CompTIA CySA+ Certification Exam (CS0-002) Video Course

CS0-002: CompTIA CySA+ Certification Exam (CS0-002)

Your CompTIA CS0-002 exam is just around the corner, right? So, it's high time to find an effective preparation tool! Our training course is what you really need! This is a series of videos led by the experienced IT instructors who will provide you with a detailed overview of the CS0-002 certification test. Ace your CompTIA CS0-002 at the first attempt and obtain the CompTIA CySA+ Certification Exam (CS0-002) credential with ease.

# of Students
114
# of Lectures
280
Course Length
1 h
Course Rating
5.0
Price $27.49
Today $24.99

Curriculum for CS0-002 Video Course

Identify Security Control Types

  Video Name Time
  1. Identify Security Control Types (Introduction) 1:00
  2. Cybersecurity Roles and Responsibilities (OBJ 5.3) 7:00
  3. Security Operations Center (SOC) (OBJ 5.3) 5:00
  4. Security Control Categories (OBJ 5.3) 15:00
  5. Selecting Security Controls (OBJ 5.3) 5:00
  Video Name Time
  1. Threat Intelligence Sharing (Introduction) 1:00
  2. Security and Threat Intelligence (OBJ 1.1) 5:00
  3. Intelligence Cycle (OBJ 1.1) 10:00
  4. Intelligence Sources (OBJ 1.1) 9:00
  5. Information Sharing and Analysis Centers (ISACS) (OBJ 1.1) 4:00
  6. Threat Intelligence Sharing (OBJ 1.2) 5:00
  Video Name Time
  1. Classifying Threats (Introduction) 1:00
  2. Threat Classification (OBJ 1.1) 9:00
  3. Threat Actors (OBJ 1.1) 9:00
  4. Malware (OBJ 1.1) 8:00
  5. Threat Research (OBJ 1.2) 11:00
  6. Attack Frameworks (OBJ 1.2) 11:00
  7. Indicator Management (OBJ 1.1) 7:00
  Video Name Time
  1. Threat Hunting (Introduction) 1:00
  2. Threat Modeling (OBJ 1.2) 8:00
  3. Threat Hunting (OBJ 3.3) 7:00
  4. Open-source Intelligence (OBJ 1.1) 4:00
  5. Google Hacking (OBJ 1.1) 8:00
  6. Profiling Techniques (OBJ 1.1) 5:00
  7. Harvesting Techniques (OBJ 1.1) 4:00
  Video Name Time
  1. Network Forensics (Introduction) 2:00
  2. Network Forensic Tools (OBJ 3.1) 4:00
  3. tcpdump (OBJ 4.4) 8:00
  4. Wireshark (OBJ 4.4) 11:00
  5. Flow Analysis (OBJ 3.1) 6:00
  6. IP and DNS Analysis (OBJ 3.1) 7:00
  7. URL Analysis (OBJ 3.1) 16:00
  8. Conduct Packet Analysis (OBJ 4.4) 6:00
  Video Name Time
  1. Appliance Monitoring (Introduction) 1:00
  2. Firewall Logs (OBJ 3.1) 11:00
  3. Firewall Configurations (OBJ 3.2) 19:00
  4. Proxy Logs (OBJ 3.1) 6:00
  5. Web Application Firewall Logs (OBJ 3.1) 3:00
  6. IDS and IPS Configuration (OBJ 3.2) 7:00
  7. IDS and IPS Logs (OBJ 3.1) 9:00
  8. Port Security Configuration (OBJ 3.2) 6:00
  9. NAC Configuration (OBJ 3.2) 7:00
  10. Analysis of Security Appliances (OBJ 3.2) 16:00
  Video Name Time
  1. Endpoint Monitoring (Introduction) 2:00
  2. Endpoint Analysis (OBJ 3.1) 6:00
  3. Sandboxing (OBJ 3.2) 4:00
  4. Reverse Engineering (OBJ 3.1) 11:00
  5. Malware Exploitation (OBJ 3.1) 8:00
  6. Behavior Analysis (OBJ 3.1) 12:00
  7. Malware Analysis (OBJ 3.1) 26:00
  8. EDR Configuration (OBJ 3.2) 5:00
  9. Blacklisting and Whitelisting (OBJ 3.2) 9:00
  Video Name Time
  1. Email Monitoring (Introduction) 2:00
  2. Email IOCs (OBJ 3.1) 5:00
  3. Email Header Analysis (OBJ 3.1) 11:00
  4. Email Content Analysis (OBJ 3.1) 4:00
  5. Email Server Security (OBJ 3.1) 8:00
  6. SMTP Log Analysis (OBJ 3.1) 5:00
  7. Email Message Security (OBJ 3.1) 6:00
  8. Analyzing Email Headers (OBJ 4.3) 4:00
  Video Name Time
  1. Configuring Your SIEM (Introduction) 1:00
  2. SIEM (OBJ 3.1) 9:00
  3. Security Data Collection (OBJ 3.1) 5:00
  4. Data Normalization (OBJ 3.1) 8:00
  5. Event Log (OBJ 3.1) 4:00
  6. Syslog (OBJ 3.1) 6:00
  7. Configuring a SIEM Agent (OBJ 3.1) 20:00
  Video Name Time
  1. Analyzing Your SIEM (Introduction) 1:00
  2. SIEM Dashboards (OBJ 3.1) 12:00
  3. Analysis and Detection (OBJ 3.1) 7:00
  4. Trend Analysis (OBJ 3.1) 10:00
  5. Rule and Query Writing (OBJ 3.1) 5:00
  6. Searching and Piping Commands (OBJ 3.1) 18:00
  7. Scripting Tools (OBJ 3.1) 9:00
  8. Analyzing, Filtering, and Searching Logs (OBJ 3.1) 7:00
  Video Name Time
  1. Digital Forensics (Introduction) 2:00
  2. Digital Forensic Analysts (OBJ 4.4) 5:00
  3. Forensics Procedures (OBJ 4.4) 9:00
  4. Work Product Retention (OBJ 4.4) 3:00
  5. Data Acquisition (OBJ 4.4) 5:00
  6. Forensics Tools (OBJ 4.4) 8:00
  7. Memory Acquisition (OBJ 4.4) 5:00
  8. Disk Image Acquisition (OBJ 4.4) 12:00
  9. Hashing (OBJ 4.4) 5:00
  10. Timeline Generation (OBJ 4.4) 5:00
  11. Carving (OBJ 4.4) 6:00
  12. Chain of Custody (OBJ 4.4) 6:00
  13. Collecting and Validating Evidence (OBJ 4.4) 9:00
  Video Name Time
  1. Analyzing Network IOCs (Introduction) 1:00
  2. Analyzing Network IOCs (OBJ 4.3) 2:00
  3. Traffic Spikes (OBJ 4.3) 18:00
  4. Beaconing (OBJ 4.3) 14:00
  5. Irregular P2P Communications (OBJ 4.3) 8:00
  6. Rogue Devices (OBJ 4.3) 11:00
  7. Scans and Sweeps (OBJ 4.3) 5:00
  8. Nonstandard Port Usage (OBJ 4.3) 11:00
  9. TCP Ports (OBJ 4.3) 8:00
  10. UDP Ports (OBJ 4.3) 7:00
  11. Data Exfiltration (OBJ 4.3) 6:00
  12. Covert Channels (OBJ 4.3) 8:00
  13. Analysis of Network IOCs (OBJ 4.3) 13:00
  Video Name Time
  1. Analyzing Host-related IOCs (Introduction) 1:00
  2. Host-related IOCs (OBJ 4.3) 2:00
  3. Malicious Processes (OBJ 4.3) 10:00
  4. Memory Forensics (OBJ 4.3) 7:00
  5. Consumption (OBJ 4.3) 9:00
  6. Disk and File System (OBJ 4.3) 11:00
  7. Unauthorized Privilege (OBJ 4.3) 5:00
  8. Unauthorized Software (OBJ 4.3) 6:00
  9. Unauthorized Change/Hardware (OBJ 4.3) 3:00
  10. Persistence (OBJ 4.3) 10:00
  Video Name Time
  1. Analyzing Application-related IOCs (Introduction) 2:00
  2. Application-related IOCs (OBJ 4.3) 2:00
  3. Anomalous Activity (OBJ 4.3) 4:00
  4. Service Interruptions (OBJ 4.3) 5:00
  5. Application Logs (OBJ 4.3) 13:00
  6. New Accounts (OBJ 4.3) 6:00
  7. Virtualization Forensics (OBJ 4.3) 6:00
  8. Mobile Forensics (OBJ 4.3) 12:00
  Video Name Time
  1. Analyzing Lateral Movement and Pivoting IOCs (Introduction) 1:00
  2. Lateral Movement and Pivoting (OBJ 4.3) 3:00
  3. Pass the Hash (OBJ 4.3) 10:00
  4. Golden Ticket (OBJ 4.3) 7:00
  5. Lateral Movement (OBJ 4.3) 7:00
  6. Pivoting (OBJ 4.3) 6:00
  Video Name Time
  1. Incident Response Preparation (Introduction) 2:00
  2. Incident Response Phases (OBJ 4.2) 12:00
  3. Documenting Procedures (OBJ 4.2) 7:00
  4. Data Criticality (OBJ 4.1) 14:00
  5. Communication Plan (OBJ 4.1) 7:00
  6. Reporting Requirements (OBJ 4.1) 5:00
  7. Response Coordination (OBJ 4.1) 8:00
  8. Training and Testing (OBJ 4.2) 7:00
  Video Name Time
  1. Detection and Containment (Introduction) 2:00
  2. OODA Loop (OBJ 4.2) 6:00
  3. Defensive Capabilities (OBJ 4.2) 5:00
  4. Detection and Analysis (OBJ 4.2) 7:00
  5. Impact Analysis (OBJ 3.1) 8:00
  6. Incident Classification (OBJ 4.2) 6:00
  7. Containment (OBJ 4.2) 6:00
  Video Name Time
  1. Eradication, Recovery, and Post-incident Actions (Introduction) 1:00
  2. Eradication (OBJ 4.2) 6:00
  3. Eradication Actions (OBJ 4.2) 4:00
  4. Recovery (OBJ 4.2) 3:00
  5. Recovery Actions (OBJ 4.2) 6:00
  6. Post-Incident Activities (OBJ 4.2) 6:00
  7. Lessons Learned (OBJ 4.2) 7:00
  Video Name Time
  1. Risk Mitigation (Introduction) 1:00
  2. Risk Identification Process (OBJ 5.2) 8:00
  3. Conducting an Assessment (OBJ 5.2) 9:00
  4. Risk Calculation (OBJ 5.2) 12:00
  5. Business Impact Analysis (OBJ 5.2) 12:00
  6. Risk Prioritization (OBJ 5.2) 17:00
  7. Communicating Risk (OBJ 5.2) 8:00
  8. Training and Exercises (OBJ 5.2) 5:00
  Video Name Time
  1. Frameworks, Policies, and Procedures (Introduction) 1:00
  2. Enterprise Security Architecture (OBJ 5.3) 3:00
