CompTIA CSA+Certified Cyber Security Analyst – Mohamed Atef

We join Groupbuy AND always try to share knowledge with more people. Especially the quality is the same as salepage. You can buy directly at salepage, with full price. (link SALEPAGE are mounted directly on the post)

The CompTIA Cybersecurity Analyst, or CSA+, is a CompTIA certification focusing on the knowledge and skills required to configure and use threat-detection tools, perform data analysis, and interpreting the results with the end goal of securing an organization’

What does CompTIA CSA+Certified Cyber Security Analyst – Mohamed Atef include?

Introduction

  • 1. Introduction (3:17)

Threat Management

  • 2- Threat Managment Introduction (3:18)
  • 3. Footprinting (14:12)
  • 4. Email Harvest (9:51)
  • 5. Google Hacking (10:36)
  • 6. MetaGoofil (10:18)
  • 7.People Search Engine (6:13)
  • 8. Internet Archives and Alerts (7:04)
  • 9. Maltego (8:40)
  • 10. Using Maltego (8:14)
  • 11. Related Entities in Maltego (3:51)
  • 12. More Maltego (6:05)
  • 13.Important Scanning Defination (13:19)
  • 14 .Identifying Live system (6:41)
  • 15. Port Scanning (14:24)
  • 16.Advamced Scanning Techniques (7:23)
  • 17.Network Mapping (11:41)

Vulnerability Management

  • 18. Vulnerability Management Introduction (11:29)
  • 19.Penetration Testing Standards (11:29)
  • 20.VA vs PT (11:29)
  • 21. Types ot PT (11:29)
  • 22.Social Engineering PT (11:29)
  • 23.Vulnerability Assessment (11:29)
  • 24.Nessus Report 1 (13:25)rt
  • 25.Nessus Report 2 (11:29)
  • 26.OWASP ZAP VA (11:29)
  • 27. Nexpose VA-1 (11:29)
  • 28.Nexpose VA-2 (11:29)
  • 29.Penetration Testing (11:29)
  • 30.MetaSploit Pro 1 (14:32)
  • 31.MetaSploit Pro 2 (11:29)
  • 32.MetaSploit Pro 3 (11:29)
  • 33.MetaSploit Community (11:29)
  • 34.Armitage (11:20)
  • 35.SQL Injection Introduction (11:20)
  • 36. What is SQL Injection (11:20)
  • 37.Is The Site Infected with SQL Injection (11:20)
  • 38.The Amazing SQLMAP (11:20)
  • 39.Live Example (11:20)

Cyber Incident Response

  • 40. Incident Management 2 (11:25)
  • 41. Incident Response Team (11:25)
  • 42. Incident Report (11:25)
  • 43. BCP – DRP (11:25)
  • 44. Business Continuity Plan (14:36)
  • 45. Business Impact Analysis 2 (11:25)
  • 46. MTR – RTO – RPO (11:44)rt
  • 47. Disaster Recovery Plan (11:25)
  • 48. Alternative Sites (11:25)

Security Architecture

  • 49. Common Security Architecture Frameworks (12:17)
  • 50. Trusted Computing Base (11:16)
  • 51. Security Models (17:08)
  • 52. TCSEC (11:16)
  • 53. ITSEC (11:16)
Original Content
Back to Top