CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (Exam CS0-001) (inbunden)
Fler böcker inom
Format
Häftad (Paperback)
Språk
Engelska
Antal sidor
421
Utgivningsdatum
2017-12-02
Upplaga
ed
Förlag
McGraw-Hill Education
Medarbetare
Chapman, Brent
Dimensioner
231 x 185 x 23 mm
Vikt
704 g
Antal komponenter
1
ISBN
9781260011814

CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (Exam CS0-001)

Häftad,  Engelska, 2017-12-02

Slutsåld

This comprehensive self-study guide offers complete coverage of the new CompTIA Cybersecurity Analyst+ certification exam

this highly effective self-study system provides complete coverage of every objective for the challenging CompTIA CSA+ Cybersecurity Analyst exam. You'll find learning objectives at the beginning of each chapter, exam tips, in-depth explanations, and practice exam questions. All questions closely mirror those on the live test in content, format, and tone. Designed to help you pass exam CS0-001 with ease, this definitive guide also serves as an essential on-the-job reference.

covers every topic on the exam, including:

Threat and vulnerability management

Conducting and analyzing reconnaissance

Responding to network-based threats

Securing a cooperate network

Cyber incident response

Determining the impact of incidents

Preparing the incident response toolkit

Security architectures

Policies, procedures, and controls

Assuring identity and access management

Putting in compensating controls

Secure software development

electronic content includes:

175+ practice questions

Secured book PDF

Kundrecensioner

Har du läst boken? Sätt ditt betyg »

Fler böcker av Fernando Maymi

Övrig information

Matt Walker, CEH, CPTS, is an IT security architect working for Hewlett-Packard. He has held a variety of networking and IT security positions, including most recently the IT security manager position at Marshall Space Flight Center (SAIC contract) and Kennedy Space Center (Lockheed Martin contract).

Innehållsförteckning

part i: threat management
chapter 1: Applying Reconnaissance Techniques
chapter 2: Analyzing the Results of Reconnaissance
chapter 3: Responding to Network-Based Threats
chapter 4: Securing a Cooperate Network

part ii: vulnerability management
chapter 5: Implementing Vulnerability Management Processes
chapter 6: Vulnerability Scanning

part iii: cyber incident response
chapter 7: The Incident Response Process
chapter 8: Determining the Impact of Incidents
chapter 9: Preparing the Incident Response Toolkit
chapter 10: Selecting the Best Course of Action

part iv: security architectures
chapter 11: Frameworks, Policies, Controls, and Procedures
chapter 12: Identity and Access Management
chapter 13: Putting in Compensating Controls
chapter 14: Secure Software Development
chapter 15: Tool Sets

part v: appendices
appendix a: Exam Objective Map
appendix b: About the CD
glossary