Mike Chapple's courses are an outstanding resource for cybersecurity professionals. His in-depth explanations are clear, engaging, and well-structured. Mike's teaching style effortlessly breaks down complex concepts making them accessible and actionable through demonstrations of the tools. The course covers the essentials for the exam while providing practical insights for real-world applications. Highly recommended!
CompTIA Cybersecurity Analyst (CySA+) (CS0-003) Cert Prep
With Mike Chapple
Liked by 288 users
Duration: 12h 55m
Skill level: Advanced
Released: 7/30/2024
Course details
Earning the CompTIA Cybersecurity Analyst+ (CySA+) certification demonstrates that you know how to address cybersecurity threats using an analytics-based approach. This course serves as a comprehensive, all-in-one resource for anyone preparing for the CS0-003 exam. Join University of Notre Dame professor and cybersecurity expert Mike Chapple as he shows you the skills you need to know to tackle the official exam. Mike starts with an overview and general information about the exam, and then goes into detail through each domain of the certification test.
Skills you’ll gain
Earn a sharable certificate
Share what you’ve learned, and be a standout professional in your desired industry with a certificate showcasing your knowledge gained from the course.
Learning
LinkedIn Learning
Certificate of Completion
-
Showcase on your LinkedIn profile under “Licenses and Certificate” section
-
Download or print out as PDF to share with others
-
Share as image online to demonstrate your skill
Meet the instructor
Learner reviews
4.8 out of 5
The overall rating is calculated using the average of submitted ratings. Ratings and reviews can only be submitted when non-anonymous learners complete at least 40% of the course. This helps us avoid fake reviews and spam.
-
5 star 87% -
4 star 9% -
3 star 4% -
2 star 0% -
1 star 0%
-
Brian Brookhart
Brian Brookhart
Information Security Analyst | M.S. in Cybersecurity Candidate | Specializing in Threat Intelligence and Risk Management | BBA | ISC2 Member
Contents
-
-
Identification, authentication, authorization, and accounting3m 34s
-
Usernames and access cards3m 23s
-
Biometrics2m 42s
-
Authentication factors4m 25s
-
Multifactor authentication2m 35s
-
Something you have4m 24s
-
Password authentication protocols3m 10s
-
Single sign-on and federation3m 9s
-
Passwordless authentication1m 48s
-
Privileged access management2m 31s
-
Cloud access security brokers5m 15s
-
-
-
OWASP Top 105m 36s
-
Prevent SQL injection4m 25s
-
Understand cross-site scripting4m 46s
-
Request forgery4m 8s
-
Privilege escalation1m 56s
-
Directory traversal3m 6s
-
File inclusion1m 46s
-
Overflow attacks3m 21s
-
Cookies and attachments4m 6s
-
Session hijacking4m 8s
-
Race conditions2m 13s
-
Memory vulnerabilities3m 34s
-
Code execution attacks2m 43s
-
Data poisoning55s
-
Third-party code3m 38s
-
Interception proxies5m 22s
-
-
-
Build an incident response program4m 13s
-
Creating an incident response team2m 15s
-
Incident communications plan2m 44s
-
Incident identification4m 26s
-
Escalation and notification2m 29s
-
Mitigation2m 20s
-
Containment techniques3m
-
Incident eradication and recovery5m 39s
-
Validation2m 24s
-
Post-incident activities4m 17s
-
Incident response exercises1m 37s
-
-
-
Conducting investigations3m 50s
-
Evidence types3m 28s
-
Introduction to forensics3m 21s
-
System and file forensics4m 26s
-
File carving3m 46s
-
Creating forensic images5m 30s
-
Digital forensics toolkit2m 25s
-
Operating system analysis6m 9s
-
Password forensics7m 16s
-
Network forensics4m 1s
-
Software forensics4m 25s
-
Mobile device forensics1m 10s
-
Embedded device forensics2m 30s
-
Chain of custody1m 50s
-
Ediscovery and evidence production3m 3s
-
What’s included
- Learn on the go Access on tablet and phone