Preface |
|
ix | |
About The Author |
|
xiii | |
Acknowledgments |
|
xv | |
|
PART 1 EXTERNAL THREATS AND INTERNAL VULNERABILITIES |
|
|
1 | (108) |
|
Module 1 Enterprise Threats And Vulnerabilities |
|
|
3 | (24) |
|
|
5 | (1) |
|
|
5 | (1) |
|
Memory Vulnerability Attacks |
|
|
6 | (1) |
|
Web Server Application Attacks |
|
|
7 | (3) |
|
|
10 | (1) |
|
|
10 | (1) |
|
Exploitation and Penetration Tactics |
|
|
11 | (1) |
|
Social Engineering Attacks |
|
|
12 | (1) |
|
Threats and Vulnerabilities of Specialized Technology |
|
|
13 | (1) |
|
Embedded and Specialized Devices |
|
|
13 | (5) |
|
|
18 | (3) |
|
|
21 | (2) |
|
|
23 | (1) |
|
|
23 | (2) |
|
|
25 | (2) |
|
Module 2 Utilizing Threat Data And Intelligence |
|
|
27 | (26) |
|
Threat Actors and Their Threats |
|
|
28 | (1) |
|
Who Are the Threat Actors? |
|
|
29 | (3) |
|
|
32 | (2) |
|
Threat Data and Intelligence |
|
|
34 | (1) |
|
What Is Threat Data and Intelligence? |
|
|
34 | (1) |
|
|
35 | (2) |
|
Categories of Threat Intelligence Sources |
|
|
37 | (2) |
|
Sources of Threat Intelligence |
|
|
39 | (2) |
|
Frameworks and Threat Research |
|
|
41 | (1) |
|
Studying Attack Frameworks |
|
|
41 | (2) |
|
Conducting Threat Research |
|
|
43 | (1) |
|
|
44 | (1) |
|
Definition of Threat Modeling |
|
|
45 | (1) |
|
Components of a Threat Modeling Process |
|
|
45 | (1) |
|
Threat Modeling Methodologies |
|
|
45 | (3) |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
50 | (1) |
|
|
51 | (2) |
|
Module 3 Vulnerability Management |
|
|
53 | (28) |
|
|
54 | (1) |
|
Improper Software Exception and Error Handling |
|
|
55 | (1) |
|
Insecure External Software Components |
|
|
55 | (1) |
|
Insecure Internal Functions |
|
|
56 | (1) |
|
|
56 | (1) |
|
|
57 | (1) |
|
Inadequate Monitoring and Logging |
|
|
57 | (1) |
|
|
58 | (1) |
|
What Is a Vulnerability Scan? |
|
|
58 | (3) |
|
|
61 | (4) |
|
Running a Vulnerability Scan |
|
|
65 | (4) |
|
Analyzing Vulnerability Scans |
|
|
69 | (1) |
|
Addressing Vulnerabilities |
|
|
70 | (3) |
|
Advanced Vulnerability Scanning |
|
|
73 | (1) |
|
|
74 | (2) |
|
|
76 | (1) |
|
|
77 | (2) |
|
|
79 | (2) |
|
Module 4 Cloud Computing And Assessment Tools |
|
|
81 | (28) |
|
Cloud Threats and Vulnerabilities |
|
|
82 | (1) |
|
Introduction to Cloud Computing |
|
|
82 | (5) |
|
|
87 | (1) |
|
Vulnerability Diagnostic Tools |
|
|
88 | (1) |
|
|
88 | (2) |
|
|
90 | (7) |
|
|
97 | (1) |
|
|
98 | (2) |
|
|
100 | (2) |
|
|
102 | (1) |
|
|
103 | (2) |
|
|
105 | (1) |
|
|
105 | (2) |
|
|
107 | (2) |
|
PART 2 CONTROLS AND BEST PRACTICES |
|
|
109 | (50) |
|
Module 5 Infrastructure Controls |
|
|
111 | (26) |
|
Infrastructure Management Solutions and Controls |
|
|
112 | (1) |
|
|
112 | (2) |
|
|
114 | (1) |
|
|
