Cargando…

CompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002)

Focused coverage of every topic on the current version of the CompTIA CySA+ exam Get on the fast track to becoming CompTIA CySA+ certified with this affordable, portable study tool. Inside, cybersecurity professional Bobby Rogers guides you on your career path, providing expert tips and sound advice...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Rogers, Bobby E.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : McGraw-Hill Education, 2021.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Mu 4500
001 OR_on1226581129
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 201212s2021 nyu o ||| 0 eng d
040 |a EBLCP  |b eng  |c EBLCP  |d EBLCP  |d TOH  |d N$T  |d OCLCO  |d OCLCF  |d CNWPU  |d UKAHL  |d OCLCO  |d OCLCQ  |d OCLCO 
020 |a 1260462250 
020 |a 9781260462258  |q (electronic bk.) 
029 1 |a AU@  |b 000068856801 
035 |a (OCoLC)1226581129 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Rogers, Bobby E. 
245 1 0 |a CompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002)  |h [electronic resource]. 
260 |a New York :  |b McGraw-Hill Education,  |c 2021. 
300 |a 1 online resource (0 p.) 
500 |a Description based upon print version of record. 
505 0 |a Cover -- Title Page -- Copyright Page -- Dedication -- Contents -- Acknowledgments -- Introduction -- 1.0 Threat and Vulnerability Management -- Objective 1.1 Explain the importance of threat data and intelligence -- Intelligence Sources -- Open-Source Intelligence -- Proprietary and Closed-Source Intelligence -- Timeliness -- Relevancy -- Accuracy -- Confidence Levels -- Indicator Management -- Structured Threat Information eXpression (STIX) -- Trusted Automated eXchange of Indicator Intelligence (TAXII) -- OpenIOC -- Threat Classification -- Known Threats vs. Unknown Threats 
505 8 |a Zero-Day Threats -- Advanced Persistent Threats -- Threat Actors -- Nation-States -- Hacktivists -- Organized Crime -- Insider Threats -- Intelligence Cycle -- Requirements -- Collection -- Analysis -- Dissemination -- Feedback -- Commodity Malware -- Information Sharing and Analysis Communities -- Healthcare -- Financial -- Aviation -- Government -- Critical Infrastructure -- REVIEW -- 1.1 QUESTIONS -- 1.1 ANSWERS -- Objective 1.2 Given a scenario, utilize threat intelligence to support organizational security -- Attack Frameworks -- MITRE ATT&CK -- The Diamond Model of Intrusion Analysis 
505 8 |a Cyber Kill Chain -- Threat Research -- Reputational -- Behavioral -- Indicators of Compromise (IOCs) -- Common Vulnerability Scoring System (CVSS) -- Threat Modeling Methodologies -- Common Threat Modeling Methodologies -- Adversary Capability -- Total Attack Surface -- Attack Vector -- Impact -- Likelihood -- Threat Intelligence Sharing with Supported Functions -- Incident Response -- Vulnerability Management -- Risk Management -- Security Engineering -- Detection and Monitoring -- REVIEW -- 1.2 QUESTIONS -- 1.2 ANSWERS 
505 8 |a Objective 1.3 Given a scenario, perform vulnerability management activities -- Vulnerability Identification -- Asset Criticality -- Active vs. Passive Scanning -- Mapping/Enumeration -- Validation -- True Positive -- False Positive -- True Negative -- False Negative -- Remediation/Mitigation -- Configuration Baseline -- Patching -- Hardening -- Compensating Controls -- Risk Acceptance -- Verification of Mitigation -- Scanning Parameters and Criteria -- Risks Associated with Scanning Activities -- Vulnerability Feed -- Scope -- Credentialed vs. Non-Credentialed -- Server-Based vs. Agent-Based 
505 8 |a Internal vs. External -- Special Considerations -- Inhibitors to Remediation -- Memorandum of Understanding (MOU) -- Service Level Agreement (SLA) -- Organizational Governance -- Business Process Interruption -- Degrading Functionality -- Legacy Systems -- Proprietary Systems -- REVIEW -- 1.3 QUESTIONS -- 1.3 ANSWERS -- Objective 1.4 Given a scenario, analyze the output from common vulnerability assessment tools -- Vulnerability Assessment Tools -- Application Tools -- Web Application Scanners -- Software Assessment Tools and Techniques -- Infrastructure Tools -- Network Enumeration 
520 |a Focused coverage of every topic on the current version of the CompTIA CySA+ exam Get on the fast track to becoming CompTIA CySA+ certified with this affordable, portable study tool. Inside, cybersecurity professional Bobby Rogers guides you on your career path, providing expert tips and sound advice along the way. With an intensive focus only on what you need to know to pass CompTIA CySA+ Exam CS0-002, this certification passport is your ticket to success on exam day. Designed for focus on key topics and exam success: List of official exam objectives covered by domain Exam Tip element offers expert pointers for success on the test Key Term highlights specific term or acronym definitions key to passing the exam Caution notes common pitfalls and real-world issues as well as warnings about the exam Tables, bulleted lists, and figures throughout focus on quick reference and review Cross-References point to an essential, related concept covered elsewhere in the book Practice questions and content review after each objective section prepare you for exam mastery Covers all exam topics, including: Threat and vulnerability management Threat data and intelligence Vulnerability management, assessment tools, and mitigation Software and systems security Solutions for infrastructure management Software and hardware assurance best practices Security operations and monitoring Proactive threat hunting Automation concepts and technologies Incident response process, procedure, and analysis Compliance and assessment Data privacy and protection Support of organizational risk mitigation Online content includes: Customizable practice exam test engine for CS0-002 200+ realistic multiple-choice and performance-based practice questions and in-depth explanations. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
610 2 0 |a Computing Technology Industry Association  |x Examinations  |v Study guides. 
610 2 7 |a Computing Technology Industry Association  |2 fast 
650 0 |a Computer security  |x Examinations  |v Study guides. 
650 0 |a Computer networks  |x Security measures  |x Examinations  |v Study guides. 
650 6 |a Sécurité informatique  |x Examens  |v Guides de l'étudiant. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |x Examens  |v Guides de l'étudiant. 
650 7 |a Computer networks  |x Security measures  |x Examinations  |2 fast 
650 7 |a Computer security  |x Examinations  |2 fast 
650 7 |a Examinations  |2 fast 
655 7 |a Study guides  |2 fast 
776 0 8 |i Print version:  |a Rogers, Bobby E.  |t CompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002)  |d New York : McGraw-Hill Education,c2021  |z 9781260462265 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781260462258/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH38229900 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6422114 
938 |a EBSCOhost  |b EBSC  |n 2702172 
994 |a 92  |b IZTAP