-
Cybersecurity Analyst+: Network Hardware
After watching this video, you will be able to identify when to use specific network hardware.
-
Cybersecurity Analyst+: IPv4
After watching this video, you will be able to understand IPv4 settings.
-
Cybersecurity Analyst+: IPv6
After watching this video, you will be able to understand IPv6 settings.
-
Cybersecurity Analyst+: The OSI Model
After watching this video, you will be able to map network hardware and software to the OSI model.
-
Cybersecurity Analyst+: Cloud Concepts
After watching this video, you will be able to explain the purpose of cloud computing.
-
Cybersecurity Analyst+: Cloud Service Models
After watching this video, you will be able to recognize the use of cloud service models.
-
Cybersecurity Analyst+: Network Services
After watching this video, you will be able to configure network services securely.
-
Cybersecurity Analyst+: Wired and Wireless Networks
After watching this video, you will be able to explain common wired and wireless network concepts.
-
Cybersecurity Analyst+: Use Common Wireless Tools
After watching this video, you will be able to scan for wireless networks and understand the returned results.
-
Cybersecurity Analyst+: Internal and External Networks
After watching this video, you will be able to determine placement of network devices.
-
Cybersecurity Analyst+: TCP and UDP
After watching this video, you will be able to understand transport protocols.
-
Cybersecurity Analyst+: Use Common Windows TCP/IP Utilities
After watching this video, you will be able to use Windows tools to use when configuring and troubleshooting TCP/IP.
-
Cybersecurity Analyst+: Use Common Linux TCP/IP Utilities
After watching this video, you will be able to use Linux tools to use when configuring and troubleshooting TCP/IP.
-
Cybersecurity Analyst+: Configure and Scan for Open Ports
After watching this video, you will be able to configure and scan for service ports.
-
Cybersecurity Analyst+: Create a physical memory dump
After watching this video, you will be able to create a memory dump.
-
Cybersecurity Analyst+: View deleted files on a hard disk
After watching this video, you will be able to retrieve and view deleted files.
-
Cybersecurity Analyst+: Prevent and investigate security problems
After watching this video, you will be able to prevent threat materialization and follow proper forensic procedures.
-
Cybersecurity Analyst+: Hiring and Background Checks
After watching this video, you will be able to recognize proper hiring practices.
-
Cybersecurity Analyst+: Digital Forensics and Data at Rest
After watching this video, you will be able to explain how forensic tools can be used against data stored on media.
-
Cybersecurity Analyst+: Common Digital Forensic Tools
After watching this video, you will be able to distinguish common forensics tools from one another.
-
Cybersecurity Analyst+: Mobile Device Forensics
After watching this video, you will be able to explain the sequence of steps that should be followed when conducting mobile device forensics.
-
Cybersecurity Analyst+: User Training and Awareness
After watching this video, you will be able to explain why user training and awareness is one of the most important security defenses.
-
Cybersecurity Analyst+: Digital Forensics Overview
After watching this video, you will be able to enter first topic objective here.
-
Cybersecurity Analyst+: Digital Forensics Hardware
After watching this video, you will be able to determine which forensic hardware is best suited for a specific situation.
-
Cybersecurity Analyst+: Digital Forensics Software
After watching this video, you will be able to determine which forensic software is best suited for a specific situation.
-
Cybersecurity Analyst+: Root Kits
After watching this video, you will be able to recognize root kits.
-
Cybersecurity Analyst+: Privilege Escalation
After watching this video, you will be able to explain the concept of privilege escalation.
-
Cybersecurity Analyst+: Common Exploit Tools
After watching this video, you will be able to distinguish the difference between common exploit tools.
-
Cybersecurity Analyst+: Exploring the Metasploit Suite of Tools
After watching this video, you will be able to use Metasploit tools to further understand the attacker toolset.
-
Cybersecurity Analyst+: Spoofing
After watching this video, you will be able to explain the concept of spoofing.
-
Cybersecurity Analyst+: Packet Forgery using Kali Linux
After watching this video, you will be able to craft forged packets using free tools.
-
Cybersecurity Analyst+: Impersonation
After watching this video, you will be able to recognize how impersonation can be used to gain unauthorized access.
-
Cybersecurity Analyst+: Cross-site Scripting
After watching this video, you will be able to recognize CSS attacks.
