Exam CS0-001
Mike Chapple, PhD, CSA+, CISSP, Security+, is Senior Director for IT Service Delivery at the University of Notre Dame overseeing information security, data governance, IT architecture, project management, strategic planning and product management functions and teaches undergraduate courses on Information Security. David Seidl, CISSP, GPEN, GCIH is the Senior Director for Campus Technology Services at Notre Dame. As Senior Director for CTS, he is responsible for central platform and operating system support, database administration and services, identity and access management, application services, and email and digital signage.
Introduction xxvii Assessment Test xxxix Chapter 1 Defending Against Cybersecurity Threats 1 Chapter 2 Reconnaissance and Intelligence Gathering 33 Chapter 3 Designing a Vulnerability Management Program 75 Chapter 4 Analyzing Vulnerability Scans 103 Chapter 5 Building an Incident Response Program 143 Chapter 6 Analyzing Symptoms for Incident Response 169 Chapter 7 Performing Forensic Analysis 207 Chapter 8 Recovery and Post-Incident Response 245 Chapter 9 Policy and Compliance 269 Chapter 10 Defense-in-Depth Security Architectures 293 Chapter 11 Identity and Access Management Security 329 Chapter 12 Software Development Security 371 Chapter 13 Cybersecurity Toolkit 401 Appendix A Answers to the Review Questions 437 Chapter 1: Defending Against Cybersecurity Threats 438 Chapter 2: Reconnaissance and Intelligence Gathering 439 Chapter 3: Designing a Vulnerability Management Program 441 Chapter 4: Analyzing Vulnerability Scans 443 Chapter 5: Building an Incident Response Program 444 Chapter 6: Analyzing Symptoms for Incident Response 446 Chapter 7: Performing Forensic Analysis 448 Chapter 8: Recovery and Post-Incident Response 449 Chapter 9: Policy and Compliance 451 Chapter 10: Defense-in-Depth Security Architectures 453 Chapter 11: Identity and Access Management Security 456 Chapter 12: Software Development Security 458 Appendix B Answers to the Lab Exercises 461 Chapter 1: Defending Against Cybersecurity Threats 462 Chapter 2: Reconnaissance and Intelligence Gathering 462 Chapter 4: Analyzing Vulnerability Scans 463 Chapter 5: Building an Incident Response Program 464 Chapter 6: Analyzing Symptoms for Incident Response 465 Chapter 7: Performing Forensic Analysis 466 Chapter 8: Recovery and Post-Incident Response 467 Chapter 9: Policy and Compliance 470 Chapter 10: Defense-in-Depth Security Architectures 471 Chapter 11: Identity and Access Management Security 472 Chapter 12: Software Development Security 473 Index 475