
CompTIA Cybersecurity Analyst (CSA+) Cert Guide
Troy mcmillan (author)
Résumé
- 1. Environmental Reconnaissance Techniques
- 2. Response and Countermeasures
- 3. Securing a Corporate Environment
- 4. The Information Security Vulnerability Management Process
- 5. Common Vulnerabilities
- 6. Analyzing Threat Data or Behavior
- 7. Computer Forensics
- 8. Incident Response
- 9. The Incident Recovery and Post-incident Response Process
- 10. Using Security Frameworks to Guide Common Policies
- 11. Identity and Access Management
- 12. Implementing Compensating Controls
- 13. The Software Development Life Cycle (SDLC)
- 14. Cybersecurity Tools and Technologies
One million cybersecurity jobs will open this year, and many will require strong knowledge and skills in cybersecurity analysis. CompTIA's new vendor-neutral Cybersecurity Analyst (CSA+) IT professional validates the knowledge and skills you'll need to qualify for these opportunities. CompTIA Cybersecurity Analyst+ Cert Guide is the comprehensive self-study resource for the brand-new CSA+ (CSO-001) exam.
Designed for all CompTIA Cybersecurity Analyst (CSA+) candidates, this guide covers every exam objective concisely and logically, with extensive teaching features designed to promote retention and understanding. You'll find:
-
Pre-chapter quizzes to assess knowledge upfront and focus your study more efficiently
-
Foundation topics sections that explain concepts and configurations, and link theory to practice
-
Key topics sections calling attention to every figure, table, and list you must know
-
Exam Preparation sections with additional chapter review features
-
Final preparation chapter providing tools and a complete final study plan
-
A customisable practice test library
This guide offers comprehensive, up-to-date coverage of all CSA+ topics related to:
-
Environmental reconnaissance, response, and countermeasures
-
Securing corporate environments
-
Managing information security vulnerabilities, including detailed coverage of common vulnerabilities
-
Analysing threat data or behavior, performing computer forensics, and responding to incidents
-
Recovering and responding to incidents
-
Using security frameworks to guide common security policies
-
Implementing identity/access management and compensating controls
-
Optimising security throughout the Software Development Life Cycle (SDLC)
-
Choosing and applying cybersecurity tools and technologies, and more
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Que-wajskop (bruno) |
Auteur(s) | Troy mcmillan (author) |
Parution | 31/05/2017 |
Nb. de pages | 592 |
Format | 243 x 204 |
Poids | 1164g |
EAN13 | 9780789756954 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse