Existing User Login

New User? Create An Account

Request new password

We are iCollege

Established in 2003 under the parent company XpertSkills, iCollege is one of the most trusted marketplaces in E-Learning. Our dedication transcends mere content – we source learning products from only the best suppliers and vendors across the globe so you have the widest selection of educational courses designed to equip you for success.

Headquartered in stunning South Africa, our distributed company spans 3 continents with employees in the U.S., India, and of course, South Africa. Our customers call more than 120 countries home. We're proud to say iCollege is trusted by leading organizations in major tech hubs, including Silicon Valley, to train and equip employees to be the very best that they can be.

Whether partnering with Fortune 500 companies or being part of an individual's journey toward career growth, we are committed to the success of all who trust us as their source for education and training.

Contact Details:

Web: www.xpertskills.com
Skype: xpertskills
Mail: info@xpertskills.com

Physical Address:

Head Office - South Africa
16 Monte Carlo Crescent
Kyalami business Park
Johannesburg
South Africa 1684

You are here

courses popup callback

EDUTAINMENT COURSE:

CompTIA CySA+ (CS0-001)

Interactive and entertaining talk-show style format presented by industry leading experts.
Overview
The CompTIA CySA (Cybersecurity Analyst) certification prep course is designed to help prepare candidates to sit for the CySA+ exam,   as well as reinforce concepts for work roles such as Systems Security Analyst,  Threat Analyst,  and Vulnerability Assessment Analysts.
Objectives
  • Apply environmental reconnaissance techniques like OS fingerprinting,  e-mail harvesting,  Netstat, and Syslog
  • Analyze the results of network reconnaissance,  and recommend or implement countermeasures
  • Secure a corporate environment by scanning for vulnerabilities
  • Respond to cyber incidents with a forensics toolkit,  maintain the chain of custody,  and analyze incident severity.
Prerequisites
  • Know basic network terminology and functions (such as OSI Model,  Topology,  Ethernet,  Wi-Fi,  switches,  routers).
  • Understand TCP/IP addressing,  core protocols,  and troubleshooting tools
  • Identify network attack strategies and defenses.
  • Know the technologies and uses of cryptographic standards and products
  • Identify network- and host-based security technologies and practices.
  • Describe the standards and products used to enforce security on web and communications technologies.
Target Audience
The CompTIA Cybersecurity Analyst (CySA+) examination is designed for IT security analysts,  vulnerability analysts,  or threat intelligence analysts.  The exam will certify that the successful candidate has the knowledge and skills required to configure and use threat detection tools,  perform data analysis,  and interpret the results to identify vulnerabilities,  threats,   and risks to an organization with the end goal of securing and protecting applications and systems within an organization.
Instructor: ITProTV

ITProTV delivers the IT instruction that you need to advance or launch your IT career in a fun and creative way. With attractive studios and an interactive, talk-show style format, you will watch more and learn more. From CompTIA, Cisco, and Microsoft to Security and Cloud Fundamentals, you can learn it all. Dive deep into one or master many with the friendly faces of IT training.

ITProTV is CompTIA’s Official Video Training Partner.

  1. THREAT MANAGEMENT
1
Start
Overview
2
Start
Reconnaissance: Tools
3
Start
Reconnaissance: Tools Part 2
4
Start
Reconnaissance: Tools Part 3
5
Start
Reconnaissance: Tools Part 4
6
Start
Reconnaissance: Techniques
8
Start
Reconnaissance: Techniques Part 2
9
Start
Reconnaissance: Techniques Part 3
10
Start
Reconnaissance: Techniques Part 4
11
Start
Data Correlation and Analytics
12
Start
Reconnaissance: Interpreting Results
13
Start
Countermeasures: Network Segmentation
14
Start
Countermeasures: Honeypots and Sinkholes
15
Start
Countermeasures: System Hardening and NAC
16
Start
Security Practices: Reverse Engineering
17
Start
Security Practices: Penetration Testing
18
Start
Security Practices: Training and Risk Evaluation
  1. VULNERABILITY MANAGEMENT
19
Start
Vulnerability Management Process
20
Start
Vulnerability Management: Scan Configuration
21
Start
Vulnerability Management CVSS
22
Start
Vulnerability Management: CVSS Part 2
23
Start
Vulnerability Management: Remediation
24
Start
Scan Results Verification
25
Start
Common Vulnerabilities
26
Start
Common Vulnerabilities Part 2
27
Start
Common Vulnerabilities Part 3
28
Start
Common Vulnerabilities Part 4
29
Start
Common Vulnerabilities Part 5
  1. CYBER INCIDENT RESPONSE
30
Start
Threat Classification
31
Start
Severity and Prioritization
32
Start
Forensics Toolkit
33
Start
Incident Response Plan
34
Start
Forensic Suites and Utilities
35
Start
Forensic Suites and Utilities Part 2
36
Start
Forensic Suites and Utilities Part 3
37
Start
Forensic Suites and Utilities Part 4
38
Start
CSIRT Roles and Communication
39
Start
Indicator of Compromise: Network Symptoms
40
Start
Indicators of Compromise: Host and App Symptoms
41
Start
Recovery and Post-Incident Response
42
Start
Recovery and Post-Incident Response Part 2
  1. SECURITY ARCHITECTURE AND TOOLSETS
43
Start
Cybersecurity Frameworks
44
Start
Cybersecurity Frameworks Part 2
45
Start
Policies, Controls and Procedures
46
Start
Policies, Controls and Procedures Part 2
47
Start
Identity and Access Managemnt
48
Start
Identity and Access Management Part 2
49
Start
Compensating Controls and Architecture
50
Start
Compensating Controls and Architecture Part 2
51
Start
Compensating Controls and Architecture Part 3
52
Start
Security Tools and Technologies
53
Start
Security Tools and Technologies Part 2
54
Start
Security Tools and Technologies Part 3
55
Start
Software Development Security
56
Start
Software Development Security Part 2
EDUTAINMENT COURSE
?Interactive and entertaining talk-show style format presented by industry leading experts.
  • 25:42:00 Hours of learning
  • Receive a Certificate of Excellence on successful completion
  • Presented by highly qualified, industry leading experts
  • 12 Months access
  • 10-Day money-back guarantee
Back to Top