CompTIA CSA+ cybersecurity analyst certification all-in-one exam guide (exam CS0-001) / Fernando Maymi, Brent Chapman.
| Author/creator | Maymí, Fernando |
| Other author | Chapman, Brent. |
| Format | Electronic |
| Edition | 1 |
| Publication Info | New York : McGraw-Hill Education, [2018] |
| Description | pages cm |
| Supplemental Content | Full text available from AccessEngineering |
| Subjects |
| Contents | Machine generated contents note: Part I: Threat Management -- Chapter 1: Applying Reconnaissance Techniques -- Chapter 2: Analyzing the Results of Reconnaissance -- Chapter 3: Responding to Network-Based Threats -- Chapter 4: Securing a Cooperate Network -- Part II: Vulnerability Management -- Chapter 5: Implementing Vulnerability Management Processes -- Chapter 6: Vulnerability Scanning -- Part III: Cyber Incident Response -- Chapter 7: The Incident Response Process -- Chapter 8: Determining the Impact of Incidents -- Chapter 9: Preparing the Incident Response Toolkit -- Chapter 10: Selecting the Best Course of Action -- Part IV: Security Architectures -- Chapter 11: Frameworks, Policies, Controls, and Procedures -- Chapter 12: Identity and Access Management -- Chapter 13: Putting in Compensating Controls -- Chapter 14: Secure Software Development -- Chapter 15: Tool Sets -- Part V: Appendices -- Appendix A: Exam Objective Map -- Appendix B: About the CD -- Glossary. |
| Abstract | "This highly effective self-study system provides complete coverage of every objective for the challenging CompTIA CSA+ Cybersecurity Analyst exam. You'll find learning objectives at the beginning of each chapter, exam tips, in-depth explanations, and practice exam questions. All questions closely mirror those on the live test in content, format, and tone. Designed to help you pass exam CS0-001 with ease, this definitive guide also serves as an essential on-the-job reference. Covers every topic on the exam, including: - Threat and vulnerability management - Conducting and analyzing reconnaissance - Responding to network-based threats - Securing a cooperate network - Cyber incident response - Determining the impact of incidents - Preparing the incident response toolkit - Security architectures - Policies, procedures, and controls - Assuring identity and access management - Putting in compensating controls - Secure software development"-- Provided by publisher. |
| Access restriction | Available only to authorized users. |
| Technical details | Mode of access: World Wide Web |
| Genre/form | Electronic books. |
| LCCN | 2017034094 |
| ISBN | 9781260011814 (set) |
| ISBN | 9781260011784 (book) |
| ISBN | 9781260011791 (CD) |