CompTIA CySA+ Study Guide, 3rd Edition (2023)

Get ahead with CompTIA CySA+ Study Guide, 3rd Edition (2023), a structured practice test that helps you analyze your strengths and weaknesses.

Lucas Allen
Contributor
4.1
35
10 months ago
Preview (16 of 579 Pages)
100%
Log in to unlock

Page 1

CompTIA CySA+ Study Guide, 3rd Edition (2023) - Page 1 preview image

Loading page ...

ThirdEditionSave10%onCompTIA®ExamVouchersCouponInside!CompTIAEXAMCS0-003IncludesoneyearofFREEaccessafteractivationtotheonlinetestbankandstudytools:Custompracticeexam100electronicflashcardsSearchablekeytermglossaryMIKECHAPPLE(=DAVIDSEIDL+study|

Page 2

CompTIA CySA+ Study Guide, 3rd Edition (2023) - Page 2 preview image

Loading page ...

DownloadedfromStudyXY.com®+StudyXYSdYe.o>\|iFprE\3SStudyAnythingThisContentHasbeenPostedOnStudyXY.comassupplementarylearningmaterial.StudyXYdoesnotendroseanyuniversity,collegeorpublisher.Allmaterialspostedareundertheliabilityofthecontributors.wv8)www.studyxy.com

Page 3

CompTIA CySA+ Study Guide, 3rd Edition (2023) - Page 3 preview image

Loading page ...

Page 4

CompTIA CySA+ Study Guide, 3rd Edition (2023) - Page 4 preview image

Loading page ...

(uptoa$35value)*Somerestrictionsapply.Seewebpagefordetails.Getdetailsatwww.wiley.com/go/sybextestprepTogetthediscountcode,you'llneedtoregisterandlogonthetestbank.ThengotoResources.CusBex

Page 5

CompTIA CySA+ Study Guide, 3rd Edition (2023) - Page 5 preview image

Loading page ...

Page 6

CompTIA CySA+ Study Guide, 3rd Edition (2023) - Page 6 preview image

Loading page ...

CompTIA’CySA+StudyGuideExamCS0-003ThirdEditionETDy=4REDe==aiiMikeChappleDavidSeidl

Page 7

CompTIA CySA+ Study Guide, 3rd Edition (2023) - Page 7 preview image

Loading page ...

Copyright©2023byJohnWiley&Sons,Inc.Allrightsreserved.PublishedbyJohnWiley&Sons,Inc.,Hoboken,NewJersey.PublishedsimultaneouslyinCanadaandtheUnitedKingdom.ISBNs:9781394182909(paperback),9781394182923(ePDF),9781394182916(ePub)Nopartofthispublicationmaybereproduced,storedinaretrievalsystem,ortransmittedinanyformorbyanymeans,electronic,mechanical,photocopying,recording,scanning,orotherwise,exceptaspermittedunderSection107or108ofthe1976UnitedStatesCopyrightAct,withouteitherthepriorwrittenpermissionofthePublisher,orauthorizationthroughpaymentoftheappropriateper-copyfeetotheCopyrightClearanceCenter,Inc.,222RosewoodDrive,Danvers,MA01923,(978)750-8400,fax(978)750-4470,oronthewebatwwcopyright.com.RequeststothePublisherforpermissionshouldbeaddressedtothePermissionsDepartment,JohnWiley&Sons,Inc.,111RiverStreet,Hoboken,NJ07030,(201)748-6011,fax(201)748-6008,oronlineatwww.wiley.com/go/permission.Trademarks:WILEY,theWileylogo,andtheSybexlogoaretrademarksorregisteredtrademarksofJohnWiley&Sons,Inc.and/oritsaffiliates,intheUnitedStatesandothercountries,andmaynotbeusedwithoutwrittenpermission.CompTIAisaregisteredtrademarkofCompTIA,Inc.Allothertrademarksarethepropertyoftheirrespectiveowners.JohnWiley&Sons,Inc.isnorassociatedwithanyproductorvendormentionedinthisbook.LimitofLiability/DisclaimerofWarranty:Whilethepublisherandauthorshaveusedtheirbesteffortsinpreparingthisbook,theymakenorepresentationsorwarrantieswithrespecttotheaccuracyorcompletenessofthecontentsofthisbookandspecificallydisclaimanyimpliedwarrantiesofmerchantabilityorfitnessforaparticularpurpose.Nowarrantymaybecreatedorextendedbysalesrepresentativesorwrittensalesmaterials.Theadviceandstrategiescontainedhereinmaynotbesuitableforyoursituation.Youshouldconsultwithaprofessionalwhereappropriate.Further,readersshouldbeawarethatwebsiteslistedinthisworkmayhavechangedordisappearedbetweenwhenthisworkwaswrittenandwhenitisread.Neitherthepublishernorauthorsshallbeliableforanylossofprofitoranyothercommercialdamages,includingbutnotlimitedtospecial,incidental,consequential,orotherdamages.Forgeneralinformationonourotherproductsandservicesorfortechnicalsupport,pleasecontactourCustomerCareDepartmentwithintheUnitedStatesat(800)762-2974,outsidetheUnitedStatesat(317)572-3993orfax(317)572-4002.Wileyalsopublishesitsbooksinavarietyofelectronicformats.Somecontentthatappearsinprintmaynotbeavailableinelectronicformats.FormoreinformationaboutWileyproducts,visitourwebsiteatwww.wiLey.com.LibraryofCongressControlNumber:2022951784Coverimage:©JeremyWoodhouse/GettyImages,Inc.Coverdesign:WileyStudy

