Curriculum
- 6 Sections
- 31 Lessons
- 365 Days
Expand all sectionsCollapse all sections
- Introduction To CYSA1
- 1.0 Threat and Vulnerability Management11
- 2.1Explain the importance of threat data and intelligence.33 Minutes
- 2.2Given a scenario, utilize threat intelligence to support organizational security.39 Minutes
- 2.3Given a scenario, perform vulnerability management activities.49 Minutes
- 2.4Given a scenario, analyze the output from common vulnerability assessment tools – Part 156 Minutes
- 2.5Explain the threats and vulnerabilities associated with specialized technology – Part 133 Minutes
- 2.6Explain the threats and vulnerabilities associated with operating in the cloud – Part 112 Minutes
- 2.7Given a scenario, implement controls to mitigate attacks and software vulnerabilities – Part 146 Minutes
- 2.8Given a scenario, Analyze the output from common vulnerability assessment tools – Part 232 Minutes
- 2.9Explain the threats and vulnerabilities associated with operating in the cloud – Part 227 Minutes
- 2.10Given a scenario, Implement controls to mitigate attacks and software vulnerabilities – Part 234 Minutes
- 2.11Explain the threats and vulnerabilities associated with specialized technology – Part 218 Minutes
- 2.0 Software and Systems Security4
- 3.0 Security Operations and Monitoring7
- 4.1Given a scenario, analyze data as part of security monitoring activities – Part 136 Minutes
- 4.2Given a scenario, implement configuration changes to existing controls to improve security.36 Minutes
- 4.3Explain the importance of proactive threat hunting33 Minutes
- 4.4Compare and contrast automation concepts and technologies – Part 132 Minutes
- 4.5Given a scenario, analyze data as part of security monitoring activities – Part 238 Minutes
- 4.6Given a scenario, analyze data as part of security monitoring activities – Part 328 Minutes
- 4.7Compare and contrast automation concepts and technologies – Part 221 Minutes
- 4.0 Incident Response5
- 5.1Explain the importance of the incident response process.26 Minutes
- 5.2Given a scenario, apply the appropriate incident response procedure.29 Minutes
- 5.3Given an incident, analyze potential indicators of compromise – Part 19 Minutes
- 5.4Given a scenario, utilize basic digital forensics techniques.50 Minutes
- 5.5Given an incident, analyze potential indicators of compromise – Part 220 Minutes
- 5.0 Compliance and Assessment3