Computer Networking > eBook-PDF > CompTIA CySA+ Guide to Cybersecurity Analyst (CS0-002), 2nd Edition by Mark Ciampa [Ebook] [PDF] (All)
Ebook PDF Textbook for CompTIA CySA+ Guide to Cybersecurity Analyst (CS0-002) 2e 2nd Edition by Mark Ciampa. ISBN-10: 0357678095 and ISBN-13: 9780357678091 Complete PDF Textbook with Instant Downlo ... ad - Feel Free to download Brief Contents Table of Contents Preface About the Author Acknowledgments Part 1: External Threats and Internal Vulnerabilities Module 1: Enterprise Threats and Vulnerabilities Types of Attacks Threats and Vulnerabilities of Specialized Technology Module Summary Key Terms Review Questions Case Projects Module 2: Utilizing Threat Data and Intelligence Threat Actors and Their Threats Threat Data and Intelligence Frameworks and Threat Research Threat Modeling Module Summary Key Terms Review Questions Case Projects Module 3: Vulnerability Management Common Vulnerabilities Vulnerability Scanning Module Summary Key Terms Review Questions Case Projects Module 4: Cloud Computing and Assessment Tools Cloud Threats and Vulnerabilities Vulnerability Diagnostic Tools Module Summary Key Terms Review Questions Case Projects Part 2: Controls and Best Practices Module 5: Infrastructure Controls Infrastructure Management Solutions and Controls Configuration Controls Module Summary Key Terms Review Questions Case Projects Module 6: Software and Hardware Assurance Best Practices Software Best Practices Hardware Best Practices Module Summary Key Terms Review Questions Case Projects Part 3: Monitoring and Security Operations Module 7: Security Monitoring through Data Analysis Monitoring Systems Data Analytics Module Summary Key Terms Review Questions Case Projects Module 8: Security Operations Automation and Orchestration Threat Hunting Module Summary Key Terms Review Questions Case Projects Part 4: Incident Response Module 9: Incident Response Planning and Procedures Incident Response Preparation Incident Response Procedures Module Summary Key Terms Review Questions Case Projects Module 10: Responding to a Cyber Incident Indicators of Compromise Digital Forensics Module Summary Key Terms Review Questions Case Projects Part 5: Compliance Module 11: Risk Mitigation Minimizing Risk Risk-Based Controls Module Summary Key Terms Review Questions Case Projects Module 12: Data Protection and Privacy Controls for Protecting Data Data Privacy Module Summary Key Terms Review Questions Case Projects [Show More]
Last updated: 5 months ago
Preview 10 out of 370 pages
Loading document previews ...
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Nov 03, 2022
Number of pages
370
Written in
All
This document has been written for:
Uploaded
Nov 03, 2022
Downloads
1
Views
302
Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·