Curriculum
Available in
days
days
after you enroll
- Cysa+ | Introduction to CYSA+ | 17th April (50:58)
- CYSA+ | Introduction to SOC | 24th April (67:45)
- CYSA | Responsibilities of SOC | 25th April (57:03)
- CYSA | Intro to Threat Intelligence | 26th April (60:41)
- CYSA | Threat intelligence lifecycle | 27th April (71:09)
- CYSA | Working with Siemplify SOAR | 27th April (53:41)
- CYSA | Phases of Threat Intelligence Lifecycle | 1st May (74:40)
- CYSA | Pyramid of Pain | 2nd May (60:42)
- CYSA | Threat Hunting | 3rd May (65:50)
- Cysa | Threat Hunting labs | 4th May (93:12)
- CYSA | IOCs in Mandiant | 5th May (59:34)
- CYSA | Network Threat Hunting | 8th May (80:22)
- CYSA | Network Threat Hunting (continued) | 9th May (57:09)
- CYSA | Doubts related session | 10th May (96:59)
- CYSA | Network Threat hunting lab 2 | 11th May (90:31)
- CYSA | 1Finishing Network Threat Hunting | 2th May (83:50)
- CYSA | Assembly Language | 15th May (68:59)
- CYSA | Concepts of Assembly Language | 16th May (55:22)
- CYSA | Assembly Language Basic Blocks | 17th May (64:10)
- CYSA | Multiplication And Division in Assembly | 18th May (64:02)
- CYSA | Lab on comparison | 19th May (65:28)
- CYSA | Installing Flare VM | 22nd May (71:22)
- CYSA | 23rd May (73:11)
- CYSA | Disassembler | 24th May (46:05)
- CYSA | Reverse engineering using Ghidra | 25th May (58:20)
- CYSA | Malware Analysis Lab Setup | 30th May (64:58)
- CYSA | Network setup for Malware Analysis | 31st May (63:55)
- CYSA | Analysing WannaCry | 1st June (65:18)
- CYSA | Dynamic Analysis of Malware | 2nd June (74:24)
- CYSA | GRC intro | 5th June (72:15)
- CYSA | RISK MANAGEMENT | 6th June (56:55)
- CYSA | Risk Response | 7th June (71:56)
- CYSA | Policies and Procedures | 8th June (56:31)
- CYSA | Baselines and Guidelines | 9th June (48:39)
- CYSA | Endpoint Security | 12th June (60:59)
- CYSA | IDS | 13th June (63:16)
- CYSA | Installing Snort | 14th June (63:25)
- CYSA | Working with Snort | 15th June (22:22)
- CYSA | Installing Falcon | 16th June (92:12)
- CYSA | Configuring Snort | 19th June (60:20)
- CYSA | Snort Modes | 20th June (77:05)
- CYSA | Finishing Snort | 21st June (63:59)
- CYSA | Rules for Snort | 22nd June (54:58)
- CYSA | Snort in IDS mode | 26th June (62:55)
- CYSA | Installibg sensors on Crowdstrike | 27th June (49:20)
- CYSA | Finishing Crowdstrike | 29th June (84:27)
- CYSA | Compliance | 3rd July (64:53)
- CYSA | Laws and Frameworks | 4th July (50:55)
- CYSA | Finishing up Compliance | 5th July (37:52)
- CYSA | SIEMS | 6th July (42:32)
- CYSA | Configuring SIEMS | 7th July (52:33)
- CYSA | Installing Splunk Forwarder | 10th July (57:04)
- CYSA | Verifying connectivity between Forwader and Receiver | 11th July (56:12)
- CYSA | SPL | 12th July (57:45)
- CYSA | Lab on Splunk | 13th July (54:08)
- CYSA | Cyberdefenders Lab on Splunk | 14th July (63:38)
- CYSA | BoTSV2 | 17th July (67:06)
- CYSA | Troubleshooting Splunk | 18th July (41:39)
- CYSA | BOTSv2 | 19th July (63:28)
- CYSA | Advanced SPL Queries | 20th July (59:43)
- CYSA | SOAR | 21st July (53:38)
- CYSA | SOAR 24th July (50:19)
- CYSA | SOAR Installation | 25th July (42:38)
- CYSA | Chronicle SOAR | 26th July (54:27)
- CYSA | Use cases of Siemplify | 28th July (56:54)
- CYSA | OpenStego (47:04)
- CYSA | Working on SOAR cases (40:32)
- CYSA | RAM Forensics | 7th Aug (59:48)
- CYSA | Volatility | 8th Aug (59:16)
- CYSA | Real world RAM forensics | 9th Aug (36:36)
- CYSA | Autopsy and Hard Drive Forensics | 10th Aug (60:59)
- CYSA | Persistent memory Forensics | 11th Aug (54:29)
- CYSA | IAM | 14th Aug (68:44)
- CYSA | IAM Lab | 16th Aug (47:53)
This Course is Part of
Check your inbox to confirm your subscription