Welcome to the Course!
Welcome to the course
()
Meet your instructor
()
1. Foundations of Digital Defense
Module 1: Foundations of digital defense
()
Cybersecurity defined
()
The CIA triad
()
Vulnerabilities, threats, exploits, and risks
()
Cybersecurity terminology
()
Defense in depth
()
Network security solutions
()
Endpoint security solutions
()
Application security solutions
()
Agent-based vs. agentless security solutions
()
SIEM and SOAR
()
Virtualized solutions
()
Cloud-based solutions
()
Access control model options
()
Common Vulnerability Scoring System (CVSS)
()
Data visibility considerations
()
Data loss analysis
()
The 5-tuple approach
()
Detection methods
()
2. Threat Detection and Surveillance
Module 2: Threat detection and surveillance
()
Attack surfaces
()
Monitoring sources
()
Data visibility comparison
()
Categories of data types
()
Denial-of-service (DoS) attacks
()
Man-in-the-middle attacks
()
Protocol-based attacks
()
SQL injection attacks
()
Cross-site scripting attacks
()
Command injection attacks
()
Social engineering attacks
()
AI-based social engineering attacks
()
Malware and ransomware attacks
()
Buffer overflow attacks
()
Command-and-control (C2) attacks
()
Comparison of obfuscation techniques
()
Encryption with digital certificates
()
Digital certificate components
()
3. Endpoint Protection and Analysis
Module 3: Endpoint protection and analysis
()
Host-based protection
()
Microsoft Windows security considerations
()
macOS security considerations
()
Linux security considerations
()
Determining responsibility
()
Evidence identification
()
System log interpretation
()
Malware analysis
()
4. Network Traffic Analysis and Interpretation
Module 4: Network traffic analysis and interpretation
()
Security event sources
()
Alert classification
()
Deep packet inspection (DPI)
()
Comparing traffic-capture methods and NetFlow analysis
()
Wireshark PCAP file analysis for Telnet flow
()
Wireshark PCAP file analysis for malware infection
()
Interpreting protocol headers
()
Artifact elements
()
Regular expressions
()
5. Cybersecurity Governance and Best Practices
Module 5: Cybersecurity governance and best practices
()
Cybersecurity management considerations
()
Incident response plans
()
Incident response example
()
Evidence collection recommendations
()
Network profiling
()
Server profiling
()
Categorizing data protection
()
Cyber kill chain
()
Diamond model
()
SOC metrics and scope analysis
()
6. Exam Preparation
Module 6: Exam preparation
()
Registering for the exam
()
Study strategies
()
What to do on exam day
()
Conclusion
Congratulations and next steps
()
Ex_Files_CCA_200_201_Cert_Prep.zip
(344.5 MB)