Home Page Icon
Home Page
Table of Contents for
Cover
Close
Cover
by Mike Chapple, David Seidl
CompTIA CySA+ Study Guide Exam CS0-002, 2nd Edition
Cover
Acknowledgments
About the Authors
About the Technical Editor
Introduction
What Does This Book Cover?
Objectives Map for CompTIA Cybersecurity Analyst (CySA+) Exam CS0-002
Setting Up a Kali and Metasploitable Learning Environment
Assessment Test
Answers to the Assessment Test
Chapter 1: Today's Cybersecurity Analyst
Cybersecurity Objectives
Privacy vs. Security
Evaluating Security Risks
Building a Secure Network
Secure Endpoint Management
Penetration Testing
Reverse Engineering
The Future of Cybersecurity Analytics
Summary
Exam Essentials
Lab Exercises
Review Questions
Chapter 2: Using Threat Intelligence
Threat Data and Intelligence
Threat Classification
Attack Frameworks
Applying Threat Intelligence Organizationwide
Summary
Exam Essentials
Lab Exercises
Review Questions
Chapter 3: Reconnaissance and Intelligence Gathering
Mapping and Enumeration
Passive Footprinting
Gathering Organizational Intelligence
Detecting, Preventing, and Responding to Reconnaissance
Summary
Exam Essentials
Lab Exercises
Review Questions
Chapter 4: Designing a Vulnerability Management Program
Identifying Vulnerability Management Requirements
Configuring and Executing Vulnerability Scans
Developing a Remediation Workflow
Overcoming Risks of Vulnerability Scanning
Vulnerability Scanning Tools
Summary
Exam Essentials
Lab Exercises
Review Questions
Chapter 5: Analyzing Vulnerability Scans
Reviewing and Interpreting Scan Reports
Validating Scan Results
Common Vulnerabilities
Summary
Exam Essentials
Lab Exercises
Review Questions
Chapter 6: Cloud Security
Understanding Cloud Environments
Operating in the Cloud
Cloud Infrastructure Security
Summary
Exam Essentials
Lab Exercises
Review Questions
Chapter 7: Infrastructure Security and Controls
Understanding Defense-in-Depth
Improving Security by Improving Controls
Analyzing Security Architecture
Summary
Exam Essentials
Lab Exercises
Review Questions
Chapter 8: Identity and Access Management Security
Understanding Identity
Threats to Identity and Access
Identity as a Security Layer
Federation and Single Sign-On
Summary
Exam Essentials
Lab Exercises
Review Questions
Chapter 9: Software and Hardware Development Security
Software Assurance Best Practices
Designing and Coding for Security
Software Security Testing
Hardware Assurance Best Practices
Summary
Exam Essentials
Lab Exercises
Review Questions
Chapter 10: Security Operations and Monitoring
Security Monitoring
Summary
Exam Essentials
Lab Exercises
Review Questions
Chapter 11: Building an Incident Response Program
Security Incidents
Phases of Incident Response
Building the Foundation for Incident Response
Creating an Incident Response Team
Coordination and Information Sharing
Classifying Incidents
Summary
Exam Essentials
Lab Exercises
Review Questions
Chapter 12: Analyzing Indicators of Compromise
Analyzing Network Events
Investigating Host-Related Issues
Investigating Service and Application-Related Issues
Summary
Exam Essentials
Lab Exercises
Review Questions
Chapter 13: Performing Forensic Analysis and Techniques
Building a Forensics Capability
Understanding Forensic Software
Conducting Endpoint Forensics
Network Forensics
Cloud, Virtual, and Container Forensics
Conducting a Forensic Investigation
Forensic Investigation: An Example
Summary
Exam Essentials
Lab Exercises
Review Questions
Chapter 14: Containment, Eradication, and Recovery
Containing the Damage
Incident Eradication and Recovery
Wrapping Up the Response
Summary
Exam Essentials
Lab Exercises
Review Questions
Chapter 15: Risk Management
Analyzing Risk
Managing Risk
Security Controls
Summary
Exam Essentials
Lab Exercises
Review Questions
Chapter 16: Policy and Compliance
Understanding Policy Documents
Complying with Laws and Regulations
Adopting a Standard Framework
Implementing Policy-Based Controls
Security Control Verification and Quality Control
Summary
Exam Essentials
Lab Exercises
Review Questions
Appendix A: Practice Exam
Exam Questions
Appendix B: Answers to Review Questions and Practice Exam
Chapter 1: Today's Cybersecurity Analyst
Chapter 2: Using Threat Intelligence
Chapter 3: Reconnaissance and Intelligence Gathering
Chapter 4: Designing a Vulnerability Management Program
Chapter 5: Analyzing Vulnerability Scans
Chapter 6: Cloud Security
Chapter 7: Infrastructure Security and Controls
Chapter 8: Identity and Access Management Security
Chapter 9: Software and Hardware Development Security
Chapter 10: Security Operations and Monitoring
Chapter 11: Building an Incident Response Program
Chapter 12: Analyzing Indicators of Compromise
Chapter 13: Performing Forensic Analysis and Techniques
Chapter 14: Containment, Eradication, and Recovery
Chapter 15: Risk Management
Chapter 16: Policy and Compliance
Practice Exam Answers
Appendix C: Answers to Lab Exercises
Chapter 1: Today's Cybersecurity Analyst
Chapter 2: Using Threat Intelligence
Chapter 3: Reconnaissance and Intelligence Gathering
Chapter 5: Analyzing Vulnerability Scans
Chapter 7: Infrastructure Security and Controls
Chapter 8: Identity and Access Management Security
Chapter 9: Software and Hardware Development Security
Chapter 10: Security Operations and Monitoring
Chapter 11: Building an Incident Response Program
Chapter 12: Analyzing Indicators of Compromise
Chapter 13: Performing Forensic Analysis and Techniques
Chapter 14: Containment, Eradication, and Recovery
Chapter 15: Risk Management
Chapter 16: Policy and Compliance
Index
End User License Agreement
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Table of Contents
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset