IMPORTANT COVID-19 UPDATES

9780136747161

CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide

by
  • ISBN13:

    9780136747161

  • ISBN10:

    0136747167

  • Edition: 2nd
  • Format: Hardcover
  • Copyright: 2020-10-13
  • Publisher: Pearson IT Certification

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $59.99 Save up to $21.00
  • Rent Book $38.99
    Add to Cart Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 2-3 BUSINESS DAYS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

Supplemental Materials

What is included with this book?

Summary

CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide is a best-of-breed exam study guide. Expert technology instructor and certification author Troy McMillan shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.

The book presents you with an organized test-preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your final study plan.

The companion website contains the powerful Pearson Test Prep practice test software, complete with hundreds of exam-realistic questions. The assessment engine offers you a wealth of customization options and reporting features, laying out a complete assessment of your knowledge to help you focus your study where it is needed most.

Well regarded for its level of detail, assessment features, and challenging review questions and exercises, this CompTIA approved study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time.


Author Biography

Troy McMillan develops Cisco, VMWare, and cyber-security practice tests for CyberVista (formerly Kaplan IT Training and Transcender). He also teaches live online CISSP and Security+ classes for CyberVista, an official ISC(2) online training provider. He has taught live and remote Cisco, Microsoft, CompTIA, and wireless classes for the past fourteen years.

Troy is the author of CCNA Security Study Guide 2nd Edition (Sybex), CompTIA Server+ Study Guide 1st Edition (Sybex), CompTIA A+ Complete Review Guide 3rd Edition (Sybex), and Cisco Networking Essentials (Sybex). He is the co-author (with Robin Abernathy) of CompTIA Advanced Security Practitioner (CASP) CAS-002 Cert Guide, 1st Edition (Pearson IT Certification) and CISSP Cert Guide, 1st Edition (Pearson IT Certification). Troy also records instructional videos for Quickert on topics pertaining to the CCNA, CCNP, A+, and Network+ certifications.

Before beginning his IT career, Troy was a professional set musician, sharing the stage with diverse acts from Vassar Clements to the Grateful Dead. He still plays bass and records music with his band. He lives with his wife and their many dogs in North Carolina. For fun, he runs marathons and follows Nascar (on television, not on foot).

Table of Contents

Chapter 1 Threat Data and Intelligence
Chapter 2 Utilizing Threat Intelligence
Chapter 3 Vulnerability Management Activities
Chapter 4 Analyzing Assessment Output
Chapter 5 Vulnerabilities Associated with Specialized Technology
Chapter 6 Cloud Vulnerabilities
Chapter 7 Implementing Controls
Chapter 8 Secure Infrastructure Management
Chapter 9 Software Best Practices
Chapter 10 Hardware Best Practices
Chapter 11 Analyzing Data as Part of Security Monitoring Activities
Chapter 12 Implementing Controls to Improve Security
Chapter 13 Proactive Threat Hunting
Chapter 14 Automation Technologies
Chapter 15 The Incident Response Process
Chapter 16 Applying the Appropriate Incident Response Procedure
Chapter 17 Analyzing Indicators of Compromise
Chapter 18 Digital Forensics Techniques
Chapter 19 Data Privacy and Protection
Chapter 20  Supporting Risk Mitigation
Chapter 21 The Importance of Frameworks, Policies, Procedures and Controls

Rewards Program

Write a Review