-
Cybersecurity Analyst+: User On-Boarding and Off-Boarding
After watching this video, you will be able to provision new user accounts in accordance with organizational security policies.
-
Cybersecurity Analyst+: Personnel Management Best Practices
After watching this video, you will be able to apply personnel management best practices.
-
Cybersecurity Analyst+: Threats, Vulnerabilities, and Exploits
After watching this video, you will be able to distinguish the difference between threats, vulnerabilities, and exploits.
-
Cybersecurity Analyst+: Configure a Packet Filtering Firewall
After watching this video, you will be able to configure a packet filtering firewall.
-
Cybersecurity Analyst+: Proxy Servers
After watching this video, you will be able to explain the purpose of a proxy server.
-
Cybersecurity Analyst+: Security Appliances
After watching this video, you will be able to explain the purpose of a security appliance.
-
Cybersecurity Analyst+: Web Application Firewall
After watching this video, you will be able to recognzie the unique capabilities of web applicaton firewalls.
-
Cybersecurity Analyst+: Packet Filtering Firewalls
After watching this video, you will be able to recognize how packet filters work.
-
Cybersecurity Analyst+: Worms
After watching this video, you will be able to identify worms.
-
Cybersecurity Analyst+: Spyware, Adware
After watching this video, you will be able to identity spyware and adware.
-
Cybersecurity Analyst+: Ransomware
After watching this video, you will be able to explain how ransomware works.
-
Cybersecurity Analyst+: Anti-malware
After watching this video, you will be able to mitigate malware using anti-malware solutions.
-
Cybersecurity Analyst+: Malware Overview
After watching this video, you will be able to identify different types of malware.
-
Cybersecurity Analyst+: Viruses
After watching this video, you will be able to identify viruses.
-
Cybersecurity Analyst+: Network Intrusion Prevention Systems
After watching this video, you will be able to recognize when to use NIPS.
-
Cybersecurity Analyst+: Intrusion Detection and Prevention Overview
After watching this video, you will be able to explain the importance of intrusion detection and prevention.
-
Cybersecurity Analyst+: Host Intrusion Detection Systems
After watching this video, you will be able to recognize when to use HIDS.
-
Cybersecurity Analyst+: Network Intrusion Detection Systems
After watching this video, you will be able to recognize when to use NIDS.
-
Cybersecurity Analyst+: Windows Event Log Forwarding
After watching this video, you will be able to configure Windows event log forwarding.
-
Cybersecurity Analyst+: SIEM
After watching this video, you will be able to identify where SIEM is used.
-
Cybersecurity Analyst+: SCADA and ICS
After watching this video, you will be able to identify where SCADA and ICS are used in different industries.
-
Cybersecurity Analyst+: Common Monitoring Tools
After watching this video, you will be able to distinguish the difference between common monitoring tools.
-
Cybersecurity Analyst+: Linux OS Monitoring Tools
After watching this video, you will be able to monitor the Linux OS.
-
Cybersecurity Analyst+: Windows OS Monitoring Tools
After watching this video, you will be able to monitor the Windows OS.
-
Cybersecurity Analyst+: Reasons for Monitoring
After watching this video, you will be able to recognize the importance of continuous monitoring of various systems.
-
Cybersecurity Analyst+: Exploring the Kali Linux Suite of Tools
After watching this video, you will be able to use Kali Linux tools to further understand the attacker toolset.
-
Cybersecurity Analyst+: Password Cracking
After watching this video, you will be able to crack passwords.
-
Cybersecurity Analyst+: Detailed Log Analysis
After watching this video, you will be able to identify events from specific types of logs.
-
Cybersecurity Analyst+: Understand exploits and monitoring
After watching this video, you will be able to describe the difference between vulnerabilities and exploits as well as use various reporting tools.
-
Cybersecurity Analyst+: Point-in-time Data Analysis
After watching this video, you will be able to analyze timestamped data from various sources.
-
Cybersecurity Analyst+: Data Correlation and Analytics
After watching this video, you will be able to identify trends in network usage.
-
Cybersecurity Analyst+: Monitoring Network Bandwidth
After watching this video, you will be able to view network utilization.
-
Cybersecurity Analyst+: Topology, Service Discovery, and OS Fingerprinting
After watching this video, you will be able to explain how to discover network devices.
-
Cybersecurity Analyst+: Reviewing Logs
After watching this video, you will be able to use logs to learn about the network environment.
-
Cybersecurity Analyst+: Packet Capturing
After watching this video, you will be able to use packet capturing tools for network traffic analysis.
-
Cybersecurity Analyst+: Capture FTP and HTTP Traffic
After watching this video, you will be able to capture and interpret FTP and HTTP traffic.
-
Cybersecurity Analyst+: Virtualization
After watching this video, you will be able to recognize the role of virtualization in cloud computing.
-
Cybersecurity Analyst+: Cloud Security Options
After watching this video, you will be able to identify cloud security options.
-
Cybersecurity Analyst+: Network Architecture and Reconnaissanse
After watching this video, you will be able to recognize various network configurations and perform network reconnaissance.
-
Cybersecurity Analyst+: Threat Overview
After watching this video, you will be able to identify assets and related threats.
-
Cybersecurity Analyst+: Threat Classification
After watching this video, you will be able to recognize known, unkown persitant and zero-day threats.
-
Cybersecurity Analyst+: Personally Identifiable Information
After watching this video, you will be able to identify what constitues PII.
-
Cybersecurity Analyst+: Data Ownership and Retention Policy
After watching this video, you will be able to identify details within data ownership and retention policies.
-
Cybersecurity Analyst+: Data Classification Policy
After watching this video, you will be able to identify details within data classification policies.
-
Cybersecurity Analyst+: Password Policy
After watching this video, you will be able to identify details within a password policy.
-
Cybersecurity Analyst+: Network Infrastructure Discovery
After watching this video, you will be able to discover network configurations.
-
Cybersecurity Analyst+: Email and DNS Harvesting
After watching this video, you will be able to explain harvesting techniques.
-
Cybersecurity Analyst+: Social Engineering and Phishing
After watching this video, you will be able to recognize social engineering techniques.
-
Cybersecurity Analyst+: Acceptable Use Policy
After watching this video, you will be able to identify details within acceptable use policies.
-
Cybersecurity Analyst+: Patching Overview
After watching this video, you will be able to recognize the importance of keeping hardware and software up to date.
-
Cybersecurity Analyst+: Use SCCM to Deploy Patches
After watching this video, you will be able to apply patches properly to secure network hosts.
-
Cybersecurity Analyst+: File System Permissions
After watching this video, you will be able to set the correct access to file systems while adhering to the principle of least privilege.
-
Cybersecurity Analyst+: Network Access Control
After watching this video, you will be able to recognize the purpose of controlling network access with NAC.
-
Cybersecurity Analyst+: SDLC Phases
After watching this video, you will be able to identify SDLC phases.
-
Cybersecurity Analyst+: Secure Coding
After watching this video, you will be able to apply secure coding practices.
-
Cybersecurity Analyst+: Security Testing
After watching this video, you will be able to properly test technology solutions for security.
-
Cybersecurity Analyst+: Host Hardening
After watching this video, you will be able to reduce the attack surface of a network host.
-
Cybersecurity Analyst+: Asset Inventory
After watching this video, you will be able to use existing inventory to drive decisions related to security.
-
Cybersecurity Analyst+: Identify and Respond to Threats
After watching this video, you will be able to recognize threat impact and design an incident response plan.
-
Cybersecurity Analyst+: Memorandum of Understanding
After watching this video, you will be able to explain the purpose of an MOU.
-
Cybersecurity Analyst+: ISO
After watching this video, you will be able to apply ISO security standards to harden your environment.
-
Cybersecurity Analyst+: TOGAF
After watching this video, you will be able to recognize how the TOGAF enterprise IT architecture can increase efficiency of security controls.
-
Cybersecurity Analyst+: SABSA
After watching this video, you will be able to recognize how to assess risk and apply effective security controls to mitigate that risk.
-
Cybersecurity Analyst+: Jump Box
After watching this video, you will be able to recognize the purpose of a jump box.
-
Cybersecurity Analyst+: IT Security Governance
After watching this video, you will be able to explain how proper IT governance results in secured IT resources.
-
Cybersecurity Analyst+: Regulatory Compliance
After watching this video, you will be able to recognize how regulatory compliance can influence security controls.
-
Cybersecurity Analyst+: NIST
After watching this video, you will be able to apply NIST's Cybersecurity Framework to your digital assets.
