Skip to product information
1 of 2

CompTIA

CompTIA CySA+ (CS0-003) Complete Course, Labs, & Practice Exams

CompTIA CySA+ (CS0-003) Complete Course, Labs, & Practice Exams

Regular price $399.00 USD
Regular price $0.00 USD Sale price $399.00 USD
Liquid error (snippets/price line 128): divided by 0% OFF Sold out
Type

Advance Your Cybersecurity Career

Did you know the Bureau of Labor Statistics projects 32% job growth for information security analysts through 2032?  CompTIA Cybersecurity Analyst (CySA+) (CS0-003) prepares professionals for a career as a security analyst, with certification holders earning an an average salary of $97,147.

Who This Course Is For

  • IT security, vulnerability, and threat intelligence analysts 
  • Security Operations Center (SOC) analysts
  • Incident response professionals preparing for more advanced roles
  • Students preparing for the CompTIA CySA+ (CS0-003) certification exam

What’s Included

  • 36+ hours of comprehensive video training led by industry experts
  • Official CompTIA CySA+ (CS0-003) study guide
  • Hands-on labs to apply theoretical knowledge in practical scenarios
  • Practice exam - Over 700 questions to assess readiness
  • Downloadable study resources and tools
  • 12-month access to all course materials

What You’ll Learn

This course thoroughly prepares you for the CompTIA CySA+ (CS0-003) exam by covering all five key domains:

  • Threat and Vulnerability Management
  • Software and Systems Security 
  • Security Operations and Monitoring 
  • Incident Response
  • Compliance and Assessment 

Why Choose Dion Training?

  • Learn from a top trainer in the industry 
  • 60-Day Pass Guarantee - pass your exam or we pay for your retake
  • Hands-on labs to reinforce practical skills and real-world application
  • CompTIA Platinum Partner
View full details
Modules
1 - Introduction
Toggle chapter
#
Lesson
Duration
Type
1.
Welcome to the Course
FREE
13m:19s
Video FREE
2.
Download the Study Guide
PDF PDF
3.
Exam Tips
FREE
4m:28s
Video FREE
4.
100% Pass Guarantee
FREE
3m:43s
Video FREE
5.
Quiz: Introduction
Quiz Quiz
2 - Identify Security Control Types
Toggle chapter
#
Lesson
Duration
Type
1.
Identify Security Control Types
FREE
1m:23s
Video FREE
2.
Cybersecurity Roles and Responsibilities
FREE
6m:44s
Video FREE
3.
Security Operations Center (SOC)
FREE
5m:0s
Video FREE
4.
Security Control Categories
18m:17s
Video Video
5.
Selecting Security Controls
4m:59s
Video Video
6.
Quiz: Identify Security Control Types
Quiz Quiz
3 - Threat Intelligence Sharing
Toggle chapter
#
Lesson
Duration
Type
1.
Threat Intelligence Sharing
1m:11s
Video Video
2.
Security and Threat Intelligence
5m:12s
Video Video
3.
Intelligence Cycle
9m:44s
Video Video
4.
Intelligence Sources
9m:15s
Video Video
5.
Information Sharing and Analysis Centers (ISACS)
4m:25s
Video Video
6.
Threat Intelligence Sharing
4m:53s
Video Video
7.
Quiz: Threat Intelligence
Quiz Quiz
4 - Classifying Threats
Toggle chapter
#
Lesson
Duration
Type
1.
Classifying Threats
1m:50s
Video Video
2.
Threat Classification
9m:7s
Video Video
3.
Threat Actors
13m:46s
Video Video
4.
Malware
7m:48s
Video Video
5.
Threat Research
10m:58s
Video Video
6.
Attack Frameworks
11m:13s
Video Video
7.
Indicator Management
6m:54s
Video Video
8.
Quiz: Classifying Threat
Quiz Quiz
5 - Threat Hunting
Toggle chapter
#
Lesson
Duration
Type
1.
Threat Hunting
2m:5s
Video Video
2.
Threat Modeling
8m:20s
Video Video
3.
Threat Hunting
6m:54s
Video Video
4.
Open-source Intelligence
3m:39s
Video Video
5.
Google Hacking
7m:40s
Video Video
6.
Profiling Techniques
5m:27s
Video Video
7.
Harvesting Techniques
3m:30s
Video Video
8.
AbuseIPDB
3m:32s
Video Video
9.
Deep Web and Dark Web
4m:8s
Video Video
10.
Bug Bounty
3m:11s
Video Video
11.
Quiz: Threat Hunting
Quiz Quiz
6 - Network Forensics
Toggle chapter
#
Lesson
Duration
Type
1.
Network Forensics
1m:29s
Video Video
2.
Network Forensic Tools
4m:13s
Video Video
3.
tcpdump
7m:50s
Video Video
4.
Wireshark
10m:57s
Video Video
5.
Flow Analysis
6m:19s
Video Video
6.
IP and DNS Analysis
6m:34s
Video Video
7.
URL Analysis
15m:30s
Video Video
8.
Conduct Packet Analysis
6m:3s
Video Video
9.
Quiz: Network Forensics
Quiz Quiz
7 - Appliance Monitoring
Toggle chapter
#
Lesson
Duration
Type
1.
Appliance Monitoring
1m:29s
Video Video
2.
Firewall Logs
11m:23s
Video Video
3.
Firewall Configurations
18m:56s
Video Video
4.
Proxy Logs
6m:26s
Video Video
5.
Web Application Firewall Logs
2m:46s
Video Video
6.
IDS and IPS Configuration
6m:37s
Video Video
7.
IDS and IPS Logs
8m:58s
Video Video
8.
Port Security Configuration
5m:38s
Video Video
9.
NAC Configuration
6m:49s
Video Video
10.
Analysis of Security Appliances
15m:43s
Video Video
11.
Quiz: Application Monitoring
Quiz Quiz
8 - Endpoint Monitoring
Toggle chapter
#
Lesson
Duration
Type
1.
Endpoint Monitoring
2m:5s
Video Video
2.
Endpoint Analysis
5m:47s
Video Video
3.
Sandboxing
7m:20s
Video Video
4.
Reverse Engineering
11m:15s
Video Video
5.
Malware Exploitation
7m:50s
Video Video
6.
Behavior Analysis
11m:35s
Video Video
7.
Malware Analysis (demo)
25m:40s
Video Video
8.
EDR Configuration
4m:52s
Video Video
9.
Block Lists and Allow Lists
10m:40s
Video Video
10.
Quiz: Endpoint Monitoring
Quiz Quiz
9 - Email Monitoring
Toggle chapter
#
Lesson
Duration
Type
1.
Email Monitoring
1m:42s
Video Video
2.
Email IOCs
5m:21s
Video Video
3.
Email Header Analysis
11m:11s
Video Video
4.
Email Content Analysis
3m:39s
Video Video
5.
Email Server Security
8m:4s
Video Video
6.
SMTP Log Analysis
5m:20s
Video Video
7.
Email Message Security
6m:28s
Video Video
8.
Analyzing Email Headers
4m:14s
Video Video
9.
Quiz: Email Monitoring
Quiz Quiz
10 - Configuring Your SIEM
Toggle chapter
#
Lesson
Duration
Type
1.
Configuring Your SIEM
1m:39s
Video Video
2.
SIEM
8m:54s
Video Video
3.
Security Data Collection
5m:5s
Video Video
4.
Data Normalization
7m:42s
Video Video
5.
Event Log
3m:36s
Video Video
6.
Syslog
6m:27s
Video Video
7.
Configuring a SIEM Agent
19m:53s
Video Video
8.
Quiz: Configuring Your SIEM
Quiz Quiz
11 - Analyzing Your SIEM
Toggle chapter
#
Lesson
Duration
Type
1.
Analyzing Your SIEM
1m:53s
Video Video
2.
SIEM Dashboards
11m:44s
Video Video
3.
Analysis and Detection
7m:14s
Video Video
4.
Trend Analysis
10m:0s
Video Video
5.
Rule and Query Writing
4m:42s
Video Video
6.
Searching and Piping Commands
7m:24s
Video Video
7.
Scripting Tools
9m:25s
Video Video
8.
Analyzing, Filtering, and Searching Logs
18m:7s
Video Video
9.
Quiz: Analyzing Your SIEM
Quiz Quiz
12 - Digital Forensics
Toggle chapter
#
Lesson
Duration
Type
1.
Digital Forensics
3m:11s
Video Video
2.
Digital Forensic Analysts
4m:50s
Video Video
3.
Forensics Procedures
9m:17s
Video Video
4.
Work Product Retention
2m:51s
Video Video
5.
Data Acquisition
4m:59s
Video Video
6.
Forensics Tools
7m:11s
Video Video
7.
Memory Acquisition
5m:23s
Video Video
8.
Disk Image Acquisition
11m:55s
Video Video
9.
Hashing
4m:47s
Video Video
10.
Timeline Generation
4m:46s
Video Video
11.
Carving
5m:42s
Video Video
12.
Chain of Custody
5m:51s
Video Video
13.
Collecting and Validating Evidence
9m:5s
Video Video
14.
Quiz: Digital Forensics
Quiz Quiz
13 - Analyzing Network IOCs
Toggle chapter
#
Lesson
Duration
Type
1.
Analyzing Network IOCs
1m:47s
Video Video
2.
Analyzing Network IOCs
2m:15s
Video Video
3.
Traffic Spikes
18m:1s
Video Video
4.
Beaconing
13m:40s
Video Video
5.
Irregular P2P Communications
7m:56s
Video Video
6.
Rogue Devices
11m:26s
Video Video
7.
Scans and Sweeps
5m:21s
Video Video
8.
Nonstandard Port Usage
11m:25s
Video Video
9.
TCP Ports
7m:58s
Video Video
10.
UDP Ports
7m:5s
Video Video
11.
Data Exfiltration
6m:23s
Video Video
12.
Covert Channels
7m:35s
Video Video
13.
Analysis of Network IOCs
12m:34s
Video Video
14.
Quiz: Analyzing Network IOCs
Quiz Quiz
14 - Analyzing Host-related IOCs
Toggle chapter
#
Lesson
Duration
