LinkedIn Learning - CompTIA Cybersecurity Analyst+ (CySA+) (CS0-003) 1 Security Operations
Language: English | Size:538.32 MB
Genre:eLearning
Files Included :
01 - Security operations.mp4 (4.86 MB)
MP4
02 - What you should know.mp4 (1.17 MB)
MP4
03 - Study resources.mp4 (3.76 MB)
MP4
04 - The goals of information security.mp4 (4.2 MB)
MP4
05 - Role of the cybersecurity analyst.mp4 (3.41 MB)
MP4
01 - Operating system security.mp4 (22.03 MB)
MP4
02 - Windows Registry.mp4 (6.6 MB)
MP4
03 - Configuration files.mp4 (3.66 MB)
MP4
04 - System processes.mp4 (3.12 MB)
MP4
05 - Hardware architecture.mp4 (2.14 MB)
MP4
01 - Logging security information.mp4 (9.69 MB)
MP4
02 - Security information and event management.mp4 (7.53 MB)
MP4
03 - Tuning and configuring SIEMs.mp4 (4.69 MB)
MP4
04 - Continuous security monitoring.mp4 (6.93 MB)
MP4
01 - Virtualization.mp4 (8.9 MB)
MP4
02 - Cloud infrastructure components.mp4 (4.84 MB)
MP4
03 - Containers.mp4 (2.85 MB)
MP4
01 - Network architecture.mp4 (6.81 MB)
MP4
02 - Security zones.mp4 (6.62 MB)
MP4
03 - VLANs and network segmentation.mp4 (2.58 MB)
MP4
04 - Zero trust networking.mp4 (8.64 MB)
MP4
05 - Secure access service edge (SASE).mp4 (8.38 MB)
MP4
06 - Software-defined networking (SDN).mp4 (5.95 MB)
MP4
01 - Identification, authentication, authorization, and accounting.mp4 (6.37 MB)
MP4
02 - Usernames and access cards.mp4 (5.14 MB)
MP4
03 - Biometrics.mp4 (5.31 MB)
MP4
04 - Authentication factors.mp4 (7.37 MB)
MP4
05 - Multifactor authentication.mp4 (4.34 MB)
MP4
06 - Something you have.mp4 (10.01 MB)
MP4
07 - Password authentication protocols.mp4 (4.9 MB)
MP4
08 - Single sign-on and federation.mp4 (5.61 MB)
MP4
09 - Passwordless authentication.mp4 (3.81 MB)
MP4
10 - Privileged access management.mp4 (4.64 MB)
MP4
11 - Cloud access security brokers.mp4 (8.66 MB)
MP4
01 - Understanding encryption.mp4 (4.93 MB)
MP4
02 - Symmetric and asymmetric cryptography.mp4 (8.26 MB)
MP4
03 - Goals of cryptography.mp4 (6.02 MB)
MP4
04 - Trust models.mp4 (4.89 MB)
MP4
05 - PKI and digital certificates.mp4 (8.27 MB)
MP4
06 - TLS and SSL.mp4 (5.9 MB)
MP4
01 - Data classification.mp4 (3.97 MB)
MP4
02 - Data loss prevention.mp4 (8.95 MB)
MP4
01 - Network symptoms.mp4 (7.5 MB)
MP4
02 - Rogue access points and evil twins.mp4 (5.73 MB)
MP4
03 - Endpoint symptoms.mp4 (5.93 MB)
MP4
04 - Application symptoms.mp4 (5.04 MB)
MP4
05 - Obfuscated links.mp4 (4.04 MB)
MP4
06 - Social engineering.mp4 (9.75 MB)
MP4
01 - Protocol analyzers.mp4 (33.73 MB)
MP4
02 - DNS and IP reputation.mp4 (14.31 MB)
MP4
03 - Endpoint monitoring.mp4 (6.41 MB)
MP4
04 - Malware prevention.mp4 (9.7 MB)
MP4
05 - Executable analysis.mp4 (9.69 MB)
MP4
06 - Cuckoo and Joe Sandbox.mp4 (2.39 MB)
MP4
07 - User account monitoring.mp4 (5.66 MB)
MP4
01 - Malicious email content.mp4 (5 MB)
MP4
02 - Digital signatures.mp4 (6.3 MB)
MP4
03 - DKIM, DMARC, and SPF.mp4 (13.94 MB)
MP4
04 - Analyzing email headers.mp4 (8.95 MB)
MP4
01 - Shell and script environments.mp4 (4.12 MB)
MP4
02 - APIs.mp4 (9.88 MB)
MP4
03 - Querying logs.mp4 (23.32 MB)
MP4
01 - Threat actors.mp4 (6.8 MB)
MP4
02 - Zero-days and the APT.mp4 (5.76 MB)
MP4
03 - Supply chain vulnerabilities.mp4 (9.01 MB)
MP4
04 - Threat classification.mp4 (6.58 MB)
MP4
01 - Threat intelligence.mp4 (6.54 MB)
MP4
02 - Managing threat indicators.mp4 (7.69 MB)
MP4
03 - Intelligence sharing.mp4 (6.37 MB)
MP4
04 - Threat research.mp4 (3.99 MB)
MP4
05 - Identifying threats.mp4 (3.53 MB)
MP4
06 - Automating threat intelligence.mp4 (7.78 MB)
MP4
07 - Threat hunting.mp4 (8.45 MB)
MP4
08 - Deception technologies.mp4 (4.47 MB)
MP4
01 - Standardizing processes and streamlining operations.mp4 (6.04 MB)
MP4
02 - Technology and tool integration.mp4 (5.06 MB)
MP4
01 - Continuing your studies.mp4 (2.21 MB)
MP4