Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA CSA+ / Certified Cyber Security Analyst
Introduction
1. Introduction (3:17)
Threat Management
2- Threat Managment Introduction (3:18)
3. Footprinting (14:12)
4. Email Harvest (9:51)
5. Google Hacking (10:36)
6. MetaGoofil (10:18)
7.People Search Engine (6:13)
8. Internet Archives and Alerts (7:04)
9. Maltego (8:40)
10. Using Maltego (8:14)
11. Related Entities in Maltego (3:51)
12. More Maltego (6:05)
13.Important Scanning Defination (13:19)
14 .Identifying Live system (6:41)
15. Port Scanning (14:24)
16.Advamced Scanning Techniques (7:23)
17.Network Mapping (11:41)
Vulnerability Management
18. Vulnerability Management Introduction (11:29)
19.Penetration Testing Standards (11:29)
20.VA vs PT (11:29)
21. Types ot PT (11:29)
22.Social Engineering PT (11:29)
23.Vulnerability Assessment (11:29)
24.Nessus Report 1 (13:25)
25.Nessus Report 2 (11:29)
26.OWASP ZAP VA (11:29)
27. Nexpose VA-1 (11:29)
28.Nexpose VA-2 (11:29)
29.Penetration Testing (11:29)
30.MetaSploit Pro 1 (14:32)
31.MetaSploit Pro 2 (11:29)
32.MetaSploit Pro 3 (11:29)
33.MetaSploit Community (11:29)
34.Armitage (11:20)
35.SQL Injection Introduction (11:20)
36. What is SQL Injection (11:20)
37.Is The Site Infected with SQL Injection (11:20)
38.The Amazing SQLMAP (11:20)
39.Live Example (11:20)
Cyber Incident Response
40. Incident Management 2 (11:25)
41. Incident Response Team (11:25)
42. Incident Report (11:25)
43. BCP - DRP (11:25)
44. Business Continuity Plan (14:36)
45. Business Impact Analysis 2 (11:25)
46. MTR - RTO - RPO (11:44)
47. Disaster Recovery Plan (11:25)
48. Alternative Sites (11:25)
Security Architecture
49. Common Security Architecture Frameworks (12:17)
50. Trusted Computing Base (11:16)
51. Security Models (17:08)
52. TCSEC (11:16)
53. ITSEC (11:16)
Teach online with
39.Live Example
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock