CompTIA CySA+ Cybersecurity Analyst Certification Bundle (Exam CS0-001) (inbunden)
Fler böcker inom
Format
Inbunden (Hardback)
Språk
Engelska
Utgivningsdatum
2019-05-05
Upplaga
ed
Förlag
McGraw-Hill Education
Medarbetare
Chapman, Brent / Parker, Jeff T.
Dimensioner
231 x 188 x 38 mm
Vikt
1112 g
Antal komponenter
1
Komponenter
Contains 2 Multiple-item retail products and 1 Oth
ISBN
9781260453256

CompTIA CySA+ Cybersecurity Analyst Certification Bundle (Exam CS0-001)

Inbunden,  Engelska, 2019-05-05

Slutsåld

prepare for the challenging cysa+ certification exam with this money-saving, comprehensive study package
Designed as a complete self-study program, this collection offers a variety of proven resources to use in preparation for the CompTIA Cybersecurity Analyst (CySA+) certification exam. Comprised of comptia cysa+ cybersecurity analyst certification all-in-one exam guide (cs0-001) and comptia cysa+ cybersecurity analyst certification practice exams (exam cs0-001), this bundle thoroughly covers every topic on the exam.
comptia cysa+ cybersecurity analyst certification bundle contains more than 800 practice questions that match those on the live exam in content, difficulty, tone, and format. The set includes detailed coverage of performance-based questions. You will get exam-focused Tip, Note, and Caution elements as well as end of chapter reviews. This authoritative, cost-effective bundle serves both as a study tool AND a valuable on-the-job reference for computer security professionals. This bundle is 25% cheaper than purchasing the books individually and includes a 10% off the exam voucher Written by a team of computer security experts Electronic content includes 800+ practice exam questions and secured PDF copies of both books
Visa hela texten

Kundrecensioner

Har du läst boken? Sätt ditt betyg »

Fler böcker av Fernando Maymi

  • CISSP All-in-One Exam Guide, Ninth Edition

    Fernando Maymi

    publisher's note: products purchased from third party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. a new edition of shon harris bestselling exam prep guidefu...

Övrig information

Fernando J. Maym , Ph.D., CISSP, is a security practitioner with over 25 years of experience. He is the author of over a dozen publications and co-author of CISSP All-in-One Exam Guide, Seventh Edition. Brent Chapman, CompTIA CySA+, GCIH, GCFA, CISSP, is a recognized cyber security expert who has served as an instructor and researcher at the United States Military Academy at West Point. Jeff Parker, CompTIA CySA+, CISSP, is a certified trainer, consultant, and author who specializes in information security awareness.

Innehållsförteckning

Introduction
Part I Threat Management
Chapter 1 Applying Reconnaissance Techniques
Open Source Intelligence
Google
Internet Registries
Job Sites
Social Media
Active Reconnaissance
Scanning
Capturing Packets
Special Considerations
Wired Network Considerations
Wireless Network Considerations
Virtualization Technologies
Cloud Computing
Defending Against Reconnaissance
Tools of the Trade
nmap
Nikto
OWASP Zed Attack Proxy
Nessus
netstat
tcpdump
Wireshark/TShark
Intrusion Detection and Prevention Systems
Chapter Review
Questions
Answers
Chapter 2 Analyzing the Results of Reconnaissance
Data Sources
Firewall Logs
Intrusion Detection/Prevention Systems
Packet Captures
System Logs
nmap Scan Results
Point-in-Time Analysis
Packet Analysis
Protocol Analysis
Traffic Analysis
NetFlow Analysis
Wireless Analysis
Correlation Analysis
Anomaly Analysis
Behavioral Analysis
Trend Analysis
Availability Analysis
Heuristics
Tools of the Trade
Security Information and Event Management Systems
Packet Analyzers
Intrusion Detection Systems
Resource-Monitoring Tools
NetFlow Analyzers
Chapter Review
Questions
Answers
Chapter 3 Responding to Network-Based Threats
Network Segmentation
System Isolation
Jump Box
Honeypots and Honeynets
ACLs
File System ACLs
Network ACLs
Black Hole
DNS Sinkhole
Endpoint Security
Detect and Block
Sandbox
Cloud-Connected Protection
Group Policies
Device Hardening
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)
Compensating Controls
Blocking Unused Ports/Services
Patching
Network Access Control
Time Based
Rule Based
Role Based
Location Based
Chapter Review
Questions
Answers
Chapter 4 Securing a Corporate Network
Penetration Testing
Rules of Engagement
Reverse Engineering
Hardware
Software/Malware
Isolation/Sandboxing
Training and Exercises
Types of Exercises
Red Team
Blue Team
White Team
Risk Evaluation
Impact and Likelihood
Technical Control Review
Operational Control Review
Chapter Review
Questions
Answers
Part II Vulnerability Management
Chapter 5 Implementing Vulnerability Management Processes
Vulnerability Management Requirements
Regulatory Environments
Corporate Security Policy
Data Classification
Asset Inventory
Common Vulnerabilities
Servers
Endpoints
Network Infrastructure
Virtual Infrastructure
Mobile Devices
Interconnected Networks
Virtual Private Networks
Industrial Control Systems
SCADA Devices
Frequency of Vulnerability Scans
Risk Appetite
Regulatory Requirements
Technical Constraints
W...