Type
1.
Analyzing Host-related IOCs
1m:14s
Video Video
2.
Host-related IOCs
1m:41s
Video Video
3.
Malicious Processes
10m:0s
Video Video
4.
Memory Forensics
7m:12s
Video Video
5.
Consumption
9m:1s
Video Video
6.
Disk and File System
11m:24s
Video Video
7.
Unauthorized Privilege
5m:15s
Video Video
8.
Unauthorized Software
5m:49s
Video Video
9.
Unauthorized Change/Hardware
2m:52s
Video Video
10.
Persistence
10m:1s
Video Video
11.
Quiz: Analyzing Host-related IOCs
Quiz Quiz
15 - Analyzing Application-related IOCs
Toggle chapter
#
Lesson
Duration
Type
1.
Analyzing Application-related IOCs
1m:24s
Video Video
2.
Application-related IOCs
1m:38s
Video Video
3.
Anomalous Activity
4m:6s
Video Video
4.
Service Interruptions
5m:6s
Video Video
5.
Application Logs
12m:37s
Video Video
6.
New Accounts
5m:37s
Video Video
7.
Virtualization Forensics
5m:57s
Video Video
8.
Mobile Forensics
11m:32s
Video Video
9.
Quiz: Analyzing Application-related IOCs
Quiz Quiz
16 - Analyzing Lateral Movement and Pivoting IOCs
Toggle chapter
#
Lesson
Duration
Type
1.
Analyzing Lateral Movement and Pivoting IOCs
1m:14s
Video Video
2.
Lateral Movement and Pivoting
3m:22s
Video Video
3.
Pass the Hash
10m:11s
Video Video
4.
Golden Ticket
7m:9s
Video Video
5.
Lateral Movement
6m:39s
Video Video
6.
Pivoting
6m:3s
Video Video
7.
Quiz: Analyzing Lateral Movement and Pivoting IOCs
Quiz Quiz
17 - Incident Response Preparation
Toggle chapter
#
Lesson
Duration
Type
1.
Incident Response Preparation
2m:41s
Video Video
2.
Incident Response Phases
11m:10s
Video Video
3.
Documenting Procedures
7m:12s
Video Video
4.
Data Criticality
13m:49s
Video Video
5.
Communication Plan
7m:7s
Video Video
6.
Reporting Requirements
4m:53s
Video Video
7.
Response Coordination
7m:28s
Video Video
8.
Business Continuity Plan
13m:40s
Video Video
9.
Training and Testing
6m:41s
Video Video
10.
Quiz: Incident Response Preparation
Quiz Quiz
18 - Detection and Analysis
Toggle chapter
#
Lesson
Duration
Type
1.
Detection and Analysis
1m:25s
Video Video
2.
OODA Loop
5m:43s
Video Video
3.
Defensive Capabilities
4m:46s
Video Video
4.
Detection and Analysis
6m:44s
Video Video
5.
Impact Analysis
7m:50s
Video Video
6.
Incident Classification
5m:57s
Video Video
7.
Quiz: Detection and Analysis
Quiz Quiz
19 - Containment, Eradication, Recovery, and Post-incident Actions
Toggle chapter
#
Lesson
Duration
Type
1.
Containment, Eradication, Recovery, and Post-incident Actions
1m:58s
Video Video
2.
Containment
6m:26s
Video Video
3.
Eradication
6m:18s
Video Video
4.
Eradication Actions
4m:29s
Video Video
5.
Recovery
2m:44s
Video Video
6.
Recovery Actions
6m:25s
Video Video
7.
Post-Incident Activities
5m:57s
Video Video
8.
Lessons Learned
7m:8s
Video Video
9.
Root Cause Analysis
4m:22s
Video Video
10.
Quiz: Containment, Eradication, Recovery, and Post-incident Actions
Quiz Quiz
20 - Risk Mitigation
Toggle chapter
#
Lesson
Duration
Type
1.
Risk Mitigation
1m:39s
Video Video
2.
Risk Identification Process
7m:55s
Video Video
3.
Conducting an Assessment
8m:55s
Video Video
4.
Risk Calculation
18m:45s
Video Video
5.
Business Impact Analysis
12m:28s
Video Video
