CompTIA CSA+ Study Guide

CompTIA CSA+ Study Guide
Автор книги: id книги: 822071     Оценка: 0.0     Голосов: 0     Отзывы, комментарии: 0 3386 руб.     (33,08$) Читать книгу Купить и читать книгу Купить бумажную книгу Электронная книга Жанр: Зарубежная образовательная литература Правообладатель и/или издательство: John Wiley & Sons Limited Дата добавления в каталог КнигаЛит: ISBN: 9781119349884 Возрастное ограничение: 0+ Оглавление Отрывок из книги

Реклама. ООО «ЛитРес», ИНН: 7719571260.

Описание книги

Prepare yourself for the newest CompTIA certification The CompTIA Cybersecurity Analyst+ (CSA+) Study Guide provides 100% coverage of all exam objectives for the new CSA+ certification. The CSA+ certification validates a candidate's skills to configure and use threat detection tools, perform data analysis, identify vulnerabilities with a goal of securing and protecting organizations systems. Focus your review for the CSA+ with Sybex and benefit from real-world examples drawn from experts, hands-on labs, insight on how to create your own cybersecurity toolkit, and end-of-chapter review questions help you gauge your understanding each step of the way. You also gain access to the Sybex interactive learning environment that includes electronic flashcards, a searchable glossary, and hundreds of bonus practice questions. This study guide provides the guidance and knowledge you need to demonstrate your skill set in cybersecurity. Key exam topics include: [ul]Threat management Vulnerability management Cyber incident response Security architecture and toolsets[/ul]

Оглавление

Mike Chapple. CompTIA CSA+ Study Guide

Acknowledgments

About the Authors

Introduction

What Does This Book Cover?

Setting Up a Kali and Metasploitable Learning Environment

Setting Up Your Environment

Objectives Map for CompTIA Cybersecurity Analyst (CSA+) Exam CS0-001

Objectives Map

Assessment Test

Chapter 1. Defending Against Cybersecurity Threats

Cybersecurity Objectives

Evaluating Security Risks

Building a Secure Network

Secure Endpoint Management

Penetration Testing

Reverse Engineering

Summary

Exam Essentials

Lab Exercises

Review Questions

Chapter 2. Reconnaissance and Intelligence Gathering

Footprinting

Passive Footprinting

Gathering Organizational Intelligence

Detecting, Preventing, and Responding to Reconnaissance

Summary

Exam Essentials

Lab Exercises

Review Questions

Chapter 3. Designing a Vulnerability Management Program

Identifying Vulnerability Management Requirements

Configuring and Executing Vulnerability Scans

Developing a Remediation Workflow

Overcoming Barriers to Vulnerability Scanning

Summary

Exam Essentials

Lab Exercises

Review Questions

Chapter 4. Analyzing Vulnerability Scans

Reviewing and Interpreting Scan Reports

Validating Scan Results

Common Vulnerabilities

Summary

Exam Essentials

Lab Exercises

Review Questions

Chapter 5. Building an Incident Response Program

Security Incidents

Phases of Incident Response

Building the Foundation for Incident Response

Creating an Incident Response Team

Coordination and Information Sharing

Classifying Incidents

Summary

Exam Essentials

Lab Exercises

Review Questions

Chapter 6. Analyzing Symptoms for Incident Response

Analyzing Network Events

Handling Network Probes and Attacks

Investigating Host Issues

Investigating Service and Application Issues

Summary

Exam Essentials

Lab Exercises

Review Questions

Chapter 7. Performing Forensic Analysis

Building a Forensics Capability

Understanding Forensic Software

Conducting a Forensic Investigation

Forensic Investigation: An Example

Summary

Exam Essentials

Lab Exercises

Review Questions

Chapter 8. Recovery and Post-Incident Response

Containing the Damage

Incident Eradication and Recovery

Wrapping Up the Response

Summary

Exam Essentials

Lab Exercises

Review Questions

Chapter 9. Policy and Compliance

Understanding Policy Documents

Complying with Laws and Regulations

Adopting a Standard Framework

Implementing Policy-Based Controls

Security Control Verification and Quality Control

Summary

Exam Essentials

Lab Exercises

Review Questions

Chapter 10. Defense-in-Depth Security Architectures

Understanding Defense in Depth

Implementing Defense in Depth

Analyzing Security Architecture

Summary

Exam Essentials

Lab Exercises

Review Questions

Chapter 11. Identity and Access Management Security

Understanding Identity

Threats to Identity and Access

Identity as a Security Layer

Understanding Federated Identity and Single Sign-On

Summary

Exam Essentials

Lab Exercises

Review Questions

Chapter 12. Software Development Security

Understanding the Software Development Life Cycle

Designing and Coding for Security

Software Security Testing

Summary

Exam Essentials

Lab Exercises

Review Questions

Chapter 13. Cybersecurity Toolkit

Host Security Tools

Monitoring and Analysis Tools

Scanning and Testing Tools

Network Security Tools

Web Application Security Tools

Forensics Tools

Summary

Appendix. Answers to the Lab Exercises

Chapter 1: Defending Against Cybersecurity Threats

Chapter 2: Reconnaissance and Intelligence Gathering

Chapter 4: Analyzing Vulnerability Scans

Chapter 5: Building an Incident Response Program

Chapter 6: Analyzing Symptoms for Incident Response

Chapter 7: Performing Forensic Analysis

Chapter 8: Recovery and Post-Incident Response

Chapter 9: Policy and Compliance

Chapter 10: Defense-in-Depth Security Architectures

Chapter 11: Identity and Access Management Security

Chapter 12: Software Development Security

Index

Отрывок из книги

Books like this involve work from many people, and as authors, we truly appreciate the hard work and dedication that the team at Wiley shows. We would especially like to thank senior acquisitions editor Kenyon Brown. We have worked with Ken on multiple projects and consistently enjoy our work with him.

We also greatly appreciated the editing and production team for the book, including David Clark, our developmental editor, who brought years of experience and great talent to the project, Robin Abernathy, our technical editor, who provided insightful advice and gave wonderful feedback throughout the book, and Becca Anderson, our production editor, who guided us through layouts, formatting, and final cleanup to produce a great book. We would also like to thank the many behind-the-scenes contributors, including the graphics, production, and technical teams who make the book and companion materials into a finished product.

.....

If you are more familiar with another virtualization tool such as VMware or HyperV, you can also use those tools; however, you may have to adapt or modify these instructions to handle differences in how your preferred virtualization environment works.

Multiple versions of Kali Linux are available at https://www.kali.org/downloads/, and pre‐built Kali Linux virtual machines can be downloaded at https://www.offensive‐security.com/kali‐linux‐vmware‐virtualbox‐image‐download/. We suggest downloading the most recent version of the Kali Linux 64‐bit VBox virtual machine.

.....

Добавление нового отзыва

Комментарий Поле, отмеченное звёздочкой  — обязательно к заполнению

Отзывы и комментарии читателей

Нет рецензий. Будьте первым, кто напишет рецензию на книгу CompTIA CSA+ Study Guide
Подняться наверх