Muutke küpsiste eelistusi

CompTIA CySAplus Guide to Cybersecurity Analyst (CS0-002) 2nd edition [Pehme köide]

(Western Kentucky University)
  • Formaat: Paperback / softback, 976 pages, kõrgus x laius x paksus: 15x215x274 mm, kaal: 816 g
  • Ilmumisaeg: 23-Aug-2021
  • Kirjastus: Course Technology Inc
  • ISBN-10: 0357678095
  • ISBN-13: 9780357678091
Teised raamatud teemal:
  • Pehme köide
  • Hind: 86,47 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 108,09 €
  • Säästad 20%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 976 pages, kõrgus x laius x paksus: 15x215x274 mm, kaal: 816 g
  • Ilmumisaeg: 23-Aug-2021
  • Kirjastus: Course Technology Inc
  • ISBN-10: 0357678095
  • ISBN-13: 9780357678091
Teised raamatud teemal:
Develop the advanced cybersecurity knowledge and skills for success on the latest CompTIA Cybersecurity Analyst certification exam (CySA+ CS0-002) with Ciampa's COMPTIA CYSA+ GUIDE TO CYBERSECURITY ANALYST (CS0-002), 2nd Edition. Updated, "stair-stepped" content builds on material you've previously mastered as you learn to analyze and interpret threat intelligence data, identify and address both external and internal vulnerabilities and respond effectively to cyber incidents. Each module opens with an actual, recent cybersecurity event that provides context for the information that follows. Quick review questions help test your understanding as you progress through content that completely maps to the latest CySA+ CS0-002 certification. MindTap digital resources offer additional tools to boost understanding and performance. Each module culminates with hands-on Live Virtual Machine Labs that allow you to troubleshoot, practice, explore and try different solutions in a safe, sandbox environment.
Preface ix
About The Author xiii
Acknowledgments xv
PART 1 EXTERNAL THREATS AND INTERNAL VULNERABILITIES
1(108)
Module 1 Enterprise Threats And Vulnerabilities
3(24)
Types of Attacks
5(1)
Attacks Using Malware
5(1)
Memory Vulnerability Attacks
6(1)
Web Server Application Attacks
7(3)
Session Hijacking
10(1)
Attacks on Credentials
10(1)
Exploitation and Penetration Tactics
11(1)
Social Engineering Attacks
12(1)
Threats and Vulnerabilities of Specialized Technology
13(1)
Embedded and Specialized Devices
13(5)
Mobile Device Risks
18(3)
Module Summary
21(2)
Key Terms
23(1)
Review Questions
23(2)
Case Projects
25(2)
Module 2 Utilizing Threat Data And Intelligence
27(26)
Threat Actors and Their Threats
28(1)
Who Are the Threat Actors?
29(3)
Classifying Threats
32(2)
Threat Data and Intelligence
34(1)
What Is Threat Data and Intelligence?
34(1)
The Intelligence Cycle
35(2)
Categories of Threat Intelligence Sources
37(2)
Sources of Threat Intelligence
39(2)
Frameworks and Threat Research
41(1)
Studying Attack Frameworks
41(2)
Conducting Threat Research
43(1)
Threat Modeling
44(1)
Definition of Threat Modeling
45(1)
Components of a Threat Modeling Process
45(1)
Threat Modeling Methodologies
45(3)
Module Summary
48(1)
Key Terms
49(1)
Review Questions
50(1)
Case Projects
51(2)
Module 3 Vulnerability Management
53(28)
Common Vulnerabilities
54(1)
Improper Software Exception and Error Handling
55(1)
Insecure External Software Components
55(1)
Insecure Internal Functions
56(1)
Faulty Configurations
56(1)
Broken Authentication
57(1)
Inadequate Monitoring and Logging
57(1)
Vulnerability Scanning
58(1)
What Is a Vulnerability Scan?
