CompTIA Cybersecurity Analyst (CSA+) Cert Guide
|
Author(s):
Author:
Troy McMillan
- ISBN:9788194282525
- 10 Digit ISBN:8194282527
-
Price:Rs. 1110.00
- Pages:592
- Imprint:Pearson Education
- Binding:Paperback
- Status:Available
-
|
One million cybersecurity jobs will open this year, and many will require strong knowledge and skills in cybersecurity analysis. CompTIA's new vendor-neutral Cybersecurity Analyst (CSA+) IT professional validates the knowledge and skills you'll need to qualify for these opportunities. CompTIA Cybersecurity Analyst+ Cert Guide is the comprehensive self-study resource for the brand-new CSA+ (CSO-001) exam.
 
Table of Content
Chapter 1 Applying Environmental Reconnaissance Techniques
Chapter 2 Analyzing the Results of Network Reconnaissance
Chapter 3 Recommending and Implementing the Appropriate Response and Countermeasure
Chapter 4 Practices Used to Secure a Corporate Environment
Chapter 5 Implementing an Information Security Vulnerability Management Process
Chapter 6 Analyzing Scan Output and Identifying Common Vulnerabilities
Chapter 7 Identifying Incident Impact and Assembling a Forensic Toolkit
Chapter 8 The Incident Response Process
Chapter 9 Incident Recovery and Post-Incident Response
Chapter 10 Frameworks, Policies, Controls, and Procedures
Chapter 11 Remediating Security Issues Related to Identity and Access Management
Chapter 12 Security Architecture and Implementing Compensating Controls
Chapter 13 Application Security Best Practices
Chapter 14 Using Cybersecurity Tools and Technologies
Chapter 15 Final Preparation
Appendix A Answers to the "Do I Know This Already?" Quizzes and Review Questions
Glossary
"
|
Salient Features
1. Complete assessment, review, and practice for CompTIA's new Cybersecurity Analyst+ exam (CSO-001)
2. Authoritative coverage of every CompTIA CSA+ exam topic, with all the context and practical examples students need to succeed
3. Logical, well-organized, and practical coverage of environmental reconnaissance, response, countermeasures, vulnerability management, forensics, security frameworks, policies, identity and access management, SDLCs, cybersecurity tools, and more
|
|
|
|
|