CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (Exam CS0-001) by Fernando MaymiCompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (Exam CS0-001) by Fernando Maymi

CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (Exam CS0-001)

byFernando Maymi, Brent Chapman

Book & Toy | August 23, 2017

Pricing and Purchase Info

$47.45 online 
$76.95 list price save 38%
Earn 237 plum® points

Prices and offers may vary in store


In stock online

Ships free on orders over $25

Not available in stores


"This highly effective self-study system provides complete coverage of every objective for the challenging CompTIA CSA+ Cybersecurity Analyst exam. You'll find learning objectives at the beginning of each chapter, exam tips, in-depth explanations, and practice exam questions. All questions closely mirror those on the live test in content, format, and tone. Designed to help you pass exam CS0-001 with ease, this definitive guide also serves as an essential on-the-job reference. Covers every topic on the exam, including: - Threat and vulnerability management - Conducting and analyzing reconnaissance - Responding to network-based threats - Securing a cooperate network - Cyber incident response - Determining the impact of incidents - Preparing the incident response toolkit - Security architectures - Policies, procedures, and controls - Assuring identity and access management - Putting in compensating controls - Secure software development"--
Title:CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (Exam CS0-001)Format:Book & ToyDimensions:9.1 × 7.5 × 0.91 inPublished:August 23, 2017Publisher:McGraw-Hill EducationLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:126001181X

ISBN - 13:9781260011814

Look for similar items by category:


Table of Contents

Part I: Threat Management
Chapter 1: Applying Reconnaissance Techniques
Chapter 2: Analyzing the Results of Reconnaissance
Chapter 3: Responding to Network-Based Threats
Chapter 4: Securing a Cooperate Network

Part II: Vulnerability Management
Chapter 5: Implementing Vulnerability Management Processes
Chapter 6: Vulnerability Scanning

Part III: Cyber Incident Response
Chapter 7: The Incident Response Process
Chapter 8: Determining the Impact of Incidents
Chapter 9: Preparing the Incident Response Toolkit
Chapter 10: Selecting the Best Course of Action

Part IV: Security Architectures
Chapter 11: Frameworks, Policies, Controls, and Procedures
Chapter 12: Identity and Access Management
Chapter 13: Putting in Compensating Controls
Chapter 14: Secure Software Development
Chapter 15: Tool Sets

Part V: Appendices
Appendix A: Exam Objective Map
Appendix B: About the CD