  3. Prescriptive Frameworks (OBJ 5.3) 4:00
  4. Risk-based Frameworks (OBJ 5.3) 5:00
  5. Audits and Assessments (OBJ 5.3) 7:00
  6. Continuous Monitoring (OBJ 5.3) 5:00
  Video Name Time
  1. Enumeration Tools (OBJ 1.4) 8:00
  2. Nmap Discovery Scans (OBJ 1.4) 9:00
  3. Nmap Port Scans (OBJ 1.4) 6:00
  4. Nmap Port States (OBJ 1.4) 4:00
  5. Nmap Fingerprinting Scans (OBJ 1.4) 4:00
  6. Using Nmap (OBJ 1.4) 11:00
  7. Hping (OBJ 1.4) 6:00
  8. Responder (OBJ 1.4) 2:00
  9. Wireless Assessment Tools (OBJ 1.4) 6:00
  10. Hashcat (OBJ 1.4) 3:00
  11. Testing Credential Security (OBJ 1.4) 3:00
  Video Name Time
  1. Identifying Vulnerabilities (OBJ 1.3) 4:00
  2. Scanning Workflow (OBJ 1.3) 7:00
  3. Scope Considerations (OBJ 1.3) 8:00
  4. Scanner Types (OBJ 1.3) 9:00
  5. Scanning Parameters (OBJ 1.3) 6:00
  6. Scheduling and Constraints (OBJ 1.3) 9:00
  7. Vulnerability Feeds (OBJ 3.4) 3:00
  8. Scan Sensitivity (OBJ 1.3) 5:00
  9. Scanning Risks (OBJ 1.3) 3:00
  Video Name Time
  1. Scan Reports (OBJ 1.4) 3:00
  2. Common Identifiers (OBJ 1.2) 7:00
  3. CVSS (OBJ 1.2) 8:00
  4. Vulnerability Reports (OBJ 1.3) 11:00
  5. Nessus (OBJ 1.4) 7:00
  6. OpenVAS and Qualys (OBJ 1.4) 3:00
  7. Assessing Scan Outputs (OBJ 1.4) 14:00
  Video Name Time
  1. Mitigating Vulnerabilities (Introduction) 2:00
  2. Remediation and Mitigation (OBJ 1.3) 6:00
  3. Configuration Baselines (OBJ 1.3) 4:00
  4. Hardening and Patching (OBJ 1.3) 11:00
  5. Remediation Issues (OBJ 1.3) 9:00
  Video Name Time
  1. Identity and Access Management (OBJ 2.1) 7:00
  2. Password Policies (OBJ 5.3) 6:00
  3. SSO and MFA (OBJ 2.1) 6:00
  4. Certificate Management (OBJ 2.1) 4:00
  5. Federation (OBJ 2.1) 5:00
  6. Privilege Management (OBJ 2.1) 6:00
  7. IAM Auditing (OBJ 2.1) 6:00
  8. Conduct and Use Policies (OBJ 5.3) 3:00
  9. Account and Permissions Audits (OBJ 2.1) 5:00
  Video Name Time
  1. Asset and Change Management (OBJ 2.1) 10:00
  2. Network Architecture (OBJ 2.1) 9:00
  3. Segmentation (OBJ 2.1) 6:00
  4. Jumpbox (OBJ 2.1) 5:00
  5. Virtualization (OBJ 2.1) 6:00
  6. Virtualized Infrastructure (OBJ 2.1) 7:00
  7. Honeypots (OBJ 2.1) 7:00
  8. Configuring Network Segmentation (OBJ 3.2) 10:00
  Video Name Time
  1. Supply Chain Assessment (OBJ 5.2) 5:00
  2. Root of Trust (OBJ 2.3) 5:00
  3. Trusted Firmware (OBJ 2.3) 5:00
  4. Security Processing (OBJ 2.3) 4:00
  Video Name Time
  1. Mobile Vulnerabilities (OBJ 1.5) 12:00
  2. IoT Vulnerabilities (OBJ 1.5) 3:00
  3. Embedded System Vulnerabilities (OBJ 1.5) 7:00