Page 8

CompTIA CySA+ Study Guide, 3rd Edition (2023) - Page 8 preview image

Loading page ...

Idedicatethisbooktomyfather,whowasarolemodelofthevalueofhardwork,commitmenttofamily,andtheimportanceofdoingtherightthing.Restinpeace,Dad.—MikeChappleThisbookisdedicatedtoRicWilliams,myfriend,mentor,andpartnerincrimethroughmyfirstforaysintothecommercialITworld.Thanksformakingmyjobasa“networkjanitor”oneofthebestexperiencesofmylife.—DavidSeidl|\TTStudyXY

Page 9

CompTIA CySA+ Study Guide, 3rd Edition (2023) - Page 9 preview image

Loading page ...

AcknowledgmentsBookslikethisinvolveworkfrommanypeople,andasauthors,wetrulyappreciatethehardworkanddedicationthattheteamatWileyshows.WewouldespeciallyliketothanksenioracquisitionseditorKenyonBrown.WehaveworkedwithKenonmultipleprojectsandcon-sistentlyenjoyourworkwithhim.Wealsogreatlyappreciatedtheeditingandproductionteamforthebook,includingLilyMiller,ourprojecteditor,whobroughtyearsofexperienceandgreattalenttotheproject;ChrisCrayton,ourtechnicaleditor,whoprovidedinsightfuladviceandgavewon-derfulfeedbackthroughoutthebook;ArchanaPragash,ourproductioneditor,whoguidedusthroughlayouts,formatting,andfinalcleanuptoproduceagreatbook;andElizabeth‘Welch,ourcopyeditor,whohelpedthetextflowwell.Wewouldalsoliketothankthemanybehind-the-scenescontributors,includingthegraphics,production,andtechnicalteamswhomakethebookandcompanionmaterialsintoafinishedproduct.Ouragent,CaroleJelenofWatersideProductions,continuestoprovideuswithwonderfulopportunities,advice,andassistancethroughoutourwritingcareers.Finally,wewouldliketothankourfamiliesandsignificantotherswhosupportusthroughthelateevenings,busyweekends,andlonghoursthatabooklikethisrequirestowrite,edit,andgettopress.

Page 10

CompTIA CySA+ Study Guide, 3rd Edition (2023) - Page 10 preview image

Loading page ...

AbouttheAuthorsMikeChapple,Ph.D.,Security+,CySA+,CISSP,isauthorofover50books,includingthebest-sellingCISSP(ISC)?CertifiedInformationSystemsSecurityProfessionalOfficialStudyGuide(Sybex,2021)andtheCISSP(ISC)*OfficialPracticeTests(Sybex,2021).Heisaninformationsecurityprofessionalwithtwodecadesofexperienceinhighereducation,theprivatesector,andgovernment.MikecurrentlyservesasaTeachingProfessorintheIT,Analytics,andOperationsdepartmentattheUniversityofNotreDame’sMendozaCollegeofBusiness,whereheteachesundergraduateandgraduatecoursesoncybersecurity,datamanagement,andbusinessanalytics.BeforereturningtoNotreDame,MikeservedasexecutivevicepresidentandchiefinformationofficeroftheBrandInstitute,aMiami-basedmarketingconsultancy.MikealsospentfouryearsintheinformationsecurityresearchgroupattheNationalSecurityAgencyandservedasanactivedutyintelligenceofficerintheU.S.AirForce.MikeearnedbothhisB.S.andPh.D.degreesfromNotreDameincomputerscienceandengineering.MikealsoholdsanM.S.incomputersciencefromtheUniversityofIdahoandanMBAfromAuburnUniversity.MikeholdscertificationsinCybersecurityAnalyst+(CySA+),Security+,CertifiedInformationSecurityManager(CISM),CertifiedCloudSecurityProfessional(CCSP),andCertifiedInformationSystemsSecurityProfessional(CISSP).HeprovidessecuritycertificationresourcesonhiswebsiteatCertMike.com.DavidSeidl,CySA+,CISSP,PenTest+,isVicePresidentforInformationTechnologyandCIOatMiamiUniversity.DuringhisITcareer,hehasservedinavarietyoftechnicalandinformationsecurityroles,includingservingastheSeniorDirectorforCampusTechnologyServicesattheUniversityofNotreDamewhereheco-ledNotreDame’smovetothecloudandoversawcloudoperations,ERP,databases,identitymanagement,andabroadrangeofothertechnologiesandservice.HealsoservedasNotreDame’sDirectorofInformationSecurityandledNotreDame’sinformationsecurityprogram.HehastaughtinformationsecurityandnetworkingundergraduatecoursesasaninstructorforNotreDame’sMen-dozaCollegeofBusiness,andhehaswritten18booksonsecuritycertificationandcyber-warfare,includingco-authoringCISSP(ISC)>OfficialPracticeTests(Sybex,2021)aswellasthepreviouseditionsofboththisbookandthecompanionCompTIACySA+PracticeTests(Sybex,2020,2018).Davidholdsabachelor’sdegreeincommunicationtechnologyandamaster’sdegreeininformationsecurityfromEasternMichiganUniversity,aswellascertificationsinCISSP,CySA+,Pentest+,GPEN,andGCIH.

Page 11

CompTIA CySA+ Study Guide, 3rd Edition (2023) - Page 11 preview image

Loading page ...

AbouttheTechnicalEditorChrisCrayton,MCSE,CISSP,CASP,CySA+,A+,N+,S+,isatechnicalconsultant,trainer,author,andindustry-leadingtechnicaleditor.Hehasworkedasacomputertechnologyandnetworkinginstructor,informationsecuritydirector,networkadministrator,networkengineer,andPCspecialist.Chrishasservedastechnicaleditorandcontentcontributoronnumeroustechnicaltitlesforseveraloftheleadingpublishingcompanies.Hehasalsobeenrecognizedwithmanyprofessionalandteachingawards.|veT=StudyXY

Page 12

CompTIA CySA+ Study Guide, 3rd Edition (2023) - Page 12 preview image

Loading page ...

ContentsataGlanceIntroductionxxiAssessmentTestxxXxXVDomain|SecurityOperations1Chapter1Today'sCybersecurityAnalyst3Chapter2SystemandNetworkArchitecture37Chapter3MaliciousActivity77Chapter4ThreatIntelligence135Chapter5ReconnaissanceandIntelligenceGathering159DomainIIVulnerabilityManagement201Chapter6DesigningaVulnerabilityManagementProgram203Chapter7AnalyzingVulnerabilityScans245Chapter8RespondingtoVulnerabilities293DomainIllIncidentResponseandManagement341Chapter9BuildinganIncidentResponseProgram343Chapter10IncidentDetectionandAnalysis377Chapter11Containment,Eradication,andRecovery397DomainIVReportingandCommunication421Chapter12ReportingandCommunication423Chapter13PerformingForensicAnalysisandTechniquesforIncidentResponse447AppendixAnswerstoReviewQuestions489Index513|v1StudyXY

Page 13

CompTIA CySA+ Study Guide, 3rd Edition (2023) - Page 13 preview image

Loading page ...

Page 14

CompTIA CySA+ Study Guide, 3rd Edition (2023) - Page 14 preview image

Loading page ...

