-33%
Roll over image to zoom in
Mohamed Atef – CompTIA CSA+ – Certified Cyber Security Analyst
$10.00$15.00 (-33%)
Information Security Consultant, Senior Penetration tester and Certified Instructor with more than 20 years of experience
Mohamed Atef – CompTIA CSA+ – Certified Cyber Security Analyst
Check it out: Mohamed Atef – CompTIA CSA+ – Certified Cyber Security Analyst
CompTIA CSA+ – Certified Cyber Security Analyst
Get CompTIA CSA+ Certified easily
The CompTIA Cybersecurity Analyst, or CSA+, is a CompTIA certification focusing on the knowledge and skills required to configure and use threat-detection tools, perform data analysis, and interpreting the results with the end goal of securing an organization’
Your Instructor
Information Security Consultant, Senior Penetration tester and Certified Instructor with more than 20 years of experience.
CISSP, CEH, CEI, CISM, CISA, Security+, CCNP, CCSI, MCT, MCSE+ Security, MCITP, PMP, N+, RHCE, Linux+
Professional Experience
Course Curriculum
Introduction
-
1. Introduction (3:17)
Threat Management
2- Threat Managment Introduction (3:18)
3. Footprinting (14:12)
4. Email Harvest (9:51)
5. Google Hacking (10:36)
6. MetaGoofil (10:18)
7.People Search Engine (6:13)
8. Internet Archives and Alerts (7:04)
9. Maltego (8:40)
10. Using Maltego (8:14)
11. Related Entities in Maltego (3:51)
12. More Maltego (6:05)
13.Important Scanning Defination (13:19)
14 .Identifying Live system (6:41)
15. Port Scanning (14:24)
16.Advamced Scanning Techniques (7:23)
17.Network Mapping (11:41)Vulnerability Management
18. Vulnerability Management Introduction (11:29)
19.Penetration Testing Standards (11:29)
20.VA vs PT (11:29)
21. Types ot PT (11:29)
22.Social Engineering PT (11:29)
23.Vulnerability Assessment (11:29)
24.Nessus Report 1 (13:25)
25.Nessus Report 2 (11:29)
26.OWASP ZAP VA (11:29)
27. Nexpose VA-1 (11:29)
28.Nexpose VA-2 (11:29)
29.Penetration Testing (11:29)
30.MetaSploit Pro 1 (14:32)
31.MetaSploit Pro 2 (11:29)
32.MetaSploit Pro 3 (11:29)
33.MetaSploit Community (11:29)
34.Armitage (11:20)
35.SQL Injection Introduction (11:20)
36. What is SQL Injection (11:20)
37.Is The Site Infected with SQL Injection (11:20)
38.The Amazing SQLMAP (11:20)
39.Live Example (11:20)Cyber Incident Response
40. Incident Management 2 (11:25)
41. Incident Response Team (11:25)
42. Incident Report (11:25)
43. BCP – DRP (11:25)
44. Business Continuity Plan (14:36)
45. Business Impact Analysis 2 (11:25)
46. MTR – RTO – RPO (11:44)
47. Disaster Recovery Plan (11:25)
48. Alternative Sites (11:25)