| 000 | 03261cam a2200409 i 4500 | ||
|---|---|---|---|
| 001 | 21701415 | ||
| 003 | CSPC | ||
| 005 | 20241011092508.0 | ||
| 008 | 200903s2021 nyua 001 0 eng | ||
| 010 | _a 2020945425 | ||
| 020 | _a9781260464306 | ||
| 040 |
_aDLC _beng _erda _cDLC _dCSPC |
||
| 042 | _apcc | ||
| 050 | 0 | 0 |
_aQA76.9.A25 _bM395 2021 |
| 082 | 0 | 0 |
_a005.8 _223 _bC366c |
| 100 | 1 |
_aChapman, Brent, _eauthor. |
|
| 245 | 1 | 0 |
_aCompTIA CySA+ cybersecurity analyst certification exam guide (exam CS0-002) / _cBrent Chapman and Fernando J. MaymĂ. |
| 250 | _aSecond edition. | ||
| 264 | 1 |
_aNew York : _bMcGraw Hill, _c2021. |
|
| 300 |
_axxx, 577 pages : _billustrations ; _c23 cm. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_aunmediated _bn _2rdamedia |
||
| 338 |
_avolume _bnc _2rdacarrier |
||
| 490 | 0 | _aAll-in-one | |
| 500 | _aIncludes index. | ||
| 500 | _a"All-in-one is all you need. Complete coverage of all objectives for exam CS0-002. Ideal as both a study tool and an on-the-job reference. Filled with practice exam questions and in-depth explanations"--Cover. | ||
| 500 | _a"Save 10% on any CompTIA exam voucher! Coupon code inside. Online content includes: 200+ practice exam questions; interactive perfomance-based questions; test engine that provides full-length practice exams and customizable quizzes by chapter or exam objective"--Cover. | ||
| 505 | 0 | _aThreat and vulnerability management -- The importance of threat data and intelligence -- Threat intelligence in support of organizational security -- Vulnerability management activities -- Vulnerability assessment tools -- Threats and vulnerabilities associated with specialized technology -- Threats and vulnerabilities associated with operating in the cloud -- Mitigating controls for attacks and software vulnerabilities -- Software and systems security -- Security solutions for infrastructure management -- Software assurance best practices -- Hardware assurance best practices -- Security operations and monitoring -- Data analysis in security monitoring activities -- Implement configuration changes to existing controls to improve security -- The importance of proactive threat hunting -- Automation concepts and technologies -- Incident response -- The importance of the incident response process -- Appropriate incident response procedures -- Analyze potential indicators of compromise -- Utilize basic digital forensics techniques -- Compliance and assessment -- The importance of data privacy and protection -- Security concepts in support of organizational risk mitigation -- The importance of frameworks, policies, procedures and controls -- Appendixes and glossary -- Objective map -- About the online content. | |
| 610 | 2 | 0 |
_aComputing Technology Industry Association _xExaminations _vStudy guides. |
| 650 | 0 |
_aComputer security _xExaminations _vStudy guides. |
|
| 650 | 0 |
_aComputer networks _xSecurity measures _xExamiations _vStudy guides. |
|
| 700 | 1 |
_aMaymĂ, Fernando, _eauthor. |
|
| 906 |
_a7 _bcbc _corignew _d2 _eepcn _f20 _gy-gencatlg |
||
| 942 |
_2ddc _cBK _h005.8 _iC366c _kGRD _m2021 _n0 _e23 |
||
| 999 |
_c28374 _d28374 |
||