IT Security Gumbo- CompTIA CYSA+ Practical Labs- Threat Management Domain

Threat Management Domain |PracComp TIA CYSAtical Labs

Instructed by Corey Charles

  • Includes all Standard Features
  • Get Unlimited access to all the courses
  • No Contract. Cancel Anytime
Starting in just $19 / mo see all plans
Subscribe Now
$ 299
Annual Subscription
  • One year Unlimited Access
  • Access to all courses
    You will be able to access all the courses from any category on the platform.
  • Learning paths access
  • Access Assignments & Projects
  • Access on Mobile, PC and Tablet
  • Pause & Resume Courses Anytime
  • Offline viewing
  • Instructor Support
  • Course Completion Certificates
  • Cancel Anytime
Subscribe Now
  • From an internal perspective, we will use windows tools to investigate basic topology but also see in detail the services and processes happening within a windows system that are not directly visible without interrogation.
  • Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes
  • Given a scenario, analyze the results of a network reconnaissance

The IT Security Gumbo: Comp TIA CYSA+ Practical Labs focuses on the practical aspects of the exam objectives. It is therefore advised to refer to your own course materials to gain a deeper understanding of any theoretical aspects of the exam objectives.

  • A basic understanding of networks, operating systems but most importantly a strong will to learn new concepts and techniques.
  • Basic knowledge of networking concepts
  • Basic knowledge of operating systems such as Windows, Linux
  • All levels of IT Professionals
  • Students and Professionals who are looking to take the Comp TIA CYSA+ Certification
View More...

Section 1 : Introduction

  • Lecture 1 :

Section 2 : Topology Discovery

  • Lecture 1 :
  • Basic Scanning
  • Lecture 2 :
  • Discovering Network Topologies
  • Lecture 3 :
  • OS Fingerprinting
  • Lecture 4 :
  • Output Logs
  • Lecture 5 :
  • Zenmap the NMAP GUI

Section 3 : DNS Harvesting

  • Lecture 1 :
  • DNS Harvesting with Application Software
  • Lecture 2 :
  • DNS Harvesting Online
  • Lecture 3 :
  • ICANN Website

Section 4 : Social Engineering Reconnaissance

  • Lecture 1 :
  • Social Engineering Reconnaissance

Section 5 : Windows Command Line Tools

  • Lecture 1 :
  • IPConfig
  • Lecture 2 :
  • Netstat
  • Lecture 3 :
  • Ping
  • Lecture 4 :
  • Tracert and Route
  • Lecture 5 :
  • ARP and Whoami

Corey Charles,

Corey Charles was born and grew up in New Orleans, LA. He's now been in IT Security field for 13 years and has been recognized by many of his clients for his skilled work in the vulnerability management subject matter. Mr. Charles is the owner and CEO of DreamVision IT LLC and has partnered with likes of cybrary, pluralsight and other teaching platforms to provide on demand IT Security training.
View More...
cisco-ccna-r-s-200-125-the-complete-course

Cisco CCNA R/S (200-125): The Compl...

By : Lazaro (Laz) Diaz

Lecture 153

implementing-configuring-cisco-routers-part-1

Implementing & Configuring Cisco Ro...

By : Dariusz Lipski

Lecture 10

ccnp-switch-300-115-the-complete-course

CCNP Switch (300-115): The Complete...

By : Lazaro (Laz) Diaz

Lecture 93

ccna-wireless-200-355-the-complete-course

CCNA Wireless (200-355): The Comple...

By : Lazaro (Laz) Diaz

Lecture 41

odoo-the-complete-master-class-beginner-to-professional

Odoo: The complete Master Class: B...

By : Abhilash Nelson

Lecture 32

convert-hex-to-decimal-in-under-30-seconds

Convert Hex to Decimal in under 30 ...

By : Lazaro (Laz) Diaz

Lecture 20

Buy

$22

Sign up and start learning
By signing up. you agree to our Terms of Use and Privacy Policy
Forget Password