CompTIA Cybersecurity Analyst (CSA+) Study Guide: Exam CS0-001

  • 8h 44m
  • David Seidl, Mike Chapple
  • Sybex
  • 2017

The CompTIA Cybersecurity Analyst+ (CSA+) Study Guide provides 100% coverage of all exam objectives for the new CSA+ certification. The CSA+ certification validates a candidate's skills to configure and use threat detection tools, perform data analysis, identify vulnerabilities with a goal of securing and protecting organizations systems. Focus your review for the CSA+ with Sybex and benefit from real-world examples drawn from experts, hands-on labs, insight on how to create your own cybersecurity toolkit, and end-of-chapter review questions help you gauge your understanding each step of the way. You also gain access to the Sybex interactive learning environment that includes electronic flashcards, a searchable glossary, and hundreds of bonus practice questions.

This study guide provides the guidance and knowledge you need to demonstrate your skill set in cybersecurity. Key exam topics include:

  • Threat management
  • Vulnerability management
  • Cyber incident response
  • Security architecture and toolsets

About the Authors

Mike Chapple, PhD, CSA+, CISSP, Security+, is Senior Director for IT Service Delivery at the University of Notre Dame overseeing information security, data governance, IT architecture, project management, strategic planning and product management functions and teaches undergraduate courses on Information Security.

David Seidl, CISSP, GPEN, GCIH is the Senior Director for Campus Technology Services at Notre Dame. As Senior Director for CTS, he is responsible for central platform and operating system support, database administration and services, identity and access management, application services, and email and digital signage.

In this Book

  • Introduction
  • Defending against Cybersecurity Threats
  • Reconnaissance and Intelligence Gathering
  • Designing a Vulnerability Management Program
  • Analyzing Vulnerability Scans
  • Building an Incident Response Program
  • Analyzing Symptoms for Incident Response
  • Performing Forensic Analysis
  • Recovery and Post-Incident Response
  • Policy and Compliance
  • Defense-in-Depth Security Architectures
  • Identity and Access Management Security
  • Software Development Security
  • Cybersecurity Toolkit
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 4.6 of 22 users Rating 4.6 of 22 users (22)
Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.6 of 123 users Rating 4.6 of 123 users (123)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 200 users Rating 4.4 of 200 users (200)
Rating 4.5 of 261 users Rating 4.5 of 261 users (261)