Description
Curriculum
Instructor
كورس CySA+ – تحليل الأمن السيبراني العملي
في عالم بيتطوّر بسرعة، الهجمات السيبرانية بقت أكثر تعقيدًا، والمؤسسات محتاجة ناس مؤهلة تقدر تتعامل مع التهديدات دي بمهارة واحتراف.
كورس CompTIA CySA+ هو بوابتك لعالم تحليل الأمن السيبراني، وهيساعدك تبني خبرة قوية في اكتشاف التهديدات، تحليل الحوادث، والاستجابة ليها بشكل عملي.
لو انت خدت +Security أو عندك خلفية كويسة عن أساسيات السيكيورتي، الكورس ده هيكون نقلة كبيرة في مستواك المهني وهيأهلك لوظائف زي:
-
Security Analyst (SOC Analyst)
-
Incident Responder
-
Vulnerability Analyst
CySA+ (V3) exam objectives
Security operations (33%)
- System and network architecture: explaining log ingestion, operating system (OS) concepts, infrastructure, network architecture, identity and access management (IAM), encryption, and sensitive data protection.
- Malicious activity indicators: analyzing network anomalies like bandwidth spikes and rogue devices, host issues like unauthorized software and data exfiltration, application irregularities like unexpected communication and service interruptions, and threats like social engineering attacks.
- Tools and techniques: detecting malicious activity using tools like Wireshark, security information and event management (SIEM), and VirusTotal, along with techniques like pattern recognition and email analysis, supported by scripting languages like Python and PowerShell.
- Threat intelligence and hunting: comparing threat actors, tactics, techniques, and procedures (TTP); confidence levels; collection methods; intelligence sharing; and hunting techniques.
- Process improvement: standardizing processes, streamlining operations, integrating tools, and using a single pane of glass.
Vulnerability management (30%)
- Vulnerability scanning: implementing asset discovery, internal vs. external scanning, agent vs. agentless, credentialed vs. non-credentialed, passive vs. active, static vs. dynamic, and critical infrastructure scanning.
- Assessment tool output: analyzing network scanning, web application scanners, vulnerability scanners, debuggers, multipurpose tools, and cloud infrastructure assessments.
- Vulnerability prioritization: interpreting common vulnerability scoring system (CVSS), validating findings, assessing exploitability, and considering asset value and zero-day vulnerabilities.
- Mitigation controls: recommending controls for cross-site scripting (XSS), overflow vulnerabilities, and data poisoning.
- Vulnerability response: explaining compensating controls, patching, configuration management, maintenance windows, exceptions, governance, service-level objectives (SLOs), secure software development life cycle (SDLC), and threat modeling.
Incident response management (20%)
- Attack methodology frameworks: explaining cyber kill chains, diamond model of intrusion analysis, MITRE ATT&CK, Open Source Security Testing Methodology Manual (OSSTMM), and OWASP testing guide.
- Incident response activities: performing detection, analysis, containment, eradication, and recovery.
- Incident management life cycle: explaining incident response plans, tools, playbooks, tabletop exercises, training, business continuity (BC), disaster recovery (DR), forensic analysis, and root cause analysis.
Reporting and communication (17%)
- Vulnerability management reporting: explaining compliance reports, action plans, inhibitors to remediation, metrics, key performance indicators (KPIs), and stakeholder communication.
- Incident response reporting: explaining incident declaration, escalation, reporting, communication, root cause analysis, lessons learned, and metrics and KPIs.
- 5 Sections
- 1 Lesson
- Lifetime
Expand all sectionsCollapse all sections
- Course Intro1
- Security Operations0
- Vulnerability Management0
- Incident Response and Management0
- Reporting and Communication0
Master Instructor
0 Students6 Courses
Review
$50.00
0 student
1 lesson
Language: English
0 quiz
Assessments: Yes
Skill level All levels
Courses you might be interested in
مقدمة عن كورس CEH – Certified Ethical Hacker هل فكرت قبل كده إزاي الهاكرز بيخترقوا الأنظمة؟ طب هل فكرت تكون الشخص اللي يعرف نفس الأدوات والتقنيات، لكن يستخدمها لحماية البيانات...
-
0 Lessons
$50.00
EC-Council Certified Network Defender (C|ND) كورس Certified Network Defender – CND من EC-Council هو شهادة مهمة جدًا لأي حد شغال في الـ IT أو مسؤول عن السيكيورتي في الشبكات، وعايز...
-
2 Lessons
Free
مقدمة كورس: مبادئ الشبكات – Networking Fundamentals هل فكرت قبل كده الإنترنت ده بيشتغل إزاي؟ إزاي الأجهزة بتتواصل مع بعض؟ وإزاي البيانات بتنتقل من مكان لمكان حول العالم في أجزاء...
-
0 Lessons
$2.00
Wireshark للمبتدئين – تحليل الشبكات خطوة بخطوة Wireshark هي أقوى أداة مجانية لتحليل الشبكات ومراقبة الترافيك اللي بيعدي على جهازك أو شبكتك. في الكورس ده، هنتعلم إزاي نستخدم Wireshark...
-
0 Lessons
Free