Book description
Focused coverage of every topic on the current version of the CompTIA CySA+ exam
Get on the fast track to becoming CompTIA CySA+ certified with this affordable, portable study tool. Inside, cybersecurity professional Bobby Rogers guides you on your career path, providing expert tips and sound advice along the way. With an intensive focus only on what you need to know to pass CompTIA CySA+ Exam CS0-002, this certification passport is your ticket to success on exam day.
Designed for focus on key topics and exam success:
- List of official exam objectives covered by domain
- Exam Tip element offers expert pointers for success on the test
- Key Term highlights specific term or acronym definitions key to passing the exam
- Caution notes common pitfalls and real-world issues as well as warnings about the exam
- Tables, bulleted lists, and figures throughout focus on quick reference and review
- Cross-References point to an essential, related concept covered elsewhere in the book
- Practice questions and content review after each objective section prepare you for exam mastery
Covers all exam topics, including:
- Threat and vulnerability management
- Threat data and intelligence
- Vulnerability management, assessment tools, and mitigation
- Software and systems security
- Solutions for infrastructure management
- Software and hardware assurance best practices
- Security operations and monitoring
- Proactive threat hunting
- Automation concepts and technologies
- Incident response process, procedure, and analysis
- Compliance and assessment
- Data privacy and protection
- Support of organizational risk mitigation
Online content includes:
- Customizable practice exam test engine for CS0-002
- 200+ realistic multiple-choice and performance-based practice questions and in-depth explanations
Table of contents
- Cover
- Title Page
- Copyright Page
- Dedication
- Contents
- Acknowledgments
- Introduction
-
1.0 Threat and Vulnerability Management
- Objective 1.1 Explain the importance of threat data and intelligence
- Intelligence Sources
- Confidence Levels
- Indicator Management
- Threat Classification
- Threat Actors
- Intelligence Cycle
- Commodity Malware
- Information Sharing and Analysis Communities
- REVIEW
- Objective 1.2 Given a scenario, utilize threat intelligence to support organizational security
- Attack Frameworks
- Threat Research
- Threat Modeling Methodologies
- Threat Intelligence Sharing with Supported Functions
- REVIEW
- Objective 1.3 Given a scenario, perform vulnerability management activities
- Vulnerability Identification
- Validation
- Remediation/Mitigation
- Scanning Parameters and Criteria
- Inhibitors to Remediation
- REVIEW
- Objective 1.4 Given a scenario, analyze the output from common vulnerability assessment tools
- Vulnerability Assessment Tools
- Application Tools
- Infrastructure Tools
- REVIEW
- Objective 1.5 Explain the threats and vulnerabilities associated with specialized technology
- Mobile Devices
- Internet of Things (IoT)
- Industrial Control Systems
- REVIEW
- Objective 1.6 Explain the threats and vulnerabilities associated with operating in the cloud
- Cloud Service Models
- Cloud Deployment Models
- Cloud Vulnerabilities
- REVIEW
- Objective 1.7 Given a scenario, implement controls to mitigate attacks and software vulnerabilities
- Vulnerabilities
- Attack Types
- REVIEW
-
2.0 Software and Systems Security
- Objective 2.1 Given a scenario, apply security solutions for infrastructure management
- Infrastructure Management
- Identity and Access Management
- REVIEW
- Objective 2.2 Explain software assurance best practices
- Platforms
- Service-Oriented Architecture
- Software Development Lifecycle (SDLC) Integration
- DevSecOps
- Secure Coding Best Practices
- Software Assessment Methods
- REVIEW
- Objective 2.3 Explain hardware assurance best practices
- Hardware Root of Trust
- eFuse
- Unified Extensible Firmware Interface (UEFI)
- Trusted Foundry
- Secure Processing
- Bus Encryption
- Anti-Tamper
- Self-Encrypting Drive (SED)
- Trusted Firmware Updates
- Measured Boot and Attestation
- REVIEW
-
3.0 Security Operations and Monitoring
- Objective 3.1 Given a scenario, analyze data as part of security monitoring activities
- Heuristics
- Trend Analysis
- Endpoint Data
- Network
- Log Review
- Impact Analysis
- Security Information and Event Management (SIEM) Review
- E-mail Analysis
- REVIEW
- Objective 3.2 Given a scenario, implement configuration changes to existing controls to improve security
- Review of Control Concepts
- Permissions
- Access Control Lists
- Firewalls
- Intrusion Prevention System (IPS) Rules
- Data Loss Prevention (DLP)
- Endpoint Detection and Response (EDR)
- Network Access Control (NAC)
- Sinkholing
- Malware Signatures
- Sandboxing
- Port Security
- REVIEW
- Objective 3.3 Explain the importance of proactive threat hunting
- Establishing a Hypothesis
- Profiling Threat Actors and Activities
- Threat Hunting Tactics
- Reducing the Attack Surface Area
- Bundling Critical Assets
- Attack Vectors
- Integrated Intelligence
- Improving Detection Capabilities
- REVIEW
- Objective 3.4 Compare and contrast automation concepts and technologies
- Automation Concepts
-
Workflow Orchestration
- Security Orchestration, Automation, and Response (SOAR)
- Scripting
- Application Programming Interface (API) Integration
- Automated Malware Signature Creation
- Data Enrichment
- Threat Feed Combination
- Machine Learning
- Use of Automation Protocols and Standards
- Automating Software Integration, Delivery, and Deployment
- REVIEW
-
4.0 Incident Response
- Objective 4.1 Explain the importance of the incident response process
- Critical Incident Response Processes
- REVIEW
- Objective 4.2 Given a scenario, apply the appropriate incident response procedure
- Incident Response Procedures
- REVIEW
- Objective 4.3 Given an incident, analyze potential indicators of compromise
- Analyzing Indicators of Compromise
- REVIEW
- Objective 4.4 Given a scenario, utilize basic digital forensics techniques
- Forensics Considerations
- REVIEW
-
5.0 Compliance and Assessment
- Objective 5.1 Understand the importance of data privacy and protection
- REVIEW
- Objective 5.2 Given a scenario, apply security concepts in support of organizational risk mitigation
- Organizational Risk Mitigation
- REVIEW
- Objective 5.3 Explain the importance of frameworks, policies, procedures, and controls
- Organizational Governance Flow
- REVIEW
- A About the Online Content
- Glossary
- Index
Product information
- Title: CompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002)
- Author(s):
- Release date: January 2021
- Publisher(s): McGraw-Hill
- ISBN: 9781260462258
You might also like
book
CompTIA Cybersecurity Analyst (CySA+) Cert Guide
Learn, prepare, and practice for CompTIA Cybersecurity Analyst (CSA+) exam success with this CompTIA Approved Cert …
book
CompTIA CySA+ Cybersecurity Analyst Certification Practice Exams (Exam CS0-002), 2nd Edition
Don’t Let the Real Test Be Your First Test! Prepare to pass the CySA+ Cybersecurity Analyst …
book
CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide, 2nd Edition
Learn, prepare, and practice for CompTIA Cybersecurity Analyst (CySA+) CS0-002 exam success with this Cert Guide …
book
CompTIA Advanced Security Practitioner (CASP+) CAS-004 Cert Guide
CompTIA Advanced Security Practitioner (CASP+) CAS-004 Cert Guide presents you with an organized test preparation routine …