115 | (2) |
|
Identity and Access Management (IAM) |
|
|
117 | (3) |
|
|
120 | (2) |
|
|
122 | (4) |
|
|
126 | (1) |
|
|
126 | (1) |
|
|
127 | (4) |
|
|
131 | (2) |
|
|
133 | (1) |
|
|
133 | (2) |
|
|
135 | (2) |
|
Module 6 Software And Hardware Assurance Best Practices |
|
|
137 | (22) |
|
|
138 | (1) |
|
Service-Oriented Architectures (SOAs) |
|
|
138 | (3) |
|
|
141 | (6) |
|
|
147 | (1) |
|
|
147 | (3) |
|
|
150 | (1) |
|
|
151 | (1) |
|
Other Hardware Best Practices |
|
|
152 | (2) |
|
|
154 | (2) |
|
|
156 | (1) |
|
|
157 | (1) |
|
|
158 | (1) |
|
PART 3 MONITORING AND SECURITY OPERATIONS |
|
|
159 | (50) |
|
Module 7 Security Monitoring Through Data Analysis |
|
|
161 | (26) |
|
|
162 | (1) |
|
|
163 | (1) |
|
|
164 | (7) |
|
|
171 | (4) |
|
|
175 | (1) |
|
|
176 | (2) |
|
|
178 | (4) |
|
|
182 | (2) |
|
|
184 | (1) |
|
|
184 | (2) |
|
|
186 | (1) |
|
Module 8 Security Operations |
|
|
187 | (22) |
|
Automation and Orchestration |
|
|
189 | (1) |
|
|
189 | (5) |
|
|
194 | (2) |
|
|
196 | (3) |
|
|
199 | (1) |
|
|
199 | (2) |
|
Threat Hunting Process and Tactics |
|
|
201 | (3) |
|
|
204 | (1) |
|
|
205 | (1) |
|
|
206 | (1) |
|
|
207 | (2) |
|
|
209 | (56) |
|
Module 9 Incident Response Planning And Procedures |
|
|
211 | (26) |
|
Incident Response Preparation |
|
|
213 | (1) |
|
Defining Cyber Incident Response |
|
|
213 | (1) |
|
|
214 | (4) |
|
Coordination with Stakeholders |
|
|
218 | (2) |
|
|
220 | (1) |
|
Classification of Threats |
|
|
221 | (1) |
|
Incident Response Procedures |
|
|
221 | (1) |
|
|
222 | (1) |
|
|
223 | (3) |
|
|
226 | (1) |
|
|
226 | (2) |
|
|
228 | (3) |
|
|
231 | (1) |
|
|
232 | (1) |
|
|
233 | (1) |
|
|
234 | (3) |
|
Module 10 Responding To A Cyber Incident |
|
|
237 | (28) |
|
|
238 | (1) |
|
|
239 | (8) |
|
|
247 | (4) |
|
|
251 | (1) |
|
|
252 | (1) |
|
Elements of a Forensics Kit |
|
|
252 | (3) |
|
|
255 | (2) |
|
|
257 | (1) |
|
|
257 | (3) |
|
|
260 | (2) |
|
|
262 | (1) |
|
|
262 | (2) |
|
|
264 | (1) |
|
|
265 | (46) |
|
Module 11 Risk Mitigation |
|
|
267 | (22) |
|
|
268 | (1) |
|
|
268 | (3) |
|
|
271 | (4) |
|
|
275 | (3) |
|
|
278 | (1) |
|
|
279 | (1) |
|
|
280 | (2) |
|
|
282 | (2) |
|
|
284 | (1) |
|
|
284 | (2) |
|
|
286 | (1) |
|
|
286 | (2) |
|
|
288 | (1) |
|
Module 12 Data Protection And Privacy |
|
|
289 | (22) |
|
Controls for Protecting Data |
|
|
291 | (1) |
|
|
291 | (9) |
|
|
300 | (2) |
|
|
302 | (1) |
|
|
303 | (1) |
|
|
304 | (1) |
|
|
305 | (1) |
|
|
306 | (1) |
|
|
307 | (1) |
|
|
308 | (3) |
Appendix A Preparing for the CompTIA CySA-i-CS0-002 Certification Exam |
|
311 | (14) |
Appendix B CompTIA CySA+ CS0-002 Certification Exam Objectives |
|
325 | (14) |
Appendix C Two Rights & A Wrong: Answers |
|
339 | (8) |
Index |
|
347 | |