  4. ICS & SCADA Vulnerabilities (OBJ 1.5) 8:00
  5. Mitigating Vulnerabilities (OBJ 1.5) 4:00
  6. Premise System Vulnerabilities (OBJ 1.5) 6:00
  7. Vehicular Vulnerabilities (OBJ 1.5) 7:00
  Video Name Time
  1. Data Classification (OBJ 5.1) 9:00
  2. Data Types (OBJ 5.1) 3:00
  3. Legal Requirements (OBJ 5.1) 9:00
  4. Data Policies (OBJ 5.1) 6:00
  5. Data Retention (OBJ 5.1) 7:00
  6. Data Ownership (OBJ 5.1) 4:00
  7. Data Sharing (OBJ 5.1) 6:00
  Video Name Time
  1. Access Controls (OBJ 5.1) 3:00
  2. File System Permissions (OBJ 3.2) 10:00
  3. Encryption (OBJ 5.1) 3:00
  4. Data Loss Prevention (OBJ 5.1) 4:00
  5. DLP Discovery and Classification (OBJ 3.2) 4:00
  6. Deidentification Controls (OBJ 5.1) 7:00
  7. DRM and Watermarking (OBJ 5.1) 4:00
  8. Analyzing Share Permissions (OBJ 5.1) 4:00
  Video Name Time
  1. SDLC Integration (OBJ 2.2) 12:00
  2. Overflow Attacks (OBJ 1.7) 14:00
  3. Race Conditions (OBJ 1.7) 6:00
  4. Improper Error Handling (OBJ 1.7) 5:00
  5. Design Vulnerabilities (OBJ 1.7) 4:00
  6. Platform Best Practices (OBJ 2.2) 7:00
  Video Name Time
  1. Directory Traversal (OBJ 1.7) 8:00
  2. Cross-site Scripting (OBJ 1.7 8:00
  3. SQL Injection (OBJ 1.7) 8:00
  4. XML Vulnerabilities (OBJ 1.7) 5:00
  5. Secure Coding (OBJ 2.2) 10:00
  6. Authentication Attacks (OBJ 1.7) 7:00
  7. Session Hijacking (OBJ 1.7) 7:00
  8. Sensitive Data Exposure (OBJ 1.7) 3:00
  9. Clickjacking (OBJ 1.7) 2:00
  10. Web Applications Vulnerabilities (OBJ 1.7) 9:00
  Video Name Time
  1. Software Assessments (OBJ 2.2) 8:00
  2. Reverse Engineering (OBJ 1.4) 7:00
  3. Dynamic Analysis (OBJ 1.4) 8:00
  4. Web Application Scanners (OBJ 1.4) 3:00
  5. Burp Suite (OBJ 1.4) 11:00
  6. OWASP ZAP (OBJ 1.4) 3:00
  7. Analyzing Web Applications (OBJ 1.4) 16:00
  Video Name Time
  1. Cloud Models (OBJ 1.6) 16:00
  2. Service Models (OBJ 1.6) 11:00
  3. Cloud-based Infrastructure (OBJ 2.1) 7:00
  4. CASB (OBJ 2.1) 4:00
  Video Name Time
  1. SOA and Microservices (OBJ 2.2) 6:00
  2. SOAP (OBJ 2.2) 5:00
  3. SAML (OBJ 2.2) 7:00
  4. REST (OBJ 2.2) 10:00
  5. API (OBJ 3.4) 6:00
  6. Scripting (OBJ 3.4) 4:00
  7. Workflow Orchestration (OBJ 3.4) 6:00
  8. FAAS and Serverless (OBJ 1.6) 8:00
  Video Name Time
  1. Cloud Threats (OBJ 1.6) 8:00
  2. Cloud Tools (OBJ 1.4) 4:00
  3. Cloud Forensics (OBJ 4.4) 4:00
  Video Name Time
  1. CI/CD (OBJ 3.4) 7:00
  2. DevSecOps (OBJ 2.2) 5:00
  3. IAC (OBJ 1.6) 4:00
  4. Machine Learning (OBJ 3.4) 9:00
  5. Data Enrichment (OBJ 3.4) 4:00
  6. SOAR (OBJ 3.4) 3:00

