Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cysa+ Recordings
Live Class Recordings
Cysa+ | Introduction to CYSA+ | 17th April (50:58)
CYSA+ | Introduction to SOC | 24th April (67:45)
CYSA | Responsibilities of SOC | 25th April (57:03)
CYSA | Intro to Threat Intelligence | 26th April (60:41)
CYSA | Threat intelligence lifecycle | 27th April (71:09)
CYSA | Working with Siemplify SOAR | 27th April (53:41)
CYSA | Phases of Threat Intelligence Lifecycle | 1st May (74:40)
CYSA | Pyramid of Pain | 2nd May (60:42)
CYSA | Threat Hunting | 3rd May (65:50)
Cysa | Threat Hunting labs | 4th May (93:12)
CYSA | IOCs in Mandiant | 5th May (59:34)
CYSA | Network Threat Hunting | 8th May (80:22)
CYSA | Network Threat Hunting (continued) | 9th May (57:09)
CYSA | Doubts related session | 10th May (96:59)
CYSA | Network Threat hunting lab 2 | 11th May (90:31)
CYSA | 1Finishing Network Threat Hunting | 2th May (83:50)
CYSA | Assembly Language | 15th May (68:59)
CYSA | Concepts of Assembly Language | 16th May (55:22)
CYSA | Assembly Language Basic Blocks | 17th May (64:10)
CYSA | Multiplication And Division in Assembly | 18th May (64:02)
CYSA | Lab on comparison | 19th May (65:28)
CYSA | Installing Flare VM | 22nd May (71:22)
CYSA | 23rd May (73:11)
CYSA | Disassembler | 24th May (46:05)
CYSA | Reverse engineering using Ghidra | 25th May (58:20)
CYSA | Malware Analysis Lab Setup | 30th May (64:58)
CYSA | Network setup for Malware Analysis | 31st May (63:55)
CYSA | Analysing WannaCry | 1st June (65:18)
CYSA | Dynamic Analysis of Malware | 2nd June (74:24)
CYSA | GRC intro | 5th June (72:15)
CYSA | RISK MANAGEMENT | 6th June (56:55)
CYSA | Risk Response | 7th June (71:56)
CYSA | Policies and Procedures | 8th June (56:31)
CYSA | Baselines and Guidelines | 9th June (48:39)
CYSA | Endpoint Security | 12th June (60:59)
CYSA | IDS | 13th June (63:16)
CYSA | Installing Snort | 14th June (63:25)
CYSA | Working with Snort | 15th June (22:22)
CYSA | Installing Falcon | 16th June (92:12)
CYSA | Configuring Snort | 19th June (60:20)
CYSA | Snort Modes | 20th June (77:05)
CYSA | Finishing Snort | 21st June (63:59)
CYSA | Rules for Snort | 22nd June (54:58)
CYSA | Snort in IDS mode | 26th June (62:55)
CYSA | Installibg sensors on Crowdstrike | 27th June (49:20)
CYSA | Finishing Crowdstrike | 29th June (84:27)
CYSA | Compliance | 3rd July (64:53)
CYSA | Laws and Frameworks | 4th July (50:55)
CYSA | Finishing up Compliance | 5th July (37:52)
CYSA | SIEMS | 6th July (42:32)
CYSA | Configuring SIEMS | 7th July (52:33)
CYSA | Installing Splunk Forwarder | 10th July (57:04)
CYSA | Verifying connectivity between Forwader and Receiver | 11th July (56:12)
CYSA | SPL | 12th July (57:45)
CYSA | Lab on Splunk | 13th July (54:08)
CYSA | Cyberdefenders Lab on Splunk | 14th July (63:38)
CYSA | BoTSV2 | 17th July (67:06)
CYSA | Troubleshooting Splunk | 18th July (41:39)
CYSA | BOTSv2 | 19th July (63:28)
CYSA | Advanced SPL Queries | 20th July (59:43)
CYSA | SOAR | 21st July (53:38)
CYSA | SOAR 24th July (50:19)
CYSA | SOAR Installation | 25th July (42:38)
CYSA | Chronicle SOAR | 26th July (54:27)
CYSA | Use cases of Siemplify | 28th July (56:54)
CYSA | OpenStego (47:04)
CYSA | Working on SOAR cases (40:32)
CYSA | RAM Forensics | 7th Aug (59:48)
CYSA | Volatility | 8th Aug (59:16)
CYSA | Real world RAM forensics | 9th Aug (36:36)
CYSA | Autopsy and Hard Drive Forensics | 10th Aug (60:59)
CYSA | Persistent memory Forensics | 11th Aug (54:29)
CYSA | IAM | 14th Aug (68:44)
CYSA | IAM Lab | 16th Aug (47:53)
CYSA | Volatility | 8th Aug
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock