Download CompTIA CSA+ Study Guide - Exam CS0-001 PDF

TitleCompTIA CSA+ Study Guide - Exam CS0-001
File Size16.3 MB
Total Pages746
Table of Contents
                            Acknowledgments
About the Authors
Introduction
	What Does This Book Cover?
	Objectives Map for CompTIA Cybersecurity Analyst (CSA+) Exam CS0-001
	Objectives Map
Assessment Test
Answer to the Assessment Test
Chapter 1 Defending Against Cybersecurity Threats
	Cybersecurity Objectives
	Evaluating Security Risks
	Building a Secure Network
	Secure Endpoint Management
	Penetration Testing
	Reverse Engineering
	Summary
	Exam Essentials
	Lab Exercises
	Review Questions
Chapter 2 Reconnaissance and Intelligence Gathering
	Footprinting
	Passive Footprinting
	Gathering Organizational Intelligence
	Detecting, Preventing, and Responding to Reconnaissance
	Summary
	Exam Essentials
	Lab Exercises
	Review Questions
Chapter 3 Designing a Vulnerability Management Program
	Identifying Vulnerability Management Requirements
	Configuring and Executing Vulnerability Scans
	Developing a Remediation Workflow
	Overcoming Barriers to Vulnerability Scanning
	Summary
	Exam Essentials
	Lab Exercises
	Review Questions
Chapter 4 Analyzing Vulnerability Scans
	Reviewing and Interpreting Scan Reports
	Validating Scan Results
	Common Vulnerabilities
	Summary
	Exam Essentials
	Lab Exercises
	Review Questions
Chapter 5 Building an Incident Response Program
	Security Incidents
	Phases of Incident Response
	Building the Foundation for Incident Response
	Creating an Incident Response Team
	Coordination and Information Sharing
	Classifying Incidents
	Summary
	Exam Essentials
	Lab Exercises
	Review Questions
Chapter 6 Analyzing Symptoms for Incident Response
	Analyzing Network Events
	Handling Network Probes and Attacks
	Investigating Host Issues
	Investigating Service and Application Issues
	Summary
	Exam Essentials
	Lab Exercises
	Review Questions
Chapter 7 Performing Forensic Analysis
	Building a Forensics Capability
	Understanding Forensic Software
	Conducting a Forensic Investigation
	Forensic Investigation: An Example
	Summary
	Exam Essentials
	Lab Exercises
	Review Questions
Chapter 8 Recovery and Post-Incident Response
	Containing the Damage
	Incident Eradication and Recovery
	Wrapping Up the Response
	Summary
	Exam Essentials
	Lab Exercises
	Review Questions
Chapter 9 Policy and Compliance
	Understanding Policy Documents
	Complying with Laws and Regulations
	Adopting a Standard Framework
	Implementing Policy-Based Controls
	Security Control Verification and Quality Control
	Summary
	Exam Essentials
	Lab Exercises
	Review Questions
Chapter 10 Defense-in-Depth Security Architectures
	Understanding Defense in Depth
	Implementing Defense in Depth
	Analyzing Security Architecture
	Summary
	Exam Essentials
	Lab Exercises
	Review Questions
Chapter 11 Identity and Access Management Security
	Understanding Identity
	Threats to Identity and Access
	Identity as a Security Layer
	Understanding Federated Identity and Single Sign-On
	Review Questions
Chapter 12 Software Development Security
	Understanding the Software Development Life Cycle
	Designing and Coding for Security
	Software Security Testing
	Summary
	Exam Essentials
	Lab Exercises
	Review Questions
Chapter 13 Cybersecurity Toolkit
	Host Security Tools
	Monitoring and Analysis Tools
	Scanning and Testing Tools
	Network Security Tools
	Web Application Security Tools
	Forensics Tools
	Summary
Appendix A Answers to the Review Questions
	Chapter 1: Defending Against Cybersecurity Threats
	Chapter 2: Reconnaissance and Intelligence Gathering
	Chapter 3: Designing a Vulnerability Management Program
	Chapter 4: Analyzing Vulnerability Scans
	Chapter 5: Building an Incident Response Program
	Chapter 6: Analyzing Symptoms for Incident Response
	Chapter 7: Performing Forensic Analysis
	Chapter 8: Recovery and Post-Incident Response
	Chapter 9: Policy and Compliance
	Chapter 10: Defense-in-Depth Security Architectures
	Chapter 11: Identity and Access Management Security
	Chapter 12: Software Development Security
Appendix B Answers to the Lab Exercises
	Chapter 1: Defending Against Cybersecurity Threats
	Chapter 2: Reconnaissance and Intelligence Gathering
	Chapter 4: Analyzing Vulnerability Scans
	Chapter 5: Building an Incident Response Program
	Chapter 6: Analyzing Symptoms for Incident Response
	Chapter 7: Performing Forensic Analysis
	Chapter 8: Recovery and Post-Incident Response
	Chapter 9: Policy and Compliance
	Chapter 10: Defense-in-Depth Security Architectures
	Chapter 11: Identity and Access Management Security
	Chapter 12: Software Development Security
Index
Advert
EULA
                        

Similer Documents