on all orders of $79 or more

7% OFF your purchase of $75 or more!
Use coupon code TUESDAY in checkout.

CompTIA Cybersecurity Analyst+ Cert Guide

, by
CompTIA Cybersecurity Analyst+ Cert Guide by McMillan, Troy, 9780789756954
Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
  • ISBN: 9780789756954 | 0789756951
  • Cover: Hardcover
  • Copyright: 5/12/2017
  • Buy New Book

    Not Yet Printed. Place an order and we will ship it as soon as it arrives.


One million cybersecurity jobs will open this year, and many will require strong knowledge and skills in cybersecurity analysis. CompTIA's new vendor-neutral Cybersecurity Analyst (CSA+) IT professional validates the knowledge and skills you'll need to qualify for these opportunities. CompTIA Cybersecurity Analyst+ Cert Guide is the comprehensive self-study resource for the brand-new CSA+ (CSO-001) exam.


Designed for all CompTIA Cybersecurity Analyst (CSA+) candidates, this guide covers every exam objective concisely and logically, with extensive teaching features designed to promote retention and understanding. You'll find:

  • Pre-chapter quizzes to assess knowledge upfront and focus your study more efficiently
  • Foundation topics sections that explain concepts and configurations, and link theory to practice
  • Key topics sections calling attention to every figure, table, and list you must know
  • Exam Preparation sections with additional chapter review features
  • Final preparation chapter providing tools and a complete final study plan
  • A customizable practice test library

This guide offers comprehensive, up-to-date coverage of all CSA+ topics related to:

  • Environmental reconnaissance, response, and countermeasures
  • Securing corporate environments
  • Managing information security vulnerabilities, including detailed coverage of common vulnerabilities
  • Analyzing threat data or behavior, performing computer forensics, and responding to incidents
  • Recovering and responding to incidents
  • Using security frameworks to guide common security policies
  • Implementing identity/access management and compensating controls
  • Optimizing security throughout the Software Development Life Cycle (SDLC)
  • Choosing and applying cybersecurity tools and technologies, and more

You might also enjoy...

Please wait while the item is added to your bag...