9780789756954

CompTIA Cybersecurity Analyst (CSA+) Cert Guide

  • ISBN 13:

    9780789756954

  • ISBN 10:

    0789756951

  • Edition: 1st
  • Format: Hardcover
  • Copyright: 05/12/2017
  • Publisher: Pearson IT Certification

Note: Not guaranteed to come with supplemental materials (access cards, study guides, lab manuals, CDs, etc.)

Extend Your Rental at Any Time

Need to keep your rental past your due date? At any time before your due date you can extend or purchase your rental through your account.

Sorry, this item is currently unavailable.

Summary

One million cybersecurity jobs will open this year, and many will require strong knowledge and skills in cybersecurity analysis. CompTIA's new vendor-neutral Cybersecurity Analyst (CSA+) IT professional validates the knowledge and skills you'll need to qualify for these opportunities. CompTIA Cybersecurity Analyst+ Cert Guide is the comprehensive self-study resource for the brand-new CSA+ (CSO-001) exam.

 

Designed for all CompTIA Cybersecurity Analyst (CSA+) candidates, this guide covers every exam objective concisely and logically, with extensive teaching features designed to promote retention and understanding. You'll find:

  • Pre-chapter quizzes to assess knowledge upfront and focus your study more efficiently
  • Foundation topics sections that explain concepts and configurations, and link theory to practice
  • Key topics sections calling attention to every figure, table, and list you must know
  • Exam Preparation sections with additional chapter review features
  • Final preparation chapter providing tools and a complete final study plan
  • A customizable practice test library

This guide offers comprehensive, up-to-date coverage of all CSA+ topics related to:

  • Environmental reconnaissance, response, and countermeasures
  • Securing corporate environments
  • Managing information security vulnerabilities, including detailed coverage of common vulnerabilities
  • Analyzing threat data or behavior, performing computer forensics, and responding to incidents
  • Recovering and responding to incidents
  • Using security frameworks to guide common security policies
  • Implementing identity/access management and compensating controls
  • Optimizing security throughout the Software Development Life Cycle (SDLC)
  • Choosing and applying cybersecurity tools and technologies, and more

Table of Contents

Read more

Write a Review