Fr. 126.00

CompTIA CySA+ Guide to Cybersecurity Analyst (CSO-003)

Englisch · Taschenbuch

Versand in der Regel in 3 bis 5 Wochen

Beschreibung

Mehr lesen










Gear up for course excellence and success on the latest CompTIA Cybersecurity Analyst certification exam with the advanced knowledge and essential cybersecurity skills offered in Ciampa's COMPTIA CYSA+ GUIDE TO CYBERSECURITY ANALYST, 3rd Edition. Stay ahead with updated content directly aligned to the CySA+ CSO-003 certification exam, gaining expertise in threat intelligence data analysis, internal and external vulnerability identification and mitigation and effective cyber incident response. Immerse yourself in new case projects and real-world examples that will take you on a captivating journey through actual on-the-job tasks and procedures, including hands-on experience with controls, monitoring, incident response and compliance. Further boost your understanding and performance with MindTap's interactive tools, empowering you to excel in the cybersecurity profession.

Inhaltsverzeichnis

Part 1: CYBERSECURITY FOUNDATIONS.
1. Technology Underpinnings.
a. Infrastructures and Architectures.
i. Infrastructure Concepts.
ii. Network Architectures.
iii. Operational Technology.
b. Software.
i. Operating System Fundamentals.
ii. Coding (1.3c).
2. Threat Actors and Their Threats.
a. Who Are the Threat Actors?
i. Script Kiddie.
ii. Organized Crime.
iii. Insider Threat.
iv. Hacktivists.
v. Nation-state Actors.
vi. Others.
b. Threat Actor Actions.
i. Tactics, Techniques, and Procedures (TTP).
ii. Known and Unknown Threats.
c. Types of Attacks.
i. Web Server Application Attacks.
ii. Remote Code Execution.
iii. Data Poisoning.
iv. Obfuscated Links.
d. Vulnerabilities.
i. Programming Vulnerabilities.
ii. Broken Access Control.
iii. Cryptographic Failures.
iv. Dated Components.
v. Identification and Authentication Failures.
3. Cybersecurity Substrata.
a. Identity and Access Management (IAM).
i. Identity.
ii. Access.
b. Encryption.
i. Public Key Infrastructure (PKI).
ii. Secure Sockets Layer (SSL) Inspection.
c. Secure Coding.
i. Secure Software Development Life Cycle (SDLC).
ii. Secure Coding Best Practices.
d. Networking (1.1d).
i. Zero Trust.
ii. Secure Access Service Edge (SASE).
Part 2: SECURITY OPERATIONS.
4. Identifying Indicators of Attack (IOA).
a. Cybersecurity Indicators.
i. Indicators of Attack (IOA).
ii. Indicators of Compromise (IOC) (1.4f).
b. Network IOA.
i. Abnormal Network Traffic.
ii. Stealth Transmissions.
iii. Scan/Sweeps.
iv. Rogue Devices on a Network.
c. Endpoint IOA.
i. High-Volume Consumption of Resources.
ii. Operating System Evidence.
iii. Software-Related Evidence.
iv. Data Exfiltration.
d. Application IOA.
i. Unusual Activity.
ii. New Account Creation.
iii. Unexpected Outbound Communications.
iv. Application Logs.
5. Analyzing Indicators of Compromise (IOC).
a. Common Techniques for Investigating IOC.
i. Diagnose Malware.
ii. Analyze Email.
iii. User Behavior Analysis (UBA).
b. Tools for IOC Analysis.
i. File Analysis Tools.
ii. Tools for Analyzing Network IOC
iii. Reputation Tools.
iv. Log Correlation and Analysis Tools.
6. Threat Detection and Process Improvement.
a. Threat Intelligence.
i. What is Threat Intelligence (TI)?
ii. Threat Intelligence Versus Threat Data.
iii. The Intelligence Cycle.
iv. Threat Intelligence Sources.
v. Confidence Levels.
b. Threat Hunting.
i. What is Threat Hunting?
ii. Hunters and Hunting.
iii. Threat Hunting Methodologies.
iv. Steps in Threat Hunting.
c. Improving Security Operation Processes.
i. Standardize Processes.
ii. Streamline Operations.
iii. Tool Automation and Integration.
Part 3: VULNERABILITY ASSESSMENT AND MANAGEMENT.
7. Vulnerability Scanning and Assessment Tools.
a. Industry Frameworks.
i. Payment Card Industry Data Security Standard (PCI DSS).
ii. Center for Internet Security (CIS) Benchmarks.
iii. Open Web Application Security Project (OWASP).
iv. International Organization for Standardization (ISO) 27000 Series.
b. Vulnerability Scanning Methods.
i. Asset Discovery.
ii. Special Considerations.
iii. Types of Scanning.
c. Vulnerability Assessment Tools.
i. Network Scanning and Mapping.
ii. Web Application Scanners.
iii. Vulnerability Scanners.
iv. Debuggers.
v. Multipurpose.
vi. Cloud Infrastructure Assessment Tools.
8. Addressing Vulnerabilities.
a. Prioritizing Vulnerabilities.
i. Common Vulnerability Scoring System (CVSS) Interpretation.
ii. Validation.
iii. Context Awareness.
iv. Exploitability/Weaponization.
v. Asset Value.
vi. Zero-day.
b. Managing Vulnerabilities.
i. Using Controls.
ii. Patching and Configuration Management.
iii. Maintenance Windows.
iv. Exceptions.
v. Policies, Governance, and Service-level Objectives (SLOs).
vi. Prioritization and Escalation.
vii. Attack Surface Management.
viii. Threat Modeling.
9. Vulnerability Management Reporting and Communication.
a. Reporting Vulnerabilities.
b. Compliance Reports.
c. Action Plans.
d. Inhibitors to Remediation
i. Memorandum of Understanding (MOU).
ii. Service-level Agreement (SLA).
iii