-
Cybersecurity Analyst+: VLANs
After watching this video, you will be able to recognize the purpose of network segregation using VLANs.
-
Cybersecurity Analyst+: Determining Resource Access
After watching this video, you will be able to identify various conditions that control access to resources.
-
Cybersecurity Analyst+: Honeypots
After watching this video, you will be able to recognize the purpose of intentionally creating vulnerable hosts to monitor malicious use.
-
Cybersecurity Analyst+: Incident Communication
After watching this video, you will be able to describe incident disclosure options.
-
Cybersecurity Analyst+: Host Symptoms and Response Actions
After watching this video, you will be able to analyze host symptoms to determine the best response.
-
Cybersecurity Analyst+: Network Symptoms and Response Actions
After watching this video, you will be able to analyze network symptoms to determine the best response.
-
Cybersecurity Analyst+: Application Symptoms and Response Actions
After watching this video, you will be able to analyze application symptoms to determine the best response.
-
Cybersecurity Analyst+: Prevent Data Storage on Unencrypted Media
After watching this video, you will be able to configure Group Policy to prevent data leakage.
-
Cybersecurity Analyst+: Scope of Impact
After watching this video, you will be able to determine the affect of negative incidents.
-
Cybersecurity Analyst+: Stakeholders
After watching this video, you will be able to identify stakeholders related to incident response.
-
Cybersecurity Analyst+: Role-based Responsibilities
After watching this video, you will be able to recognize incident response roles.
-
Cybersecurity Analyst+: Payment Card Information
After watching this video, you will be able to explain payment card data.
-
Cybersecurity Analyst+: Intellectual Property
After watching this video, you will be able to identify intellectual property.
-
Cybersecurity Analyst+: Data Loss Prevention
After watching this video, you will be able to control how valuable data is used.
-
Cybersecurity Analyst+: Chain of Custody Form
After watching this video, you will be able to protect the integrity of collected evidence.
-
Cybersecurity Analyst+: Change Control Processes
After watching this video, you will be able to implement changes to processes resulting from lessons learned.
-
Cybersecurity Analyst+: Types of Reports
After watching this video, you will be able to determine which type of report provides the best data for a specific situation.
-
Cybersecurity Analyst+: Service Level Agreement
After watching this video, you will be able to determine if SLA details are aligned with business needs.
-
Cybersecurity Analyst+: OEM Documentation
After watching this video, you will be able to identify how OEM documentation can be used to reverse engineer products.
-
Cybersecurity Analyst+: Network Documentation
After watching this video, you will be able to recognize the relevance of up-to-date network documentation.
-
Cybersecurity Analyst+: Incident Response Plan / Call List
After watching this video, you will be able to recognize the ongoing maintenance of incident response plans.
-
Cybersecurity Analyst+: Incident Documentation
After watching this video, you will be able to create proper incident forms.
-
Cybersecurity Analyst+: Lessons Learned
After watching this video, you will be able to identify positive learned outcomes resulting from incidents.
-
Cybersecurity Analyst+: Incident Containment
After watching this video, you will be able to contain negative incidents.
-
Cybersecurity Analyst+: Incident Eradication
After watching this video, you will be able to thoroughly remove data.
-
Cybersecurity Analyst+: Endpoint Vulnerabilities
After watching this video, you will be able to identify security weaknesses on endpoint devices.
-
Cybersecurity Analyst+: Network Vulnerabilities
After watching this video, you will be able to identify security weaknesses at the network level.
-
Cybersecurity Analyst+: Mobile Device Vulnerabilities
After watching this video, you will be able to identify security weaknesses on mobile devices.
-
Cybersecurity Analyst+: Vulnerability Scanning Overview
After watching this video, you will be able to recognize the overall process of scanning for vulnerabilities.
-
Cybersecurity Analyst+: RADIUS, TACACS+
After watching this video, you will be able to configure centralized authentication using RADIUS.
-
Cybersecurity Analyst+: User Provisioning and Deprovisioning
After watching this video, you will be able to describe what user provisioning entails.
-
Cybersecurity Analyst+: Identity Federation
After watching this video, you will be able to describe how identity federation differs from traditional authentication.
-
Cybersecurity Analyst+: Server Vulnerabilities
After watching this video, you will be able to identify security weaknesses in server OSs.