6.
Risk Prioritization
16m:57s
Video Video
7.
Communicating Risk
8m:7s
Video Video
8.
Training and Exercises
5m:0s
Video Video
9.
Quiz: Risk Mitigation
Quiz Quiz
21 - Frameworks, Policies, and Procedures
Toggle chapter
#
Lesson
Duration
Type
1.
Frameworks, Policies, and Procedures
1m:13s
Video Video
2.
Enterprise Security Architecture
2m:44s
Video Video
3.
Prescriptive Frameworks
4m:28s
Video Video
4.
Risk-based Frameworks
4m:30s
Video Video
5.
Industry Frameworks
15m:10s
Video Video
6.
Audits and Assessments
7m:12s
Video Video
7.
Continuous Monitoring
5m:13s
Video Video
8.
Quiz: Frameworks, Policies, and Procedures
Quiz Quiz
22 - Enumeration Tools
Toggle chapter
#
Lesson
Duration
Type
1.
Enumeration Tools
1m:39s
Video Video
2.
Enumeration Tools
7m:35s
Video Video
3.
Nmap Discovery Scans
8m:36s
Video Video
4.
Nmap Port Scans
6m:1s
Video Video
5.
Nmap Port States
3m:43s
Video Video
6.
Nmap Fingerprinting Scans
4m:18s
Video Video
7.
Using Nmap
11m:22s
Video Video
8.
Hping
5m:41s
Video Video
9.
Angry IP Scanner
3m:46s
Video Video
10.
Maltego
3m:26s
Video Video
11.
Responder
1m:36s
Video Video
12.
Wireless Assessment Tools
5m:31s
Video Video
13.
Recon-ng
21m:47s
Video Video
14.
Hashcat
3m:18s
Video Video
15.
Testing Credential Security
2m:36s
Video Video
16.
Quiz: Enumeration Tools
Quiz Quiz
23 - Vulnerability Scanning
Toggle chapter
#
Lesson
Duration
Type
1.
Vulnerability Scanning (Introduction)
1m:37s
Video Video
2.
Identifying Vulnerabilities
3m:38s
Video Video
3.
Scanning Workflow
6m:45s
Video Video
4.
Scope Considerations
8m:8s
Video Video
5.
Scanner Types
9m:0s
Video Video
6.
Scanning Parameters
6m:16s
Video Video
7.
Scheduling and Constraints
8m:52s
Video Video
8.
Vulnerability Feeds
3m:21s
Video Video
9.
Scan Sensitivity
5m:7s
Video Video
10.
Scanning Risks
2m:53s
Video Video
11.
Conducting Scans
31m:24s
Video Video
12.
Quiz: Vulnerability Scanning
Quiz Quiz
24 - Analyzing Output from Vulnerability Scanners
Toggle chapter
#
Lesson
Duration
Type
1.
Analyzing Output from Vulnerability Scanners
1m:59s
Video Video
2.
Scan Reports
3m:21s
Video Video
3.
Common Identifiers
6m:31s
Video Video
4.
CVSS
8m:25s
Video Video
5.
Interpreting CVSS
9m:43s
Video Video
6.
Vulnerability Reports
11m:3s
Video Video
7.
Nessus
6m:55s
Video Video
8.
OpenVAS and Qualys
3m:10s
Video Video
9.
Assessing Scan Outputs
13m:37s
Video Video
10.
Quiz: Analyzing Output from Vulnerability Scanners
Quiz Quiz
25 - Mitigating Vulnerabilities
Toggle chapter
#
Lesson
Duration
Type
1.
Mitigating Vulnerabilities
1m:34s
Video Video
2.
Remediation and Mitigation
6m:28s
Video Video
3.
Configuration Baselines
4m:18s
Video Video
4.
Hardening and Patching
11m:4s
Video Video
5.
Remediation Issues
8m:35s
Video Video
6.
Quiz: Mitigating Vulnerabilities
Quiz Quiz
26 - Identity and Access Management Solutions
Toggle chapter
#
Lesson
Duration
Type
1.
Identity and Access Management Solutions
1m:49s
Video Video
2.
Identity and Access Management
7m:4s
Video Video
3.
Password Policies
6m:10s
Video Video
4.
SSO and MFA
5m:40s
Video Video
5.
Certificate Management
3m:55s
Video Video
6.
Federation
5m:19s
Video Video
