You are on page 1of 38

CySA+ Summery

Abdullah Abdulrahman Alrefai


Objectives
1 2 3
Threat and Vulnerability Security Operations and
Software and Systems Security
Management Monitoring
1-Threat 1-security solutions for infrastructure management 1-Data Analysis
2-Threat intelligence 2-Identity and access management 2-Endpoint Data Analysis
3-Attack frameworks 3-software Security 3-Network Data Analysis
4-Vulnerability management 4-hardware Security 4-E-mail Analysis
5-Vulnerability assessment tools 5-Log & SIEM review
6-Threats and vulnerabilities for systems 6-Configuration changes
7-Attacks and software vulnerabilities 7-Threat hunting
8-Automation concepts and technologies

4 5

Incident Response Compliance and Assessment


1-Importance of the incident response process 1-Data privacy and protection
2-Incident response procedure 2-Organizational risk mitigation
3-Indicators of compromise 3-Frameworks, policies, procedures, and controls.
4-Digital forensics techniques
Threat and Vulnerability Management
Threat
Threat and Vulnerability Management
Threat
Threat and Vulnerability Management
Threat
Threat and Vulnerability Management
Threat
Threat and Vulnerability Management
Threat intelligence
Threat and Vulnerability Management
Threat intelligence
Threat and Vulnerability Management
Attack frameworks

‫مرجع ومصدر مفيد‬


‫مقال عبدالعزيز الصنات‬
https://caramellaapp.com/nightwing/IXK-VfiqG/cyber-kill-chain
Threat and Vulnerability Management
Attack frameworks

‫مرجع ومصدر مفيد‬


‫ باللغة العربية‬MITRE ATT&CK
Nowayer ، ‫محمد السحيمي‬، ‫ثامر الشمري‬، ‫مالك الدوسري‬
https://github.com/Malajab/incyber/tree/master/MITRE-ATT%26CK-AR
Threat and Vulnerability Management
Vulnerability management

‫مرجع ومصدر مفيد‬


Ben Scudera ‫مقال‬
https://www.coalfire.com/the-coalfire-blog/june-2018
Threat and Vulnerability Management
Vulnerability management

‫مرجع ومصدر مفيد‬


Ben Scudera ‫مقال‬
https://www.coalfire.com/the-coalfire-blog/june-2018
Threat and Vulnerability Management
Vulnerability assessment tools.
Threat and Vulnerability Management
Threats and vulnerabilities for systems
Threat and Vulnerability Management
Threats and vulnerabilities for systems
Threat and Vulnerability Management
Attacks and software vulnerabilities
Threat and Vulnerability Management
Attacks and software vulnerabilities
Threat and Vulnerability Management
Attacks and software vulnerabilities
Software and Systems Security
Security solutions for infrastructure management
Software and Systems Security
Security solutions for infrastructure management
Software and Systems Security
Security solutions for infrastructure management
Software and Systems Security
Software Security
Software and Systems Security
Hardware Security
Software and Systems Security
Software Security
Security Operations and Monitoring
Data Analysis
Security Operations and Monitoring
Endpoint Data Analysis
Security Operations and Monitoring
Network Data Analysis
Security Operations and Monitoring
E-mail Analysis
Security Operations and Monitoring
Log & SIEM review
Security Operations and Monitoring
Configuration changes
Security Operations and Monitoring
Threat hunting
Security Operations and Monitoring
Automation concepts and technologies
Incident Response
Importance of the incident response process
Incident Response
Incident response procedure
Incident Response
Indicators of compromise
Incident Response
Digital forensics techniques
Compliance and Assessment
Data privacy and protection
Compliance and Assessment
Frameworks, policies, procedures, and controls.

You might also like