-
Cybersecurity Analyst+: Configure Multifactor Authentication for VPN Clients
After watching this video, you will be able to require VPN connections to use MFA.
-
Cybersecurity Analyst+: Authorization
After watching this video, you will be able to recognize how resource access gets authorized.
-
Cybersecurity Analyst+: Describe ways of reducing vulnerabilities
After watching this video, you will be able to reduce vulnerabilities that can be exploited.
-
Cybersecurity Analyst+: Firewalling Overview
After watching this video, you will be able to recognize the purpose of various firewall types.
-
Cybersecurity Analyst+: Firewall Rules
After watching this video, you will be able to recognize how firewall rules are created based on what type of traffic should or should not be allowed.
-
Cybersecurity Analyst+: Common Vulnerability Scanning Tools
After watching this video, you will be able to distinguish various vulnerability scanning tools from one another.
-
Cybersecurity Analyst+: Scan for Vulnerabilities using Microsoft Baseline Security Analyzer
After watching this video, you will be able to conduct a vulnerability scan using MBSA.
-
Cybersecurity Analyst+: Review Vulnerability Scan Results
After watching this video, you will be able to understand vulnerability scan results.
-
Cybersecurity Analyst+: Vulnerability Remediation
After watching this video, you will be able to put controls in place to mitigate threats.
-
Cybersecurity Analyst+: Vulnerability Scanning Settings
After watching this video, you will be able to configure appropriate vulnerability scanning settings.
-
Cybersecurity Analyst+: SCAP
After watching this video, you will be able to explain how the SCAP standard is used to measure vulnerability issues and compliance.
-
Cybersecurity Analyst+: Scan for Vulnerabilities using Nessus
After watching this video, you will be able to conduct a vulnerability scan using Nessus.
-
Cybersecurity Analyst+: Penetration Testing
After watching this video, you will be able to identify factors related to conducting penetration tests.
-
Cybersecurity Analyst+: Mitigations and Security Control types
After watching this video, you will be able to list categories of security controls and threat mitigations.
-
Cybersecurity Analyst+: Administrative Controls
After watching this video, you will be able to identify administrative security controls.
-
Cybersecurity Analyst+: Compensating Controls
After watching this video, you will be able to identify compensating security controls.
-
Cybersecurity Analyst+: Continuous Monitoring of Controls
After watching this video, you will be able to recognize the importance of continuous monitoring.
-
Cybersecurity Analyst+: Hardware Trust
After watching this video, you will be able to explain how firmware must be accredited before universal trust is established.
-
Cybersecurity Analyst+: ITIL
After watching this video, you will be able to recognize how to apply ITIL to increase the efficiency of IT service delivery.
-
Cybersecurity Analyst+: Physical Controls
After watching this video, you will be able to identify physical security controls.
-
Cybersecurity Analyst+: Logical Controls
After watching this video, you will be able to identify logical security controls.
-
Cybersecurity Analyst+: Configure Router ACL Rules
After watching this video, you will be able to configure router ACL rules to block ICMP traffic.
-
Cybersecurity Analyst+: Authentication
After watching this video, you will be able to recognize authentication methods used to prove one's identity.
-
Cybersecurity Analyst+: Use Windows EFS File Encryption
After watching this video, you will be able to encrypt files on a Windows system using EFS.
-
Cybersecurity Analyst+: Fingerprinting, Hashing
After watching this video, you will be able to explain how file integrity can be maintained.
-
Cybersecurity Analyst+: File Hashing in Linux
After watching this video, you will be able to enable file integrity using Linux.
-
Cybersecurity Analyst+: File Hashing in Windows
After watching this video, you will be able to enable file integrity using Windows.
-
Cybersecurity Analyst+: Symmetric Cryptography
After watching this video, you will be able to differentiate symmetric from asymmetric encryption.
-
Cybersecurity Analyst+: Asymmetric Cryptography
After watching this video, you will be able to differentiate asymmetric from symmetric encryption.
-
Cybersecurity Analyst+: Public Key Infrastructure
After watching this video, you will be able to identify the PKI hierarchy.
-
Cybersecurity Analyst+: Request a PKI Certificate from a Windows CA
After watching this video, you will be able to request a security certificate from a CA.
-
Cybersecurity Analyst+: Cryptography Primer
After watching this video, you will be able to recognize how crypto is used to secure data in the enterprise.