Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed at ante vitae nulla vulputate elementum. Maecenas imperdiet malesuada lacinia. Donec sit amet aliquet urna. Nam sit amet eros dapibus, commodo ligula a, imperdiet mi. Fusce rhoncus eros in leo rutrum, at lobortis leo sodales. Quisque nibh tellus, rutrum placerat turpis ac, ullamcorper suscipit nisl. Nullam faucibus quam a leo imperdiet, vel blandit nibh iaculis. Duis efficitur ipsum eu eros fermentum, in volutpat erat tincidunt. Curabitur sit amet vulputate sem. Donec vel facilisis est. Morbi vitae mollis massa, sed maximus ex. Duis elit orci, scelerisque ut erat eu, tincidunt euismod erat.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed at ante vitae nulla vulputate elementum. Maecenas imperdiet malesuada lacinia. Donec sit amet aliquet urna. Nam sit amet eros dapibus, commodo ligula a, imperdiet mi. Fusce rhoncus eros in leo rutrum, at lobortis leo sodales. Quisque nibh tellus, rutrum placerat turpis ac, ullamcorper suscipit nisl. Nullam faucibus quam a leo imperdiet, vel blandit nibh iaculis. Duis efficitur ipsum eu eros fermentum, in volutpat erat tincidunt. Curabitur sit amet vulputate sem. Donec vel facilisis est. Morbi vitae mollis massa, sed maximus ex. Duis elit orci, scelerisque ut erat eu, tincidunt euismod erat.

Course Curriculum

  • 1

    Welcome and Introduction

    • Welcome to the Course

    • Exam Foundations

    • How to Schedule Your Exam

  • 2

    Domain 1: Threat Management

    • Domain 1: Threat Management

    • CIA Triad

    • Risk Consideration

    • Risk Assessment

    • Identify Threats

    • Identify Vulnerabilities

    • Likelihood, Impact, and Risk

    • Qualitative and Quantitative Assessments

    • Reviewing Controls

    • Network Perimeter Security

    • Network Segmentation

    • Network Access Control

    • Defense Deception Methods

    • Secure Endpoint Management

    • Penetration Testing

    • Security Exercises and Training

    • Reverse Engineering

    • Quiz: Defense Against Cyber Threats

    • Reconnaissance and Intelligence

    • Footprinting the Network

    • Network Mapping

    • Port Scanning

    • Other Port Scanners

    • NMAP - Demonstration of the world's most popular port scanning tool

    • Passive Reconnaissance

    • Passive Recon - Network Devices

    • Passive Recon - Netstat

    • DHCP Logs and Configs

    • Firewall Logs and Configs

    • System and Host Log Files

    • DNS Harvesting

    • Domain Names and IP Ranges

    • DNS Zone Transfers

    • Whois and Host Commands

    • Information Gathering and Aggregation

    • Organizational Intelligence

    • Detecting, Preventing, and Responding to Reconnaissance

    • Quiz: Reconnaissance and Intelligence Gathering

  • 3

    Domain 2: Vulnerability Management

    • Domain 2: Vulnerability Management

    • Regulatory Requirements

    • Corporate Requirements

    • Scanning Tools

    • Scoping Scans

    • Configuring Scans

    • Scanning Sensitivity

    • Authenticated Scanning

    • Maintaining Scanners

    • Standardizing Vulnerabilities

    • Workflow for Remediation

    • Vulnerability Reporting

    • Remediation Priority

    • Implementing and Testing

    • Nessus Vulnerability Scanner: A Walkthrough

    • Quiz: Vulnerability Management Program

    • Interpreting Scan Results

    • Interpreting CVSS

    • Calculating the CVSS Score

    • CVSS Temporal Score

    • Validation of Results

    • Common Vulnerabilities

    • Server and Host Vulnerabilities

    • Network Vulnerabilities

    • Virtualization Vulnerabilities

    • Web Application Vulnerabilities

    • Internet of Things (IoT) Vulnerabilities

    • Quiz: Analyzing Vulnerability Reports

  • 4

    Domain 3: Cyber Incident Response

    • Domain 3: Cyber Incident Response

    • Security Incidents

    • Incident Response Teams

    • Incident Response Phases

    • Incident Response Policy and Procedures

    • Quiz: Cyber Incident Response Program

    • Communication and Info Sharing

    • Incident Classification

    • Network Event Monitoring

    • Network Monitoring Tools

    • Detecting Network Events

    • Network Probes and Attacks

    • Server and Host Events

    • Service and Application Events

    • Quiz: Symptoms of Cyber Attacks

    • Digital Forensics

    • Forensic Toolkit Components

    • Mobile Forensic Toolkits

    • Forensic Software

    • Training and Certification

    • Forensic Investigation Process

    • Disk Imaging

    • Disk Imaging Using dd

    • Disk Imaging Using FTK Imager

    • Quiz: Digital Forensics

    • Incident Containment

    • Eradication and Recovery

    • Finishing the Response

    • Quiz: Incident Containment and Eradication

  • 5

    Domain 4: Security Architecture and Toolsets

    • Domain 4: Security Architecture and Tool Sets

    • Policy Documents

    • Standard Frameworks

    • Policy-based Controls

    • Audits and Assessments

    • Laws and Regulations

    • Quiz: Policies, Standards, Procedures, and Frameworks

    • Defense in Depth

    • Types of Controls

    • Layered Network Defense

    • Layered Host Security

    • Data Analytics

    • Personnel Security

    • Outsourcing Concerns

    • User Awareness Training

    • Analyzing Secure Architectures

    • Quiz: Defense in Depth

    • What Is Identity?

    • Identity Systems

    • Threats to Identity Systems

    • Attacking AAA Protocols and Systems

    • Targeting Account Lifecycle

    • Identity Exploits

    • Credential Theft

    • Securing Authentication and Authorization System

    • Identity as a Service (IDaaS)

    • Detecting Identity Attacks

    • Federated Identity Systems

    • Quiz: Identity and Access Management

    • Software Development Life Cycle (SDLC)

    • Software Development Models

    • Coding for Security

    • Testing Application Security

    • Finding Security Flaws

    • Web Application Vulnerability Scanners

    • Quiz: Software Development and SDLC

  • 6

    Conclusion

    • 124 - Conclusion

  • 7

    Practice Exam

    • Simulations and Performance-Based Questions (PBQs)

    • CompTIA CSA+ Practice Certification Exam

    • CompTIA CSA+ Practice Certification Exam

About the instructor

IT Manager

Eric Chu

A proven and experienced IT Manager, customer-focused and equipped with a technical background. I have over 8 years’ experience in IT Service Delivery Management and leading small to medium crossfunctional teams, and over 15 years of experience in IT Training and Sales.Through my passion for technology, science, and innovation, I have fostered extensive practical knowledge of emerging technologies, complex networks, and data centre eco-systems.I have had the opportunity to work across the Asia Pacific region as an experienced Business Development Manager and IT Project Manager delivering end to end solutions.

What others have been saying about this course:

Use your Call To Action description to encourage students to sign up for your course

You may also be interested in...