COMPTIA CYSA+ CYBERSECURITY ANALYST CERTIFICATION PRACTICE EXAMS (EXAM CS0-002)

Book Cover
Average Rating
Published
NEW YORK : MCGRAW-HILL EDUCATION, 2021.
Status
Available Online

Description

Loading Description...

More Details

Format
Language
English
ISBN
1260473643, 9781260473643

Notes

Local note
O'Reilly,O'Reilly Online Learning: Academic/Public Library Edition

Also in this Series

Checking series information...

More Like This

Loading more titles like this title...

Reviews from GoodReads

Loading GoodReads Reviews.

Citations

APA Citation, 7th Edition (style guide)

Sparks, K. (2021). COMPTIA CYSA+ CYBERSECURITY ANALYST CERTIFICATION PRACTICE EXAMS (EXAM CS0-002) . MCGRAW-HILL EDUCATION.

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

Sparks, Kelly. 2021. COMPTIA CYSA+ CYBERSECURITY ANALYST CERTIFICATION PRACTICE EXAMS (EXAM CS0-002). MCGRAW-HILL EDUCATION.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Sparks, Kelly. COMPTIA CYSA+ CYBERSECURITY ANALYST CERTIFICATION PRACTICE EXAMS (EXAM CS0-002) MCGRAW-HILL EDUCATION, 2021.

MLA Citation, 9th Edition (style guide)

Sparks, Kelly. COMPTIA CYSA+ CYBERSECURITY ANALYST CERTIFICATION PRACTICE EXAMS (EXAM CS0-002) MCGRAW-HILL EDUCATION, 2021.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.

Staff View

Grouped Work ID
7ac2ea2f-b653-4836-a39c-5417ba59b7c3-eng
Go To Grouped Work View in Staff Client

Grouping Information

Grouped Work ID7ac2ea2f-b653-4836-a39c-5417ba59b7c3-eng
Full titlecomptia cysa cybersecurity analyst certification practice exams exam cs0 002
Authorsparks kelly
Grouping Categorybook
Last Update2024-03-29 07:51:22AM
Last Indexed2024-05-16 02:26:10AM

Book Cover Information

Image SourcecontentCafe
First LoadedAug 8, 2023
Last UsedAug 8, 2023

Marc Record

First DetectedMar 21, 2023 11:04:52 AM
Last File Modification TimeMar 21, 2023 11:04:52 AM
SuppressedRecord had no items

MARC Record

LEADER03474cam a2200397M 4500
001on1224161603
003OCoLC
00520230321110405.0
006m        d        
007cr |||||||||||
008201125s2021    nyu     o     ||| 0 eng d
020 |a 1260473643|q (electronic bk.)
020 |a 9781260473643|q (electronic bk.)
035 |a (OCoLC)1224161603
040 |a YDX|b eng|c YDX|d N$T|d OCLCO|d OCLCF|d CNWPU|d OCLCO|d OCLCQ
049 |a MAIN
050 4|a QA76.9.A25
08204|a 005.8|2 23
1001 |a Sparks, Kelly.
24510|a COMPTIA CYSA+ CYBERSECURITY ANALYST CERTIFICATION PRACTICE EXAMS (EXAM CS0-002)|h [electronic resource].
260 |a NEW YORK :|b MCGRAW-HILL EDUCATION,|c 2021.
300 |a 1 online resource
5050 |a Cover --|t About the Author --|t Title Page --|t Copyright Page --|t Dedication --|t Contents at a Glance --|t Contents --|t Acknowledgments --|t Introduction --|t Part I Threat and Vulnerability Management --|t Chapter 1 The Importance of Threat Data and Intelligence --|t Chapter 2 Threat Intelligence in Support of Organizational Security --|t Chapter 3 Vulnerability Management Activities --|t Chapter 4 Vulnerability Assessment Tools --|t Chapter 5 Threats and Vulnerabilities Associated with Specialized Technology --|t Chapter 6 Threats and Vulnerabilities Associated with Operating in the Cloud --|t Chapter 7 Mitigating Controls for Attacks and Software Vulnerabilities --|t Part II Software and Systems Security --|t Chapter 8 Security Solutions for Infrastructure Management --|t Chapter 9 Software Assurance Best Practices --|t Chapter 10 Hardware Assurance Best Practices --|t Part III Security Operations and Monitoring --|t Chapter 11 Data Analysis in Security Monitoring Activities --|t Chapter 12 Implement Configuration Changes to Existing Controls to Improve Security --|t Chapter 13 The Importance of Proactive Threat Hunting --|t Chapter 14 Automation Concepts and Technologies --|t Part IV Incident Response --|t Chapter 15 The Importance of the Incident Response Process --|t Chapter 16 Appropriate Incident Response Procedures --|t Chapter 17 Analyze Potential Indicators of Compromise --|t Chapter 18 Utilize Basic Digital Forensics Techniques --|t Part V Compliance and Assessment --|t Chapter 19 The Importance of Data Privacy and Protection --|t Chapter 20 Security Concepts in Support of Organizational Risk Mitigation --|t Chapter 21 The Importance of Frameworks, Policies, Procedures, and Controls --|t Part VI Appendixes --|t Appendix A Objective Map --|t Appendix B About the Online Content.
5880 |a Online resource; title from PDF title page (EBSCO, viewed January 29, 2021).
590 |a O'Reilly|b O'Reilly Online Learning: Academic/Public Library Edition
61020|a Computing Technology Industry Association|x Examinations|v Study guides.
61027|a Computing Technology Industry Association.|2 fast|0 (OCoLC)fst00707499|9 18342
650 0|a Computer security|x Examinations|v Study guides.|9 93486
650 0|a Electronic data processing personnel|x Certification.|9 80403
650 0|a Computer networks|x Security measures|x Examinations|v Study guides.|9 93485
655 7|a Study guides.|2 fast|0 (OCoLC)fst01423888|9 404668
85640|u https://library.access.arlingtonva.us/login?url=https://learning.oreilly.com/library/view/~/9781260473643/?ar|x O'Reilly|z eBook
938 |a YBP Library Services|b YANK|n 17129378
938 |a EBSCOhost|b EBSC|n 2688524
994 |a 92|b VIA
999 |c 284606|d 284606