skills for securing and managing devices to safeguard against cyber threats. Preventative Measures: Uncover proactive measures and best practices to prevent cyber attacks and maintain digital safety. Why Enrol in This Course: Enrolling in our Cyber Security Awareness Training will give you a competitive edge in the digital landscape. This top-reviewed course is continually updated to reflect the latest trends and emerging threats, ensuring you stay one step ahead of cybercriminals. The knowledge and skills you acquire will enhance your online security and open doors to a wide range of career opportunities in cybersecurity-related roles. Requirements: No prior experience or technical background is necessary to benefit from this Cyber Security Awareness Training course. All you need is a curiosity to learn and a willingness to explore the world of cyber security. Career Path: Upon completion of this Cyber Security Awareness Training course, you will be well-equipped for various cybersecurity-related roles, including: Cyber Security Analyst - £35,000 per annum IT Security Consultant - £50,000 per annum Network Security Engineer - £45,000 per annum Information Security Officer - £40,000 per annum Security Operations Centre (SOC) Analyst - £30,000 per annum Incident Response Specialist - £55,000 per annum Ethical Hacker - £60,000 per annum Certification: Upon completing the Cyber Security Awareness Training, you will receive a CPD certificate, recognised and valued by employers and professional bodies, showcasing your commitment to cyber security excellence. Course Curriculum 9 sections • 9 lectures • 03:00:00 total length •Introduction to Cyber Security: 00:22:00 •Cyber Attacks: 00:15:00 •Cybercrimes: 00:18:00 •Cyber Security and Data Breaches: 00:20:00 •Password Management: 00:25:00 •Internet Browsing: 00:22:00 •Office and Remote Work Security: 00:20:00 •Device Management: 00:18:00 •Preventative Measures: 00:20:00
CompTIA Security+ Certification is a comprehensive course covering essential aspects of information security, designed to equip learners with the foundational knowledge and skills needed to navigate the complex landscape of cybersecurity.
Getting Started The objective of the QUALIFI Level 5 Extended Diploma in Networking and Cyber Security is to offer learners an expanded and comprehensive grasp of networking and cyber security concepts. The key points are: Successful completion of this qualification is expected to result in learners acquiring a broader comprehension of cybersecurity. Learners will also gain practical knowledge in implementing networking systems to mitigate and eliminate cybersecurity risks. Key Benefits Comprehend intricate cybersecurity threats and risks within the business context. Gain an understanding of various database categories and their associated control mechanisms. Gain an understanding of the formal procedures involved in investigating significant computer incidents. Gain an understanding of the methodologies and processes involved in planning and designing a security audit for a cyber-network. Utilize the various elements and components of physical networking. Key Highlights Are you a practicing IT Professional seeking greater knowledge and understanding of the industry, and to support your development into senior positions? Then, the Qualifi Level 5 Extended Diploma in Networking and Cyber Security is the ideal starting point for your career journey. The course will pave the way for a career and help individuals prepare to become professional staff and managers of the future in the health and social care sector. Remember! The assessment for the qualification is based on assignments only, and you do not need to worry about taking any exams. With the School of Business and Technology London, you can complete the qualification at your own pace, choosing online or blended learning from the comfort of your home. Learning and pathway materials, along with study guides developed by our Qualifi-approved tutors, will be available around the clock in our cutting-edge learning management system. Most importantly, at the School of Business and Technology London, we will provide you with comprehensive tutor support through our dedicated support desk. If you choose the blended learning option, you will also enjoy live sessions with an assigned tutor, which you can book at your convenience. Career Pathways Upon completion of the Level 5 Extended Diploma in Networking and Cyber Security, graduates may pursue various career paths in education and training, such as: Penetration Tester; with an estimated average salary of £56,394 per annum. SOC Analyst; with an estimated average salary of £50,000 per annum. Data privacy consultant; with an estimated average salary of £60,000 per annum. Network Engineer; with an estimated average salary of £48,279 per annum. About Awarding Body QUALIFI, recognised by Ofqual awarding organisation has assembled a reputation for maintaining significant skills in a wide range of job roles and industries which comprises Leadership, Hospitality & Catering, Health and Social Care, Enterprise and Management, Process Outsourcing and Public Services. They are liable for awarding organisations and thereby ensuring quality assurance in Wales and Northern Ireland. What is included? Outstanding tutor support that gives you supportive guidance all through the course accomplishment through the SBTL Support Desk Portal. Access our cutting-edge learning management platform to access vital learning resources and communicate with the support desk team. Quality learning materials such as structured lecture notes, study guides, and practical applications, which include real-world examples and case studies, will enable you to apply your knowledge. Learning materials are provided in one of the three formats: PDF, PowerPoint, or Interactive Text Content on the learning portal. The tutors will provide Formative assessment feedback to improve the learners' achievements. Assessment materials are accessible through our online learning platform. Supervision for all modules. Multiplatform accessibility through an online learning platform facilitates SBTL in providing learners with course materials directly through smartphones, laptops, tablets or desktops, allowing students to study at their convenience. Live Classes (for Blended Learning Students only) Assessment · Assignment based Assessment · No exam Entry Requirements The qualification has been intentionally designed to ensure accessibility without unnecessary obstacles hindering entry and advancement. To enrol in the qualification, you should: Be 18 years or above. For international students whose first language is not English, they will need to have a score of 6 or above in IELTS (International English Language Testing System). Progression Upon successfully obtaining the QUALIFI Level 5 Extended Diploma in Networking and Cyber Security and the Diploma in Family Office and Wealth Inheritance Management, learners will have the opportunity to advance in the following ways: Pursue a higher academic qualification such as the QUALIFI Level 7 Diploma. Enroll in a university to complete a full-fledged degree program. Secure employment in a related professional field. Learners must request before enrolment to interchange unit(s) other than the preselected units shown in the SBTL website because we need to make sure the availability of learning materials for the requested unit(s). SBTL will reject an application if the learning materials for the requested interchange unit(s) are unavailable. Learners are not allowed to make any request to interchange unit(s) once enrolment is complete. UNIT1- Cyber Security Threat and Risk. Reference No : T/617/1129 Credit : 20 || TQT : 200 In this unit, learners will receive an introduction to a range of threats and vulnerabilities originating from the digital realm. The unit will explore diverse attack methodologies and employ case studies to dissect different threat vectors, encompassing Malware, Botnets, and Trojans. UNIT2- Network Security and Data Communications Reference No : K/617/1130 Credit : 20 || TQT : 200 In this unit, learners will examine the constituent elements of digital communications and their compatibility with IT networks, along with hardware, firmware, and software components. UNIT3- Database Security and Computer Programming Reference No : M/617/1131 Credit : 20 || TQT : 200 In this unit, learners will delve into the security vulnerabilities associated with database systems and strategies for mitigating these risks. UNIT4- Incident Response, Investigations, and Forensics Reference No : T/617/1132 Credit : 20 || TQT : 200 In this unit, learners will investigate topics related to incident response, Computer Emergency Response Teams (CERTs), and events that necessitate investigative techniques. UNIT5- Security Strategy: Laws, Policies, and Implementation Reference No : A/617/1133 Credit : 20 || TQT : 200 In this unit, learners will consolidate the knowledge acquired in previous units and further enhance their skills in crafting strategic plans, securing executive support, and ensuring legal compliance. UNIT6- Physical IT Networking Reference No : K/617/6697 Credit : 20 || TQT : 200 This unit's objective is to furnish learners with an understanding of physical networking and fundamental network administration skills. It encompasses knowledge of computer networks. UNIT7- Cryptography Reference No : J/617/4634 Credit : 20 || TQT : 200 This unit's objective is to furnish learners with an understanding of physical networking and fundamental network administration skills. It encompasses knowledge of computer networks. UNIT8- Digital Investigations and Forensics Reference No : L/617/4635 Credit : 20 || TQT : 200 This unit provides a description and explanation of how to carry out investigations using cyber-enabled equipment, including within public internet-facing networks and other network environments. UNIT9- System Administration Reference No : R/617/6743 Credit : 20 || TQT : 200 This unit's goal is to furnish learners with the knowledge required to administer systems in both Linux and Windows operating environments. UNIT10- Network Routing and Switching Reference No : Y/617/6744 Credit : 20 || TQT : 200 The objective of this unit is to impart the knowledge necessary for performing switching and the skills and knowledge needed for routing. This includes the ability to set up and configure routers and switches for the interconnection of multi-area networks. UNIT11- Network Design and Administration Reference No : D/617/6745 Credit : 20 || TQT : 200 This unit's aim is to equip learners with the knowledge and skills required to design a network. This encompasses understanding how to scale and connect diverse networks to create an efficient interconnected network. Delivery Methods School of Business & Technology London provides various flexible delivery methods to its learners, including online learning and blended learning. Thus, learners can choose the mode of study as per their choice and convenience. The program is self-paced and accomplished through our cutting-edge Learning Management System. Learners can interact with tutors by messaging through the SBTL Support Desk Portal System to discuss the course materials, get guidance and assistance and request assessment feedbacks on assignments. We at SBTL offer outstanding support and infrastructure for both online and blended learning. We indeed pursue an innovative learning approach where traditional regular classroom-based learning is replaced by web-based learning and incredibly high support level. Learners enrolled at SBTL are allocated a dedicated tutor, whether online or blended learning, who provide learners with comprehensive guidance and support from start to finish. The significant difference between blended learning and online learning methods at SBTL is the Block Delivery of Online Live Sessions. Learners enrolled at SBTL on blended learning are offered a block delivery of online live sessions, which can be booked in advance on their convenience at additional cost. These live sessions are relevant to the learners' program of study and aim to enhance the student's comprehension of research, methodology and other essential study skills. We try to make these live sessions as communicating as possible by providing interactive activities and presentations. Resources and Support School of Business & Technology London is dedicated to offering excellent support on every step of your learning journey. School of Business & Technology London occupies a centralised tutor support desk portal. Our support team liaises with both tutors and learners to provide guidance, assessment feedback, and any other study support adequately and promptly. Once a learner raises a support request through the support desk portal (Be it for guidance, assessment feedback or any additional assistance), one of the support team members assign the relevant to request to an allocated tutor. As soon as the support receives a response from the allocated tutor, it will be made available to the learner in the portal. The support desk system is in place to assist the learners adequately and streamline all the support processes efficiently. Quality learning materials made by industry experts is a significant competitive edge of the School of Business & Technology London. Quality learning materials comprised of structured lecture notes, study guides, practical applications which includes real-world examples, and case studies that will enable you to apply your knowledge. Learning materials are provided in one of the three formats, such