Mark Ciampa
CompTIA CYSA+ Guide to Cyber Security Analyst
Ein Angebot für € 69,95 €
Mark Ciampa
CompTIA CYSA+ Guide to Cyber Security Analyst
- Gebundenes Buch
Andere Kunden interessierten sich auch für
- Sven LeidelTravel Security Handbook49,00 €
- Craig Antweileryour one and only TRAVEL GUIDE TO IRAQ6,99 €
- Monocle MonocleThe Monocle Travel Guide to Amsterdam (Updated Version)18,00 €
- AnonymousPacific line guide to South America; containing information to travellers & shippers to ports on the east & west coasts of South America21,90 €
- Allen's Illustrated Guide to Niagara13,90 €
- AnonymBell's Picturesque Guide to American watering Places12,90 €
- George DickieThe botanist's guide to the counties of Aberdeen, Banff and Kincardine27,90 €
-
-
-
Produktdetails
- Verlag: Cengage Learning EMEA / Course Technology
- Erscheinungstermin: 26. Februar 2021
- Englisch
- Abmessung: 13mm x 216mm x 277mm
- Gewicht: 680g
- ISBN-13: 9780357541371
- Artikelnr.: 60106050
Ciampa, MarkDr. Mark Ciampa is a professor of information systems in the Gordon Ford College of Business at Western Kentucky University in Bowling Green, Kentucky. Prior to this current role, he served as an associate professor and the director of academic computing at Volunteer State Community College in Gallatin, Tennessee, for 20 years. Dr. Ciampa has worked in the IT industry as a computer consultant for businesses, government agencies and educational institutions. He has published more than 20 articles in peer-reviewed journals and has written more than 25 technology textbooks, including COMPTIA CYSA+ GUIDE TO CYBERSECURITY ANALYST; SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS; SECURITY AWARENESS: APPLYING PRACTICAL SECURITY IN YOUR WORLD; CWNA GUIDE TO WIRELESS LANS and GUIDE TO WIRELESS COMMUNICATIONS. Dr. Ciampa holds a Ph.D. in technology management with a specialization in digital communication systems from Indiana State University and has certifications in security
and healthcare.
and healthcare.
Part 1: Gathering InformationModule 1: Applying Environmental ReconnaissanceModule 2: Analyzing Network ReconnaissanceModule 3: Strengthening the NetworkModule 4: Exploring Penetration TestingPart 2: Uncovering ExposuresModule 5: Scanning for VulnerabilitiesModule 6: Analyzing Vulnerability Scans and Identifying Common VulnerabilitiesPart 3: Responding to AttacksModule 7: Reacting to a Cyber Incident: Impact and ForensicsModule 8: Reacting to a Cyber Incident: Communication and Incident RecoveryModule 9: Reacting to a Cyber Incident: Analyzing Common SymptomsPart 4: Improving SecurityModule 10: Security Structures and Identifying and Access ManagementModule 11: Defense in Depth, Software Development, and Data Analytics
Part 1: Gathering InformationModule 1: Applying Environmental ReconnaissanceModule 2: Analyzing Network ReconnaissanceModule 3: Strengthening the NetworkModule 4: Exploring Penetration TestingPart 2: Uncovering ExposuresModule 5: Scanning for VulnerabilitiesModule 6: Analyzing Vulnerability Scans and Identifying Common VulnerabilitiesPart 3: Responding to AttacksModule 7: Reacting to a Cyber Incident: Impact and ForensicsModule 8: Reacting to a Cyber Incident: Communication and Incident RecoveryModule 9: Reacting to a Cyber Incident: Analyzing Common SymptomsPart 4: Improving SecurityModule 10: Security Structures and Identifying and Access ManagementModule 11: Defense in Depth, Software Development, and Data Analytics