58(3)
Scanning Decisions
61(4)
Running a Vulnerability Scan
65(4)
Analyzing Vulnerability Scans
69(1)
Addressing Vulnerabilities
70(3)
Advanced Vulnerability Scanning
73(1)
Module Summary
74(2)
Key Terms
76(1)
Review Questions
77(2)
Case Projects
79(2)
Module 4 Cloud Computing And Assessment Tools
81(28)
Cloud Threats and Vulnerabilities
82(1)
Introduction to Cloud Computing
82(5)
Cloud Vulnerabilities
87(1)
Vulnerability Diagnostic Tools
88(1)
Software
88(2)
Infrastructure
90(7)
Web Applications
97(1)
Networks
98(2)
Wireless Networks
100(2)
Cloud Infrastructure
102(1)
Module Summary
103(2)
Key Terms
105(1)
Review Questions
105(2)
Case Projects
107(2)
PART 2 CONTROLS AND BEST PRACTICES
109(50)
Module 5 Infrastructure Controls
111(26)
Infrastructure Management Solutions and Controls
112(1)
General Concepts
112(2)
Cloud Controls
114(1)
Virtualization
115(2)
Identity and Access Management (IAM)
117(3)
Certificate Management
120(2)
Networking
122(4)
Configuration Controls
126(1)
Authorization
126(1)
Hardware
127(4)
Module Summary
131(2)
Key Terms
133(1)
Review Questions
133(2)
Case Projects
135(2)
Module 6 Software And Hardware Assurance Best Practices
137(22)
Software Best Practices
138(1)
Service-Oriented Architectures (SOAs)
138(3)
Application Development
141(6)
Hardware Best Practices
147(1)
Firmware
147(3)
Processor
150(1)
Hard Drive
151(1)
Other Hardware Best Practices
152(2)
Module Summary
154(2)
Key Terms
156(1)
Review Questions
157(1)
Case Projects
158(1)
PART 3 MONITORING AND SECURITY OPERATIONS
159(50)
Module 7 Security Monitoring Through Data Analysis
161(26)
Monitoring Systems
162(1)
Endpoint Monitoring
163(1)
Network Monitoring
164(7)
Email Analysis
171(4)
Data Analytics
175(1)
Types of Analysis
176(2)
Data Analysis
178(4)
Module Summary
182(2)
Key Terms
184(1)
Review Questions
184(2)
Case Projects
186(1)
Module 8 Security Operations
187(22)
Automation and Orchestration
189(1)
Cybersecurity Automation
189(5)
Workflow Orchestration
194(2)
Artificial Intelligence
196(3)
Threat Hunting
199(1)
What Is Threat Hunting?
199(2)
Threat Hunting Process and Tactics
201(3)
Module Summary
204(1)
Key Terms
205(1)
Review Questions
206(1)
Case Projects
207(2)
PART 4 INCIDENT RESPONSE
209(56)
Module 9 Incident Response Planning And Procedures
211(26)
Incident Response Preparation
213(1)
Defining Cyber Incident Response
213(1)
Communication
214(4)
Coordination with Stakeholders
218(2)
Criticality of Data
220(1)
Classification of Threats
221(1)
Incident Response Procedures
221(1)
Preparation
222(1)
Detection and Analysis
223(3)
Containment
226(1)
Eradication and Recovery
226(2)
Post-Incident Activities
228(3)
Module Summary
231(1)
Key Terms
232(1)
Review Questions
233(1)
Case Projects
234(3)
Module 10 Responding To A Cyber Incident
237(28)
Indicators of Compromise
238(1)
Network loCs
239(8)
Endpoint loCs
247(4)
Application loCs
251(1)
Digital Forensics
252(1)
Elements of a Forensics Kit
252(3)
Forensics Procedures
255(2)
Forensics Tools
257(1)
Specialized Forensics
257(3)
Module Summary
260(2)
Key Terms
262(1)
Review Questions
262(2)
Case Projects
264(1)
PART 5 COMPLIANCE
265(46)
Module 11 Risk Mitigation
267(22)
Minimizing Risk
268(1)
Defining Risk
268(3)
Identifying Risk
271(4)
Mitigating Risk
275(3)
Risk-Based Controls
278(1)
Classifying Controls
279(1)
Policies and Procedures
280(2)
Frameworks
282(2)
Audits and Assessments
284(1)
Module Summary
284(2)
Key Terms
286(1)
Review Questions
286(2)
Case Projects
288(1)
Module 12 Data Protection And Privacy
289(22)
Controls for Protecting Data
291(1)
Technical Controls
291(9)
Nontechnical Controls
300(2)
Data Privacy
302(1)
User Concerns
303(1)
Data Breach Consequences
304(1)
Module Summary
305(1)
Key Terms
306(1)
Review Questions
307(1)
Case Projects
308(3)
Appendix A Preparing for the CompTIA CySA-i-CS0-002 Certification Exam 311(14)
Appendix B CompTIA CySA+ CS0-002 Certification Exam Objectives 325(14)
Appendix C Two Rights & A Wrong: Answers 339(8)
Index 347
Dr. Mark Ciampa is a professor of analytics and information systems and the program director of the graduate Cybersecurity Data Analytics program in the Gordon Ford College of Business at Western Kentucky University in Bowling Green, Kentucky. Prior to this, he was an associate professor and served as Director of Academic Computing at Volunteer State Community College in Gallatin, Tennessee for 20 years. Mark has worked in the IT industry as a computer consultant for businesses, government agencies and educational institutions. He has published over 25 articles in peer-reviewed journals and books. He is also the author of over 30 technology textbooks from Cengage, including "Security+ Guide to Network Security Fundamentals," 8e, "CompTIA CySA+ Guide to Cybersecurity Analyst," 3e, "CWNA Guide to Wireless LANs," 3e, "Guide to Wireless Communications," "Security Awareness: Applying Practical Cybersecurity In Your World," 6e and "Networking BASICS." Dr. Ciampa holds a PhD in technology management with a specialization in digital communication systems from Indiana State University and has certifications in security and healthcare.