Student Feedback

5 Stars
4 Stars
3 Stars
2 Stars
1 Star
5.0
Rating: 5.0
Overall Rating: Good.

Similar Courses

Only Registered Members can View Training Courses

Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.

  • Trusted by 1.2M IT Certification Candidates Every Month
  • Hundreds Hours of Videos
  • Instant download After Registration

Already Member? Click here to Login

A confirmation link will be sent to this email address to verify your login

1200+ IT Certification Exams available: Get a free sample of any exam right now!
Try Free Demo

Try Free Demo

  • ABA
  • ACAMS
  • ACFE
  • ACI
  • ACSM
  • Adobe
  • AHIMA
  • AHIP
  • AHLEI
  • AICPA
  • AIWMI
  • Alfresco
  • Alibaba
  • AMA
  • Amazon
  • AndroidATC
  • APBM
  • API
  • APICS
  • Apple
  • Arista
  • ASIS
  • ASQ
  • Atlassian
  • Autodesk
  • Avaya
  • Axis Communications
  • BACB
  • BCS
  • Blockchain
  • Blue Coat
  • Blue Prism
  • C++ Institute
  • CA Technologies
  • CertNexus
  • Checkpoint
  • CIMA
  • Cisco
  • Citrix
  • CIW
  • Cloudera
  • CNCF
  • CompTIA
  • CrowdStrike
  • CSA
  • CWNP
  • CyberArk
  • Databricks
  • Dell
  • DMI
  • DSCI
  • EMC
  • Esri
  • Exin
  • Extreme Networks
  • F5
  • FileMaker
  • FINRA
  • Fortinet
  • GAQM
  • GARP
  • Genesys
  • GIAC
  • Google
  • Guidance Software
  • H3C
  • HashiCorp
  • HFMA
  • HIPAA
  • Hitachi
  • HP
  • HRCI
  • Huawei
  • IAAP
  • IAPP
  • IBM
  • IFPUG
  • IIA
  • IIBA
  • Infor
  • Informatica
  • Isaca
  • iSAQB
  • ISC
  • iSQI
  • ISTQB
  • ITIL
  • Juniper
  • Lenovo
  • Linux Foundation
  • Logical Operations
  • LPI
  • Magento
  • Marketo
  • McAfee
  • Meta
  • Microsoft
  • Mulesoft
  • NACVA
  • NADCA
  • NCMA
  • NetSuite
  • Network Appliance
  • NFPA
  • NI
  • Nokia
  • Novell
  • Nuage Networks
  • Nutanix
  • OMG
  • Palo Alto Networks
  • Pegasystems
  • PEOPLECERT
  • PMI
  • PRINCE2
  • Pulse Secure
  • Python Institute
  • QlikView
  • RedHat
  • Riverbed
  • RSA
  • Salesforce
  • SANS
  • SAP
  • SAS Institute
  • Scaled Agile
  • Scrum
  • SDI
  • ServiceNow
  • Sitecore
  • Six Sigma
  • Slack
  • SNIA
  • Snowflake
  • SOA
  • Software Certifications
  • SolarWinds
  • Splunk
  • SpringSource
  • Symantec
  • Teradata
  • Test Prep
  • The Open Group
  • Tibco
  • UiPath
  • Unity Certification
  • VCE
  • Veeam
  • Veritas
  • Versa Networks
  • Vmedu
  • VMware
  • WatchGuard
  • WorldatWork
  • Zend
Next Step
Next Step

Try Free Demo

  • CompTIA
Next Step
Next Step

Get 10% Discount on Your Purchase When You Sign Up for Email

Passguide Products

Enter Your Email Address to Receive Your 10%
OFF
Discount Code Plus... Our Exclusive Weekly Deals

* We value your privacy. We will not rent or sell your email address