COMPTIA CYSA+ CYBERSECURITY ANALYST CERTIFICATION PRACTICE EXAMS (EXAM CS0-002)
Description
Loading Description...
More Details
Format
Language
English
ISBN
1260473643, 9781260473643
Notes
Local note
O'Reilly,O'Reilly Online Learning: Academic/Public Library Edition
Also in this Series
Checking series information...
Reviews from GoodReads
Loading GoodReads Reviews.
Citations
APA Citation, 7th Edition (style guide)
Sparks, K. (2021). COMPTIA CYSA+ CYBERSECURITY ANALYST CERTIFICATION PRACTICE EXAMS (EXAM CS0-002) . MCGRAW-HILL EDUCATION.
Chicago / Turabian - Author Date Citation, 17th Edition (style guide)Sparks, Kelly. 2021. COMPTIA CYSA+ CYBERSECURITY ANALYST CERTIFICATION PRACTICE EXAMS (EXAM CS0-002). MCGRAW-HILL EDUCATION.
Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)Sparks, Kelly. COMPTIA CYSA+ CYBERSECURITY ANALYST CERTIFICATION PRACTICE EXAMS (EXAM CS0-002) MCGRAW-HILL EDUCATION, 2021.
MLA Citation, 9th Edition (style guide)Sparks, Kelly. COMPTIA CYSA+ CYBERSECURITY ANALYST CERTIFICATION PRACTICE EXAMS (EXAM CS0-002) MCGRAW-HILL EDUCATION, 2021.
Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.
Staff View
Grouped Work ID
7ac2ea2f-b653-4836-a39c-5417ba59b7c3-eng
Grouping Information
Grouped Work ID | 7ac2ea2f-b653-4836-a39c-5417ba59b7c3-eng |
---|---|
Full title | comptia cysa cybersecurity analyst certification practice exams exam cs0 002 |
Author | sparks kelly |
Grouping Category | book |
Last Update | 2024-03-29 07:51:22AM |
Last Indexed | 2024-05-16 02:26:10AM |
Book Cover Information
Image Source | contentCafe |
---|---|
First Loaded | Aug 8, 2023 |
Last Used | Aug 8, 2023 |
Marc Record
First Detected | Mar 21, 2023 11:04:52 AM |
---|---|
Last File Modification Time | Mar 21, 2023 11:04:52 AM |
Suppressed | Record had no items |
MARC Record
LEADER | 03474cam a2200397M 4500 | ||
---|---|---|---|
001 | on1224161603 | ||
003 | OCoLC | ||
005 | 20230321110405.0 | ||
006 | m d | ||
007 | cr ||||||||||| | ||
008 | 201125s2021 nyu o ||| 0 eng d | ||
020 | |a 1260473643|q (electronic bk.) | ||
020 | |a 9781260473643|q (electronic bk.) | ||
035 | |a (OCoLC)1224161603 | ||
040 | |a YDX|b eng|c YDX|d N$T|d OCLCO|d OCLCF|d CNWPU|d OCLCO|d OCLCQ | ||
049 | |a MAIN | ||
050 | 4 | |a QA76.9.A25 | |
082 | 0 | 4 | |a 005.8|2 23 |
100 | 1 | |a Sparks, Kelly. | |
245 | 1 | 0 | |a COMPTIA CYSA+ CYBERSECURITY ANALYST CERTIFICATION PRACTICE EXAMS (EXAM CS0-002)|h [electronic resource]. |
260 | |a NEW YORK :|b MCGRAW-HILL EDUCATION,|c 2021. | ||
300 | |a 1 online resource | ||
505 | 0 | |a Cover --|t About the Author --|t Title Page --|t Copyright Page --|t Dedication --|t Contents at a Glance --|t Contents --|t Acknowledgments --|t Introduction --|t Part I Threat and Vulnerability Management --|t Chapter 1 The Importance of Threat Data and Intelligence --|t Chapter 2 Threat Intelligence in Support of Organizational Security --|t Chapter 3 Vulnerability Management Activities --|t Chapter 4 Vulnerability Assessment Tools --|t Chapter 5 Threats and Vulnerabilities Associated with Specialized Technology --|t Chapter 6 Threats and Vulnerabilities Associated with Operating in the Cloud --|t Chapter 7 Mitigating Controls for Attacks and Software Vulnerabilities --|t Part II Software and Systems Security --|t Chapter 8 Security Solutions for Infrastructure Management --|t Chapter 9 Software Assurance Best Practices --|t Chapter 10 Hardware Assurance Best Practices --|t Part III Security Operations and Monitoring --|t Chapter 11 Data Analysis in Security Monitoring Activities --|t Chapter 12 Implement Configuration Changes to Existing Controls to Improve Security --|t Chapter 13 The Importance of Proactive Threat Hunting --|t Chapter 14 Automation Concepts and Technologies --|t Part IV Incident Response --|t Chapter 15 The Importance of the Incident Response Process --|t Chapter 16 Appropriate Incident Response Procedures --|t Chapter 17 Analyze Potential Indicators of Compromise --|t Chapter 18 Utilize Basic Digital Forensics Techniques --|t Part V Compliance and Assessment --|t Chapter 19 The Importance of Data Privacy and Protection --|t Chapter 20 Security Concepts in Support of Organizational Risk Mitigation --|t Chapter 21 The Importance of Frameworks, Policies, Procedures, and Controls --|t Part VI Appendixes --|t Appendix A Objective Map --|t Appendix B About the Online Content. | |
588 | 0 | |a Online resource; title from PDF title page (EBSCO, viewed January 29, 2021). | |
590 | |a O'Reilly|b O'Reilly Online Learning: Academic/Public Library Edition | ||
610 | 2 | 0 | |a Computing Technology Industry Association|x Examinations|v Study guides. |
610 | 2 | 7 | |a Computing Technology Industry Association.|2 fast|0 (OCoLC)fst00707499|9 18342 |
650 | 0 | |a Computer security|x Examinations|v Study guides.|9 93486 | |
650 | 0 | |a Electronic data processing personnel|x Certification.|9 80403 | |
650 | 0 | |a Computer networks|x Security measures|x Examinations|v Study guides.|9 93485 | |
655 | 7 | |a Study guides.|2 fast|0 (OCoLC)fst01423888|9 404668 | |
856 | 4 | 0 | |u https://library.access.arlingtonva.us/login?url=https://learning.oreilly.com/library/view/~/9781260473643/?ar|x O'Reilly|z eBook |
938 | |a YBP Library Services|b YANK|n 17129378 | ||
938 | |a EBSCOhost|b EBSC|n 2688524 | ||
994 | |a 92|b VIA | ||
999 | |c 284606|d 284606 |