7.
Passwordless Authentication
5m:17s
Video Video
8.
Privilege Management
5m:52s
Video Video
9.
IAM Auditing
6m:14s
Video Video
10.
Conduct and Use Policies
3m:27s
Video Video
11.
Account and Permissions Audits
4m:33s
Video Video
12.
Quiz: Identity and Access Management Solutions
Quiz Quiz
27 - Network Architecture and Segmentation
Toggle chapter
#
Lesson
Duration
Type
1.
Network Architecture and Segmentation
1m:59s
Video Video
2.
Asset and Change Management
10m:6s
Video Video
3.
Network Architecture
11m:21s
Video Video
4.
Segmentation
6m:1s
Video Video
5.
Jumpbox
5m:4s
Video Video
6.
Virtualization
5m:50s
Video Video
7.
Virtualized Infrastructure
6m:35s
Video Video
8.
Honeypots
6m:25s
Video Video
9.
Zero Trust
6m:37s
Video Video
10.
Configuring Network Segmentation
10m:6s
Video Video
11.
Quiz: Network Architecture and Segmentation
Quiz Quiz
28 - Hardware Assurance Best Practices
Toggle chapter
#
Lesson
Duration
Type
1.
Hardware Assurance Best Practices
1m:44s
Video Video
2.
Supply Chain Assessment
5m:25s
Video Video
3.
Root of Trust
4m:36s
Video Video
4.
Trusted Firmware
4m:55s
Video Video
5.
Secure Processing
4m:3s
Video Video
6.
Quiz: Hardware Assurance Best Practices
Quiz Quiz
29 - Specialized Technology
Toggle chapter
#
Lesson
Duration
Type
1.
Specialized Technology
1m:37s
Video Video
2.
Mobile Vulnerabilities
12m:0s
Video Video
3.
IoT Vulnerabilities
3m:29s
Video Video
4.
Embedded System Vulnerabilities
6m:52s
Video Video
5.
ICS & SCADA Vulnerabilities
8m:19s
Video Video
6.
Mitigating Vulnerabilities
3m:30s
Video Video
7.
Premise System Vulnerabilities
6m:14s
Video Video
8.
Vehicular Vulnerabilities
6m:53s
Video Video
9.
Quiz: Specialized Technology
Quiz Quiz
30 - Non-technical Data and Privacy Controls
Toggle chapter
#
Lesson
Duration
Type
1.
Non-technical Data and Privacy Controls
2m:45s
Video Video
2.
Data Classification
9m:13s
Video Video
3.
Data Types
3m:19s
Video Video
4.
Legal Requirements
9m:17s
Video Video
5.
Data Policies
5m:42s
Video Video
6.
Data Retention
6m:59s
Video Video
7.
Data Ownership
4m:6s
Video Video
8.
Data Sharing
5m:46s
Video Video
9.
Quiz: Non-technical Data and Privacy Controls
Quiz Quiz
31 - Technical Data and Privacy Controls
Toggle chapter
#
Lesson
Duration
Type
1.
Technical Data and Privacy Controls
1m:20s
Video Video
2.
Access Controls
3m:3s
Video Video
3.
File System Permissions
10m:11s
Video Video
4.
Encryption
3m:17s
Video Video
5.
Data Loss Prevention
4m:23s
Video Video
6.
DLP Discovery and Classification
3m:58s
Video Video
7.
Deidentification Controls
6m:30s
Video Video
8.
DRM and Watermarking
4m:11s
Video Video
9.
Analyzing Share Permissions
3m:38s
Video Video
10.
Quiz: Technical Data and Privacy Controls
Quiz Quiz
32 - Mitigate Software Vulnerabilities and Attacks
Toggle chapter
#
Lesson
Duration
Type
1.
Mitigate Software Vulnerabilities and Attacks
1m:38s
Video Video
2.
SDLC Integration
12m:11s
Video Video
3.
Execution and Escalation
6m:23s
Video Video
4.
Overflow Attacks
13m:32s
Video Video
5.
Race Conditions
5m:50s
Video Video
6.
Improper Error Handling
5m:17s
Video Video
7.
Design Vulnerabilities
4m:16s
Video Video
8.
Platform Best Practices
6m:31s
Video Video
9.
Metasploit Framework
18m:45s
Video Video
10.
Quiz: Mitigate Software Vulnerabilities and Attacks
Quiz Quiz
33 - Mitigate Web Application Vulnerabilities and Attacks
Toggle chapter
#
Lesson
Duration
Type
1.
Mitigate Web Application Vulnerabilities and Attacks
1m:32s
Video Video
2.
Directory Traversal
8m:8s
Video Video
3.
Cross-site Scripting
8m:4s
Video Video
4.
SQL Injection
7m:42s
Video Video
5.
XML Vulnerabilities
5m:10s
Video Video
6.
Secure Coding
9m:31s
Video Video
7.
Authentication Attacks
7m:9s
Video Video
8.
Session Hijacking
6m:55s
Video Video
9.
Server-Side Request Forgery
4m:22s
Video Video
10.
Sensitive Data Exposure
3m:20s
Video Video
11.
Clickjacking
2m:22s
Video Video
12.
Web Application Vulnerabilities
8m:43s
Video Video
13.
Quiz: Mitigate Web Application Vulnerabilities and Attacks
Quiz Quiz
34 - Analyzing Application Assessments
Toggle chapter
#
Lesson
Duration
Type
1.
Analyzing Application Assessments
1m:0s
Video Video
2.
Software Assessments
7m:35s
Video Video
3.
Reverse Engineering
7m:19s
Video Video
4.
Dynamic Analysis
7m:56s
Video Video
5.
Web Application Scanners
3m:14s
Video Video
6.
Burp Suite
10m:34s
Video Video
7.
OWASP ZAP
2m:55s
Video Video
8.
Analyzing Web Applications
15m:43s
Video Video
9.
Quiz: Analyzing Application Assessments
Quiz Quiz
35 - Cloud and Automation
Toggle chapter
#
Lesson
Duration
Type
1.
Cloud and Automation
1m:4s
Video Video
2.
Cloud Models
16m:3s
Video Video
3.
Service Models
10m:44s
Video Video
4.
Cloud-based Infrastructure
7m:22s
Video Video
5.
CASB
4m:28s
Video Video
6.
Quiz: Cloud and Automation
Quiz Quiz
36 - Service-Oriented Architecture
Toggle chapter
#
Lesson
Duration
Type
1.
Service-Oriented Architecture
2m:9s
Video Video
2.
SOA and Microservices
6m:3s
Video Video
3.
SOAP
4m:41s
Video Video
4.
SAML
6m:54s
Video Video
5.
REST
10m:15s
Video Video
6.
APIs, Webhooks, and Plugins
11m:44s
Video Video
7.
Scripting
4m:29s
Video Video
8.
Workflow Orchestration
6m:17s
Video Video
9.
FAAS and Serverless
8m:14s
Video Video
10.
Quiz: Service-Oriented Architecture
Quiz Quiz
37 - Cloud Infrastructure Assessments
Toggle chapter
#
Lesson
Duration
Type
1.
Cloud Infrastructure Assessments
1m:17s
Video Video
2.
Cloud Threats
8m:13s
Video Video
3.
Cloud Forensics
4m:1s
Video Video
4.
Auditing the Cloud
5m:6s
Video Video
5.
Conducting Cloud Audits
14m:2s
Video Video
6.
Quiz: Cloud Infrastructure Assessments
Quiz Quiz
38 - Automation Concepts and Technologies
Toggle chapter
#
Lesson
Duration
Type
1.
Automation Concepts and Technologies
2m:15s
Video Video
2.
CI/CD
7m:6s
Video Video
3.
DevSecOps
4m:51s
Video Video
4.
IAC
4m:23s
Video Video
5.
Machine Learning
8m:30s
Video Video
6.
Data Enrichment
3m:41s
Video Video
7.
SOAR
3m:20s
Video Video
8.
Standardized Processes
4m:1s
Video Video
9.
Single Pane of Glass
5m:57s
Video Video
10.
Quiz: Automation Concepts and Technologies
Quiz Quiz
39 - Conclusion
Toggle chapter
#
Lesson
Duration
Type
1.
Conclusion (What to Do Next…)
13m:16s
Video Video
2.
BONUS: What's Come Next?
4m:5s
Video Video
3.
Practice Exam
Quiz Exam

Reviews