000 03261cam a2200409 i 4500
001 21701415
003 CSPC
005 20241011092508.0
008 200903s2021 nyua 001 0 eng
010 _a 2020945425
020 _a9781260464306
040 _aDLC
_beng
_erda
_cDLC
_dCSPC
042 _apcc
050 0 0 _aQA76.9.A25
_bM395 2021
082 0 0 _a005.8
_223
_bC366c
100 1 _aChapman, Brent,
_eauthor.
245 1 0 _aCompTIA CySA+ cybersecurity analyst certification exam guide (exam CS0-002) /
_cBrent Chapman and Fernando J. MaymĂ­.
250 _aSecond edition.
264 1 _aNew York :
_bMcGraw Hill,
_c2021.
300 _axxx, 577 pages :
_billustrations ;
_c23 cm.
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
490 0 _aAll-in-one
500 _aIncludes index.
500 _a"All-in-one is all you need. Complete coverage of all objectives for exam CS0-002. Ideal as both a study tool and an on-the-job reference. Filled with practice exam questions and in-depth explanations"--Cover.
500 _a"Save 10% on any CompTIA exam voucher! Coupon code inside. Online content includes: 200+ practice exam questions; interactive perfomance-based questions; test engine that provides full-length practice exams and customizable quizzes by chapter or exam objective"--Cover.
505 0 _aThreat and vulnerability management -- The importance of threat data and intelligence -- Threat intelligence in support of organizational security -- Vulnerability management activities -- Vulnerability assessment tools -- Threats and vulnerabilities associated with specialized technology -- Threats and vulnerabilities associated with operating in the cloud -- Mitigating controls for attacks and software vulnerabilities -- Software and systems security -- Security solutions for infrastructure management -- Software assurance best practices -- Hardware assurance best practices -- Security operations and monitoring -- Data analysis in security monitoring activities -- Implement configuration changes to existing controls to improve security -- The importance of proactive threat hunting -- Automation concepts and technologies -- Incident response -- The importance of the incident response process -- Appropriate incident response procedures -- Analyze potential indicators of compromise -- Utilize basic digital forensics techniques -- Compliance and assessment -- The importance of data privacy and protection -- Security concepts in support of organizational risk mitigation -- The importance of frameworks, policies, procedures and controls -- Appendixes and glossary -- Objective map -- About the online content.
610 2 0 _aComputing Technology Industry Association
_xExaminations
_vStudy guides.
650 0 _aComputer security
_xExaminations
_vStudy guides.
650 0 _aComputer networks
_xSecurity measures
_xExamiations
_vStudy guides.
700 1 _aMaymĂ­, Fernando,
_eauthor.
906 _a7
_bcbc
_corignew
_d2
_eepcn
_f20
_gy-gencatlg
942 _2ddc
_cBK
_h005.8
_iC366c
_kGRD
_m2021
_n0
_e23
999 _c28374
_d28374