|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
OR_on1226581129 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
201212s2021 nyu o ||| 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|c EBLCP
|d EBLCP
|d TOH
|d N$T
|d OCLCO
|d OCLCF
|d CNWPU
|d UKAHL
|d OCLCO
|d OCLCQ
|d OCLCO
|
020 |
|
|
|a 1260462250
|
020 |
|
|
|a 9781260462258
|q (electronic bk.)
|
029 |
1 |
|
|a AU@
|b 000068856801
|
035 |
|
|
|a (OCoLC)1226581129
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Rogers, Bobby E.
|
245 |
1 |
0 |
|a CompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002)
|h [electronic resource].
|
260 |
|
|
|a New York :
|b McGraw-Hill Education,
|c 2021.
|
300 |
|
|
|a 1 online resource (0 p.)
|
500 |
|
|
|a Description based upon print version of record.
|
505 |
0 |
|
|a Cover -- Title Page -- Copyright Page -- Dedication -- Contents -- Acknowledgments -- Introduction -- 1.0 Threat and Vulnerability Management -- Objective 1.1 Explain the importance of threat data and intelligence -- Intelligence Sources -- Open-Source Intelligence -- Proprietary and Closed-Source Intelligence -- Timeliness -- Relevancy -- Accuracy -- Confidence Levels -- Indicator Management -- Structured Threat Information eXpression (STIX) -- Trusted Automated eXchange of Indicator Intelligence (TAXII) -- OpenIOC -- Threat Classification -- Known Threats vs. Unknown Threats
|
505 |
8 |
|
|a Zero-Day Threats -- Advanced Persistent Threats -- Threat Actors -- Nation-States -- Hacktivists -- Organized Crime -- Insider Threats -- Intelligence Cycle -- Requirements -- Collection -- Analysis -- Dissemination -- Feedback -- Commodity Malware -- Information Sharing and Analysis Communities -- Healthcare -- Financial -- Aviation -- Government -- Critical Infrastructure -- REVIEW -- 1.1 QUESTIONS -- 1.1 ANSWERS -- Objective 1.2 Given a scenario, utilize threat intelligence to support organizational security -- Attack Frameworks -- MITRE ATT&CK -- The Diamond Model of Intrusion Analysis
|
505 |
8 |
|
|a Cyber Kill Chain -- Threat Research -- Reputational -- Behavioral -- Indicators of Compromise (IOCs) -- Common Vulnerability Scoring System (CVSS) -- Threat Modeling Methodologies -- Common Threat Modeling Methodologies -- Adversary Capability -- Total Attack Surface -- Attack Vector -- Impact -- Likelihood -- Threat Intelligence Sharing with Supported Functions -- Incident Response -- Vulnerability Management -- Risk Management -- Security Engineering -- Detection and Monitoring -- REVIEW -- 1.2 QUESTIONS -- 1.2 ANSWERS
|
505 |
8 |
|
|a Objective 1.3 Given a scenario, perform vulnerability management activities -- Vulnerability Identification -- Asset Criticality -- Active vs. Passive Scanning -- Mapping/Enumeration -- Validation -- True Positive -- False Positive -- True Negative -- False Negative -- Remediation/Mitigation -- Configuration Baseline -- Patching -- Hardening -- Compensating Controls -- Risk Acceptance -- Verification of Mitigation -- Scanning Parameters and Criteria -- Risks Associated with Scanning Activities -- Vulnerability Feed -- Scope -- Credentialed vs. Non-Credentialed -- Server-Based vs. Agent-Based
|
505 |
8 |
|
|a Internal vs. External -- Special Considerations -- Inhibitors to Remediation -- Memorandum of Understanding (MOU) -- Service Level Agreement (SLA) -- Organizational Governance -- Business Process Interruption -- Degrading Functionality -- Legacy Systems -- Proprietary Systems -- REVIEW -- 1.3 QUESTIONS -- 1.3 ANSWERS -- Objective 1.4 Given a scenario, analyze the output from common vulnerability assessment tools -- Vulnerability Assessment Tools -- Application Tools -- Web Application Scanners -- Software Assessment Tools and Techniques -- Infrastructure Tools -- Network Enumeration
|
520 |
|
|
|a Focused coverage of every topic on the current version of the CompTIA CySA+ exam Get on the fast track to becoming CompTIA CySA+ certified with this affordable, portable study tool. Inside, cybersecurity professional Bobby Rogers guides you on your career path, providing expert tips and sound advice along the way. With an intensive focus only on what you need to know to pass CompTIA CySA+ Exam CS0-002, this certification passport is your ticket to success on exam day. Designed for focus on key topics and exam success: List of official exam objectives covered by domain Exam Tip element offers expert pointers for success on the test Key Term highlights specific term or acronym definitions key to passing the exam Caution notes common pitfalls and real-world issues as well as warnings about the exam Tables, bulleted lists, and figures throughout focus on quick reference and review Cross-References point to an essential, related concept covered elsewhere in the book Practice questions and content review after each objective section prepare you for exam mastery Covers all exam topics, including: Threat and vulnerability management Threat data and intelligence Vulnerability management, assessment tools, and mitigation Software and systems security Solutions for infrastructure management Software and hardware assurance best practices Security operations and monitoring Proactive threat hunting Automation concepts and technologies Incident response process, procedure, and analysis Compliance and assessment Data privacy and protection Support of organizational risk mitigation Online content includes: Customizable practice exam test engine for CS0-002 200+ realistic multiple-choice and performance-based practice questions and in-depth explanations.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
610 |
2 |
0 |
|a Computing Technology Industry Association
|x Examinations
|v Study guides.
|
610 |
2 |
7 |
|a Computing Technology Industry Association
|2 fast
|
650 |
|
0 |
|a Computer security
|x Examinations
|v Study guides.
|
650 |
|
0 |
|a Computer networks
|x Security measures
|x Examinations
|v Study guides.
|
650 |
|
6 |
|a Sécurité informatique
|x Examens
|v Guides de l'étudiant.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures
|x Examens
|v Guides de l'étudiant.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|x Examinations
|2 fast
|
650 |
|
7 |
|a Computer security
|x Examinations
|2 fast
|
650 |
|
7 |
|a Examinations
|2 fast
|
655 |
|
7 |
|a Study guides
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Rogers, Bobby E.
|t CompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002)
|d New York : McGraw-Hill Education,c2021
|z 9781260462265
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781260462258/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH38229900
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6422114
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2702172
|
994 |
|
|
|a 92
|b IZTAP
|