as PDF, PowerPoint, or Interactive Text Content on the learning portal. How does the Online Learning work at SBTL? We at SBTL follow a unique approach which differentiates us from other institutions. Indeed, we have taken distance education to a new phase where the support level is incredibly high.Now a days, convenience, flexibility and user-friendliness outweigh demands. Today, the transition from traditional classroom-based learning to online platforms is a significant result of these specifications. In this context, a crucial role played by online learning by leveraging the opportunities for convenience and easier access. It benefits the people who want to enhance their career, life and education in parallel streams. SBTL's simplified online learning facilitates an individual to progress towards the accomplishment of higher career growth without stress and dilemmas. How will you study online? With the School of Business & Technology London, you can study wherever you are. You finish your program with the utmost flexibility. You will be provided with comprehensive tutor support online through SBTL Support Desk portal. How will I get tutor support online? School of Business & Technology London occupies a centralised tutor support desk portal, through which our support team liaise with both tutors and learners to provide guidance, assessment feedback, and any other study support adequately and promptly. Once a learner raises a support request through the support desk portal (Be it for guidance, assessment feedback or any additional assistance), one of the support team members assign the relevant to request to an allocated tutor. As soon as the support receive a response from the allocated tutor, it will be made available to the learner in the portal. The support desk system is in place to assist the learners adequately and to streamline all the support process efficiently. Learners should expect to receive a response on queries like guidance and assistance within 1 - 2 working days. However, if the support request is for assessment feedback, learners will receive the reply with feedback as per the time frame outlined in the Assessment Feedback Policy.
Embark on a transformative journey with the 'CompTIA CySA+ Cybersecurity Analyst Course,' designed to fortify the digital frontiers of business. This comprehensive training program begins with an immersive introduction to the cybersecurity realm, setting the stage for a deep dive into the sophisticated world of threat data and intelligence. With an emphasis on real-world application, participants will gain invaluable insights into organizational security, developing the acumen to anticipate, identify, and neutralize digital threats. Mastery over vulnerability assessment tools and mitigation strategies forms the bedrock of this curriculum, providing learners with a robust skill set pivotal for the modern cybersecurity landscape. Learning Outcomes Interpret threat data to reinforce organizational security frameworks. Assess vulnerabilities using state-of-the-art tools and methodologies. Apply best practices for ensuring software and hardware assurance. Analyze security solutions for robust infrastructure management. Implement and manage incident response protocols to address potential compromises effectively. Why choose this CompTIA CySA+ Cybersecurity Analyst Course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments are designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the CompTIA CySA+ Cybersecurity Analyst Course Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Who is this CompTIA CySA+ Cybersecurity Analyst Course for? Individuals aiming to specialize in cybersecurity analysis. IT professionals seeking to broaden their cybersecurity knowledge. Organizational staff responsible for managing digital security risks. Security consultants requiring up-to-date threat intelligence expertise. System administrators looking to implement enhanced security measures. Career path Cybersecurity Analyst - £25,000 to £60,000 Vulnerability Analyst - £30,000 to £65,000 Security Operations Centre (SOC) Analyst - £32,000 to £70,000 Incident Responder - £27,000 to £68,000 Digital Forensics Specialist - £35,000 to £75,000 Information Security Consultant - £40,000 to £80,000 Prerequisites This CompTIA CySA+ Cybersecurity Analyst Course does not require you to have any prior qualifications or experience. You can just enrol and start learning.This CompTIA CySA+ Cybersecurity Analyst Course was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Section 