Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Table of Contents Acknowledgments About the Authors About the Technical Editor Introduction
What Does This Book Cover? Objectives Map for CompTIA Cybersecurity Analyst (CySA+) Exam CS0-002 Setting Up a Kali and Metasploitable Learning Environment Assessment Test Answers to the Assessment Test
Chapter 1: Today's Cybersecurity Analyst
Cybersecurity Objectives Privacy vs. Security Evaluating Security Risks Building a Secure Network Secure Endpoint Management Penetration Testing Reverse Engineering The Future of Cybersecurity Analytics Summary Exam Essentials Lab Exercises Review Questions
Chapter 2: Using Threat Intelligence
Threat Data and Intelligence Threat Classification Attack Frameworks Applying Threat Intelligence Organizationwide Summary Exam Essentials Lab Exercises Review Questions
Chapter 3: Reconnaissance and Intelligence Gathering
Mapping and Enumeration Passive Footprinting Gathering Organizational Intelligence Detecting, Preventing, and Responding to Reconnaissance Summary Exam Essentials Lab Exercises Review Questions
Chapter 4: Designing a Vulnerability Management Program
Identifying Vulnerability Management Requirements Configuring and Executing Vulnerability Scans Developing a Remediation Workflow Overcoming Risks of Vulnerability Scanning Vulnerability Scanning Tools Summary Exam Essentials Lab Exercises Review Questions
Chapter 5: Analyzing Vulnerability Scans
Reviewing and Interpreting Scan Reports Validating Scan Results Common Vulnerabilities Summary Exam Essentials Lab Exercises Review Questions
Chapter 6: Cloud Security
Understanding Cloud Environments Operating in the Cloud Cloud Infrastructure Security Summary Exam Essentials Lab Exercises Review Questions
Chapter 7: Infrastructure Security and Controls
Understanding Defense-in-Depth Improving Security by Improving Controls Analyzing Security Architecture Summary Exam Essentials Lab Exercises Review Questions
Chapter 8: Identity and Access Management Security
Understanding Identity Threats to Identity and Access Identity as a Security Layer Federation and Single Sign-On Summary Exam Essentials Lab Exercises Review Questions
Chapter 9: Software and Hardware Development Security
Software Assurance Best Practices Designing and Coding for Security Software Security Testing Hardware Assurance Best Practices Summary Exam Essentials Lab Exercises Review Questions
Chapter 10: Security Operations and Monitoring
Security Monitoring Summary Exam Essentials Lab Exercises Review Questions
Chapter 11: Building an Incident Response Program
Security Incidents Phases of Incident Response Building the Foundation for Incident Response Creating an Incident Response Team Coordination and Information Sharing Classifying Incidents Summary Exam Essentials Lab Exercises Review Questions
Chapter 12: Analyzing Indicators of Compromise
Analyzing Network Events Investigating Host-Related Issues Investigating Service and Application-Related Issues Summary Exam Essentials Lab Exercises Review Questions
Chapter 13: Performing Forensic Analysis and Techniques
Building a Forensics Capability Understanding Forensic Software Conducting Endpoint Forensics Network Forensics Cloud, Virtual, and Container Forensics Conducting a Forensic Investigation Forensic Investigation: An Example Summary Exam Essentials Lab Exercises Review Questions
Chapter 14: Containment, Eradication, and Recovery
Containing the Damage Incident Eradication and Recovery Wrapping Up the Response Summary Exam Essentials Lab Exercises Review Questions
Chapter 15: Risk Management
Analyzing Risk Managing Risk Security Controls Summary Exam Essentials Lab Exercises Review Questions
Chapter 16: Policy and Compliance
Understanding Policy Documents Complying with Laws and Regulations Adopting a Standard Framework Implementing Policy-Based Controls Security Control Verification and Quality Control Summary Exam Essentials Lab Exercises Review Questions
Appendix A: Practice Exam
Exam Questions
Appendix B: Answers to Review Questions and Practice Exam
Chapter 1: Today's Cybersecurity Analyst Chapter 2: Using Threat Intelligence Chapter 3: Reconnaissance and Intelligence Gathering Chapter 4: Designing a Vulnerability Management Program Chapter 5: Analyzing Vulnerability Scans Chapter 6: Cloud Security Chapter 7: Infrastructure Security and Controls Chapter 8: Identity and Access Management Security Chapter 9: Software and Hardware Development Security Chapter 10: Security Operations and Monitoring Chapter 11: Building an Incident Response Program Chapter 12: Analyzing Indicators of Compromise Chapter 13: Performing Forensic Analysis and Techniques Chapter 14: Containment, Eradication, and Recovery Chapter 15: Risk Management Chapter 16: Policy and Compliance Practice Exam Answers
Appendix C: Answers to Lab Exercises
Chapter 1: Today's Cybersecurity Analyst Chapter 2: Using Threat Intelligence Chapter 3: Reconnaissance and Intelligence Gathering Chapter 5: Analyzing Vulnerability Scans Chapter 7: Infrastructure Security and Controls Chapter 8: Identity and Access Management Security Chapter 9: Software and Hardware Development Security Chapter 10: Security Operations and Monitoring Chapter 11: Building an Incident Response Program Chapter 12: Analyzing Indicators of Compromise Chapter 13: Performing Forensic Analysis and Techniques Chapter 14: Containment, Eradication, and Recovery Chapter 15: Risk Management Chapter 16: Policy and Compliance
Index End User License Agreement
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion