Introduction
  • Introduction
  • All About the Exam
  • What's New on the CompTIA CySA+ Exam?
  • Meet the Instructors
  • Thinking Like the Enemy
  • Tools of the Trade
Chapter 1: The Importance of Threat Data and Intelligence
  • Intelligence Sources and Confidence Levels
  • Threat Indicators and Actors
  • Threat Trends
  • Intelligence Cycle and ISACs
  • Chapter 1: The Importance of Threat Data and Intelligence Quiz
Chapter 2: Threat Intelligence in Support of Organizational Security
  • Attack Frameworks
  • Threat Research
  • Threat Modeling and Intelligence Sharing
  • Chapter 2: Threat Intelligence in Support of Organizational Security Quiz
Chapter 3: Vulnerability Assessment Tools
  • Vulnerability Identification
  • Scanning Parameters and Criteria
  • Scanning Special Considerations
  • Validation
  • Remediation and Mitigation
  • Inhibitors to Remediation
  • Chapter 3: Vulnerability Assessment Tools Quiz
Chapter 4: Threats and Vulnerabilities Associated with Specialized Technology
  • Web Applications Scanners, Part 1
  • Web Applications Scanners, Part 2
  • Scanning
  • Configuring and Executing Scans
  • Vulnerability Scanning
  • Reverse Engineering
  • Enumeration
  • Wireless Assessment Tools
  • Cloud Assessment Tools
  • Ch4: Threats and Vulnerabilities Associated with Specialized Technology Quiz
Chapter 5: Threats and Vulnerabilities Associated with Specialized Technology
  • Mobile and IoT
  • Embedded and Firmware Systems (RTOS, SoC, and FPGA)
  • Access and Vehicles Risk
  • Chapter 01 Conducting Reconnaissance Quiz
  • Automation and Control Risk
  • Ch5: Threats and Vulnerabilities Associated with Specialized Technology Quiz
Chapter 6: Threats and Vulnerabilities Associated with Operating in the Cloud
  • Cloud Models
  • Remote Service Invocation (FaaS, IaC, API)
  • Cloud Vulnerabilities
  • Ch6: Threats and Vulnerabilities Associated with Operating in the Cloud
Chapter 7: Mitigating Controls for Attacks and Software Vulnerabilities
  • Injection and Overflow Attacks
  • Authentication Attacks
  • Exploits
  • Application Vulnerabilities, Part 1
  • Application Vulnerabilities, Part 2
  • Chapter 7: Mitigating Controls for Attacks and Software Vulnerabilities Quiz
Chapter 8: Security Solutions for Infrastructure Management
  • Network Architecture and Asset Management
  • Protecting Your Territory
  • Identity and Access Management
  • Encryption and Active Defense
  • Chapter 8: Security Solutions for Infrastructure Management Quiz
Chapter 9: Software Assurance Best Practices
  • Platforms
  • SOA and DevSecOps
  • Secure Software Development
  • Best Coding Practices
  • Chapter 9: Software Assurance Best Practices Quiz
Chapter 10: Hardware Assurance Best Practices
  • Trusted Hardware
  • Hardware Encryption
  • Hardware Security
  • Chapter 10: Hardware Assurance Best Practices Quiz
Chapter 11: Data Analysis in Security Monitoring Activities
  • Data Analytics
  • Endpoint Security
  • Recon Results, Part 1
  • Recon Results, Part 2
  • Impact Analysis
  • Collective Tools
  • Query Writing
  • E-mail Analysis, Part 1
  • E-mail Analysis, Part 2
  • Chapter 11: Data Analysis in Security Monitoring Activities Quiz
Ch12: Implement Configuration Changes to Existing Controls to Improve Security
  • Permissions
  • Firewalls
  • Intrusion Prevention Rules
  • DLP and Endpoint Detection
  • Implement Configuration Changes to Existing Controls to Improve Security Quiz
Chapter 13: The Importance of Proactive Threat Hunting
  • Threat Hunting and the Hypothesis
  • Threat Hunting Process
  • Results and Benefits
  • Chapter 13: The Importance of Proactive Threat Hunting Quiz
Chapter 14: Compare and Contrast Automation Concepts and Technologies
  • Workflow and Scripting
  • API and Malware Signature Creation
  • Threat Feeds and Machine Learning
  • Protocols, Standards, and Software Engineering