-
Book Overview & Buying
-
Table Of Contents
TOTAL - CompTIA CySA+ Cybersecurity Analyst (CS0-002)
By :
TOTAL - CompTIA CySA+ Cybersecurity Analyst (CS0-002)
By:
Overview of this book
Are you looking to get into the exciting world of hackers, cybersecurity, threat hunting, and digital forensics? Do you find the idea of gathering and analyzing intelligence to detect and combat hackers intriguing? Then this is the course for you.
This course is aimed at the aspirational junior analyst looking to step up in their career. However, if your tech skills don’t include cybersecurity, you can also gain a great deal of knowledge from this course to help launch yourself towards a career in cybersecurity.
This course covers everything you need to know in order to respond to cybersecurity threats and attacks. You will learn how to analyze data, perform network reconnaissance, and identify and address vulnerabilities to effectively respond to and recover from incidents. Implementing the suggested countermeasures detailed within this course, you will be prepared to secure your own corporate environment.
If you are looking to get certified, this course will also help prepare you for the CompTIA CySA+ Certification (CS0-002) exam. The first goal of the course is to make you an outstanding cybersecurity analyst and, in the process, make sure you are ready to pass the CompTIA exam.
All resources and code files are placed here: https://github.com/PacktPublishing/TOTAL-CompTIA-CySA-Cybersecurity-Analyst-CS0-002
Table of Contents (22 chapters)
Introduction
Chapter 1 The Importance of Threat Data and Intelligence
Chapter 2 Threat Intelligence in Support of Organizational Security
Chapter 3 Vulnerability Management Activities
Chapter 4 Vulnerability Assessment Tools
Chapter 5 Threats and Vulnerabilities Associated with Specialized Technology
Chapter 6 Threats and Vulnerabilities Associated with Operating in the Cloud
Chapter 7 Mitigating Controls for Attacks and Software Vulnerabilities
Chapter 8 Security Solutions for Infrastructure Management
Chapter 9 Software Assurance Best Practices
Chapter 10 Hardware Assurance Best Practices
Chapter 11 Data Analysis in Security Monitoring Activities
Chapter 12 Implement Configuration Changes to Existing Controls to Improve Security
Chapter 13 The Importance of Proactive Threat Hunting
Chapter 14 Compare and Contrast Automation Concepts and Technologies
Chapter 15 The Importance of the Incident Response Process
Chapter 16 Appropriate Incident Response Procedures
Chapter 17 Analyze Potential Indicators of Compromise
Chapter 18 Utilize Basic Digital Forensics Techniques
Chapter 19 The Importance of Data Privacy and Protection
Chapter 20 Security Concepts in Support of Organizational Risk Mitigation
Chapter 21 The Importance of Frameworks, Policies, Procedures, and Controls