Welcome to CompTIA CySA+ (CS0-002)
  • Welcome to the Course
  • Download the Study Guide
Identify Security Control Types
  • Identify Security Control Types (Introduction)
  • Cybersecurity Roles and Responsibilities (OBJ 5.3)
  • Security Operations Center (SOC) (OBJ 5.3)
  • Security Control Categories (OBJ 5.3)
  • Selecting Security Controls (OBJ 5.3)
  • Quiz: Identify Security Control Types
Threat Intelligence
  • Threat Intelligence Sharing (Introduction)
  • Security and Threat Intelligence (OBJ 1.1)
  • Intelligence Cycle (OBJ 1.1)
  • Intelligence Sources (OBJ 1.1)
  • Information Sharing and Analysis Centers (ISACS) (OBJ 1.1)
  • Threat Intelligence Sharing (OBJ 1.2)
  • Quiz: Threat Intelligence
Classifying Threats
  • Classifying Threats (Introduction)
  • Threat Classification (OBJ 1.1)
  • Threat Actors (OBJ 1.1)
  • Malware (OBJ 1.1)
  • Threat Research (OBJ 1.2)
  • Attack Frameworks (OBJ 1.2)
  • Indicator Management (OBJ 1.1)
  • Quiz: Classifying Threat
Threat Hunting
  • Threat Hunting (Introduction)
  • Threat Modeling (OBJ 1.2)
  • Threat Hunting (OBJ 3.3)
  • Open-source Intelligence (OBJ 1.1)
  • Google Hacking (OBJ 1.1)
  • Profiling Techniques (OBJ 1.1)
  • Harvesting Techniques (OBJ 1.1)
  • Quiz: Threat Hunting
Network Forensics
  • Network Forensics (Introduction)
  • Network Forensic Tools (OBJ 3.1)
  • tcpdump (OBJ 4.4)
  • Wireshark (OBJ 4.4)
  • Flow Analysis (OBJ 3.1)
  • IP and DNS Analysis (OBJ 3.1)
  • URL Analysis (OBJ 3.1)
  • Conduct Packet Analysis (OBJ 4.4)
  • Quiz: Network Forensics
Appliance Monitoring
  • Appliance Monitoring (Introduction)
  • Firewall Logs (OBJ 3.1)
  • Firewall Configurations (OBJ 3.2)
  • Proxy Logs (OBJ 3.1)
  • Web Application Firewall Logs (OBJ 3.1)
  • IDS and IPS Configuration (OBJ 3.2)
  • IDS and IPS Logs (OBJ 3.1)
  • Port Security Configuration (OBJ 3.2)
  • NAC Configuration (OBJ 3.2)
  • Analysis of Security Appliances (OBJ 3.2)
  • Quiz: Application Monitoring
Endpoint Monitoring
  • Endpoint Monitoring (Introduction)
  • Endpoint Analysis (OBJ 3.1)
  • Sandboxing (OBJ 3.2)
  • Reverse Engineering (OBJ 3.1)
  • Malware Exploitation (OBJ 3.1)
  • Behavior Analysis (OBJ 3.1)
  • Malware Analysis (OBJ 3.1)
  • EDR Configuration (OBJ 3.2)
  • Blacklisting and Whitelisting (OBJ 3.2)
  • Quiz: Endpoint Monitoring
Email Monitoring
  • Email Monitoring (Introduction)
  • Email IOCs (OBJ 3.1)
  • Email Header Analysis (OBJ 3.1)
  • Email Content Analysis (OBJ 3.1)
  • Email Server Security (OBJ 3.1)
  • SMTP Log Analysis (OBJ 3.1)
  • Email Message Security (OBJ 3.1)
  • Analyzing Email Headers (OBJ 4.3)
  • Quiz: Email Monitoring
Configuring Your SIEM
  • Configuring Your SIEM (Introduction)
  • SIEM (OBJ 3.1)
  • Security Data Collection (OBJ 3.1)
  • Data Normalization (OBJ 3.1)
  • Event Log (OBJ 3.1)
  • Syslog (OBJ 3.1)
  • Configuring a SIEM Agent (OBJ 3.1)
  • Quiz: Configuring Your SIEM
Analyzing Your SIEM
  • Analyzing Your SIEM (Introduction)
  • SIEM Dashboards (OBJ 3.1)
  • Analysis and Detection (OBJ 3.1)
  • Trend Analysis (OBJ 3.1)
  • Rule and Query Writing (OBJ 3.1)
  • Searching and Piping Commands (OBJ 3.1)
  • Scripting Tools (OBJ 3.1)
  • Analyzing, Filtering, and Searching Logs (OBJ 3.1)
  • Quiz: Analyzing Your SIEM
Digital Forensics
  • Digital Forensics (Introduction)