12 hours of deep-dive training covering every objective in the CompTIA Cybersecurity Analyst CSA+ (CS0-001) exam.
The CompTIA Cybersecurity Analyst CSA+ (CS0-001) Complete Video Course is an engaging, self-paced video training solution that provides learners with 12 hours of personal, visual instruction from two cybersecurity expert trainers. Through the use of topic-focused instructional videos, you will gain an in-depth understanding of each objective in the CompTIA CSA+ exam as well as a deeper understanding of cyber security foundations and principles.
CompTIA Cybersecurity Analyst CSA+ (CS0-001) Complete Video Course contains 12 hours of training with content divided into 4 modules with 17 content targeted content lessons. This title covers every objective in the CompTIA CSA+ exam and includes two full practice exams, so you have everything you need to learn all of the cyber security principles that appear on the test; but more than that, you will learn the fundamentals of preventing, detecting and combatting cybersecurity threats. Full of live trainer discussions, hands-on demos, whiteboard work, and deep dive discussions, this course covers cyber security fundamentals in a way that is easy to access and even fun.
The video lessons in this course review each exam objective, so you can use it as a complete study tool for taking the CompTIA CSA+ exam.
What You Will Learn
- Every objective on the CompTIA Cybersecurity Analystic CSA+ exam
- Tips to prepare for and pass the exam
- Real-world cyber security configuration and detection skills
- How to perform data analysis and interpret results to identify vulnerabilities, threats and risks
Who Should Take This Course
Primary audience: Anyone preparing for the CompTIA Cybersecurity Analyst CSA+ examination.
Secondary audience: Anyone interested in learning cyber security fundamentals.
While there is no required prerequisite, CSA+ is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus.
About LiveLessons Video Training
Pearson’s LiveLessons video training series publishes the industry’s leading video tutorials for IT pros, developers, sys admins, devops, network engineers, and certification candidates. LiveLessons feature the highest-quality professional skills training led by recognized author instructors published by Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que. Topics include IT certification, programming, development, networking, software skills for the home, office, and business, and more. Your purchase provides you with lifetime online access to the content.
Joseph Muniz is an architect at Cisco Systems and security researcher. He has extensive experience in designing security solutions and architectures for the top Fortune 500 corporations and the U.S. Government. Examples of Joseph’s research is his RSA talk titled Social Media Deception quoted by many sources found by searching Emily Williams Social Engineering as well as articles in PenTest Magazine regarding various security topics. Joseph runs thesecurityblogger website, a popular resource for security and product implementation. He is the author and contributor of several publications including titles on building security operations centers (SOC)s, CCNA cyber ops certification, web penetration testing and hacking with raspberry pi. Follow Joseph at www.thesecurityblogger.com and @SecureBlogger.
Aamir Lakhani is a leading senior security strategist. He is responsible for providing IT security solutions to major enterprises and government organizations. Mr. Lakhani creates technical security strategies and leads security implementation projects for Fortune 500 companies. Aamir has designed offensive counter-defense measures for the Department of Defense and national intelligence agencies. He has also assisted organizations with safeguarding IT and physical environments from attacks perpetrated by underground cybercriminal groups. Mr. Lakhani is considered an industry leader for creating detailed security architectures within complex computing environments. Writing under the pseudonym Dr. Chaos, Mr. Lakhani also operates the popular security social media blog, which is hosted at DrChaos.com. In its recent list of 46 Federal Technology Experts to Follow on Twitter, Forbes magazine described Aamir Lakhani as “a blogger, InfoSec specialist, super hero…and all around good guy.”
PreviewLearning objectives (0:20)
Preview1.1 Introduction to Reconnaissance Techniques (5:31)
Preview1.2 Reconnaissance Techniques (9:03)
Preview1.3 Techniques of OS Fingerprinting (8:08)
Preview1.4 Understanding Advanced NMAP Techniques (15:27)
Preview1.5 Introducing NMAP (15:37)
Preview1.6 Reconnaissance Techniques Using Packet Captures, Log Reviews, Firewall Reviews, ACL Reviews (11:51)
Preview1.7 Discovering your Targets through Social Media Profiling and Engineering (16:22)
Preview1.8 Digging Deeper into Social Engineering (14:10)
Preview1.9 Email Harvesting, DNS Harvesting, and Phishing Techniques (14:28)
Preview1.10 FOCA Demo (6:06)
Preview1.11 Examining Virtual and Physical Environments (5:46)
Preview1.12 Examining Internal, External, On-Premise, and Cloud Connections (3:59)
Preview1.13 Using NMAP for Host, Service, and Network Scanning (6:25)
Preview1.14 Reading Firewall Rule-based and Logs (4:50)
Preview1.15 Reconnaissance Techniques Using Vulnerability Scanners (2:58)
Preview1.16 OpenVAS Lab (1:53)