01: Introduction Introduction 00:02:00 All about the Exam 00:08:00 What's New on the CompTIA CySA+ Exam? 00:05:00 Meet the Instructors 00:02:00 Thinking like the Enemy 00:09:00 Section 02: The Importance of Threat Data and Intelligence Intelligence Sources and Confidence Levels 00:08:00 Threat Indicators and Actors 00:08:00 Threat Trends 00:07:00 Intelligence Cycle and ISACs 00:06:00 Section 03: Threat Intelligence in Support of Organizational Security Attack Frameworks 00:06:00 Threat Research 00:11:00 Threat Modeling and Intelligence Sharing 00:06:00 Section 04: Vulnerability Assessment Tools Vulnerability Identification 00:07:00 Scanning Parameters and Criteria 00:09:00 Scanning Special Considerations 00:06:00 Validation 00:03:00 Remediation and Mitigation 00:08:00 Inhibitors to Remediation 00:07:00 Section 05: Threats and Vulnerabilities Associated with Specialized Technology Web Applications Scanners, Part 1 00:10:00 Web Applications Scanners, Part 2 00:05:00 Scanning 00:06:00 Configuring and Executing Scans 00:08:00 Vulnerability Scanning 00:10:00 Reverse Engineering 00:08:00 Enumeration 00:06:00 Wireless Assessment Tools 00:08:00 Cloud Assessment Tools 00:04:00 Section 06: Threats and Vulnerabilities Associated with Specialized Technology Mobile and IoT 00:10:00 Embedded and Firmware Systems (RTOS, SoC, and FPGA) 00:09:00 Access and Vehicles Risk 00:08:00 Automation and Control Risk 00:10:00 Section 07: Threats and Vulnerabilities Associated with Operating in the Cloud Cloud Models 00:07:00 Remote Service Invocation (FaaS, IaC, API) 00:10:00 Cloud Vulnerabilities 00:06:00 Section 08: Mitigating Controls for Attacks and Software Vulnerabilities Injection and Overflow Attacks 00:09:00 Authentication Attacks 00:07:00 Exploits 00:08:00 Application Vulnerabilities, Part 1 00:08:00 Application Vulnerabilities, Part 2 00:07:00 Section 09: Security Solutions for Infrastructure Management Network Architecture and Asset Management 00:09:00 Protecting Your Territory 00:05:00 Identity and Access Management 00:11:00 Encryption and Active Defense 00:08:00 Section 10: Software Assurance Best Practices Platforms 00:07:00 SOA and DevSecOps 00:09:00 Secure Software Development 00:08:00 Best Coding Practices 00:04:00 Section 11: Hardware Assurance Best Practices Trusted Hardware 00:10:00 Hardware Encryption 00:04:00 Hardware Security 00:08:00 Section 12: Data Analysis in Security Monitoring Activities Data Analytics 00:10:00 Endpoint Security 00:08:00 Recon Results, Part 1 00:13:00 Recon Results, Part 2 00:05:00 Impact Analysis 00:05:00 Collective Tools 00:09:00 Query Writing 00:07:00 E-mail Analysis, Part 1 00:10:00 E-mail Analysis, Part 2 00:08:00 Section 13: Implement Configuration Changes to Existing Controls to Improve Security Permissions 00:09:00 Firewalls 00:08:00 Intrusion Prevention Rules 00:05:00 DLP and Endpoint Detection 00:05:00 Section 14: The Importance of Proactive Threat Hunting Threat Hunting and the Hypothesis 00:06:00 Threat Hunting Process 00:07:00 Results and Benefits 00:05:00 Section 15: Compare and Contrast Automation Concepts and Technologies Workflow and Scripting 00:07:00 API and Malware Signature Creation 00:08:00 Threat Feeds and Machine Learning 00:06:00 Protocols, Standards, and Software Engineering 00:05:00 Section 16: The Importance of the Incident Response Process IR Roles and Responsibilities 00:08:00 IR Active Preparation 00:10:00 Section 17: Appropriate Incident Response Procedures Incident Response Process 00:07:00 Section 18: Analyze Potential Indicators of Compromise Network Symptoms 00:04:00 Host Symptoms 00:08:00 Application Symptoms 00:04:00 Section 19: Utilize Basic Digital Forensics Techniques Digital Forensics 00:10:00 Seizure and Acquisitions 00:05:00 Forensics Acquisition Tools 00:09:00 Mobile, Virtualization, and Cloud 00:06:00 Forensics Analysis, Part 1 00:04:00 Forensics Analysis, Part 2 00:08:00 Packet Capture 00:12:00 Section 20: The Importance of Data Privacy and Protection Data Privacy and Security 00:06:00 Nontechnical Controls 00:09:00 Technical Controls 00:08:00 Section 21: Security Concepts in Support of Organizational Risk Mitigation Business Impact Analysis 00:05:00 Risk Identification 00:05:00 Risk Calculation and Communication 00:06:00 Training 00:04:00 Supply Chain Assessment 00:04:00 Section 22: The Importance of Frameworks, Policies, Procedures, and Controls Frameworks 00:13:00 Policies and Procedures 00:05:00 Controls and Procedures 00:08:00 Verification 00:06:00 Assignment Assignment - CompTIA CySA+ Cybersecurity Analyst Course 00:00:00