Über den Autor / die Autorin

Dr. Mark Ciampa is a professor of information systems in the Gordon Ford College of Business at Western Kentucky University in Bowling Green, Kentucky. Prior to this current role, he served as an associate professor and the director of academic computing at Volunteer State Community College in Gallatin, Tennessee, for 20 years. Dr. Ciampa has worked in the IT industry as a computer consultant for businesses, government agencies and educational institutions. He has published more than 20 articles in peer-reviewed journals and has written more than 25 technology textbooks, including CompTIA CySA+ Guide to Cybersecurity Analyst, Security+ Guide to Network Security Fundamentals, Security Awareness: Applying Practical Security in Your World, CWNA Guide to Wireless LANS, and Guide to Wireless Communications. Dr. Ciampa holds a Ph.D. in technology management with a specialization in digital communication systems from Indiana State University and has certifications in security and healthcare.

Zusammenfassung

Gear up for course excellence and success on the latest CompTIA Cybersecurity Analyst certification exam with the advanced knowledge and essential cybersecurity skills offered in Ciampa's COMPTIA CYSA+ GUIDE TO CYBERSECURITY ANALYST, 3rd Edition. Stay ahead with updated content directly aligned to the CySA+ CS0-003 certification exam, gaining expertise in threat intelligence data analysis, internal and external vulnerability identification and mitigation and effective cyber incident response. Immerse yourself in new case projects and real-world examples that will take you on a captivating journey through actual on-the-job tasks and procedures, including hands-on experience with controls, monitoring, incident response and compliance. Further boost your understanding and performance with MindTap’s interactive tools, empowering you to excel in the cybersecurity profession.

Produktdetails

Autoren Mark Ciampa
Verlag Cengage Learning
 
Sprache Englisch
Produktform Taschenbuch
Erschienen 07.07.2024
 
EAN 9798214011479
ISBN 979-8-214-01147-9
Abmessung 213 mm x 15 mm x 274 mm
Gewicht 839 g
Themen Naturwissenschaften, Medizin, Informatik, Technik > Informatik, EDV > Datenkommunikation, Netzwerke
Schule und Lernen > Schulbücher Allgemeinbildende Schulen

Business & Economics / General, Economics, finance, business & management, Economics, finance, business and management

Kundenrezensionen

Zu diesem Artikel wurden noch keine Rezensionen verfasst. Schreibe die erste Bewertung und sei anderen Benutzern bei der Kaufentscheidung behilflich.

Schreibe eine Rezension

Top oder Flop? Schreibe deine eigene Rezension.

Für Mitteilungen an CeDe.ch kannst du das Kontaktformular benutzen.

Die mit * markierten Eingabefelder müssen zwingend ausgefüllt werden.

Mit dem Absenden dieses Formulars erklärst du dich mit unseren Datenschutzbestimmungen einverstanden.