ContentsIntroductionxxiAssessmentTestxxXxXVDomain|SecurityOperations1Chapter1Today'sCybersecurityAnalyst3CybersecurityObjectives4Privacyvs.Security5EvaluatingSecurityRisks6IdentifyThreats9IdentifyVulnerabilities10DetermineLikelihood,Impact,andRisk10ReviewingControls12BuildingaSecureNetwork12NetworkAccessControl12FirewallsandNetworkPerimeterSecurity14NetworkSegmentation17DefenseThroughDeception18SecureEndpointManagement19HardeningSystemConfigurations19PatchManagement19GroupPolicies20EndpointSecuritySoftware20PenetrationTesting21PlanningaPenetrationTest22ConductingDiscovery23ExecutingaPenetrationTest23CommunicatingPenetrationTestResults24TrainingandExercises24ReverseEngineering25IsolationandSandboxing25ReverseEngineeringSoftware25ReverseEngineeringHardware26EfficiencyandProcessImprovement27StandardizeProcessesandStreamlineOperations28CybersecurityAutomation28TechnologyandToolIntegration29BringingEfficiencytoIncidentResponse29

Page 15

CompTIA CySA+ Study Guide, 3rd Edition (2023) - Page 15 preview image

Loading page ...

xiiContentsTheFutureofCybersecurityAnalytics31Summary31ExamEssentials32LabExercises33Activity1.1:CreateanInboundFirewallRule33Activity1.2:CreateaGroupPolicyObject34Activity1.3:WriteaPenetrationTestingPlan35Activity1.4:RecognizeSecurityTools36Chapter2SystemandNetworkArchitecture37InfrastructureConceptsandDesign38Serverless38Virtualization39Containerization39OperatingSystemConcepts41SystemHardening41TheWindowsRegistry42FileStructureandFileLocations43SystemProcesses44HardwareArchitecture45Logging,Logs,andLogIngestion45TimeSynchronization45LoggingLevels46NetworkArchitecture47On-Premises47Cloud48Hybrid49NetworkSegmentation49Software-DefinedNetworking51ZeroTrust52SecureAccessServiceEdge52IdentityandAccessManagement53MultifactorAuthentication(MFA)54Passwordless55SingleSign-On(SSO)5sFederation56FederatedIdentitySecurityConsiderations57FederatedIdentityDesignChoices59FederatedIdentityTechnologies61PrivilegedAccessManagement(PAM)64CloudAccessSecurityBroker(CASB)65EncryptionandSensitiveDataProtection65PublicKeyInfrastructure(PKI)66SecureSocketsLayer(SSL)Inspection67

Page 16

CompTIA CySA+ Study Guide, 3rd Edition (2023) - Page 16 preview image

Loading page ...

ContentsxiiiDataLossPrevention(DLP)68PersonallyIdentifiableInformation(PII)68CardholderData(CHD)68Summary68ExamEssentials70LabExercises70Activity2.1:SetUpVirtualMachinesforExercises70Activity2.2:ExploretheWindowsRegistry71Activity2.3:ReviewSystemHardeningGuidelines72ReviewQuestions73Chapter3MaliciousActivity77AnalyzingNetworkEvents78CapturingNetwork-RelatedEvents79DetectingCommonNetworkIssues82DetectingScansandSweeps86DetectingDenial-of-ServiceandDistributedDenial-of-ServiceAttacks87DetectingOtherNetworkAttacks88DetectingandFindingRogueDevices88InvestigatingHost-RelatedIssues91SystemResources91Malware,MaliciousProcesses,andUnauthorizedSoftware~~95UnauthorizedAccess,Changes,andPrivileges97SocialEngineering99InvestigatingService-andApplication-RelatedIssues100ApplicationandServiceMonitoring100DeterminingMaliciousActivityUsingToolsandTechniques~~104Logs,LogAnalysis,andCorrelation105Logs105SecurityAppliancesandTools110PacketCapture111DNSandWhoisReputationServices112CommonTechniques114ProtectingandAnalyzingEmail115FileAnalysis119Sandboxing120UserBehaviorAnalysis121DataFormats121Summary126ExamEssentials127LabExercises128Activity3.1:IdentifyaNetworkScan128
Preview Mode

This document has 579 pages. Sign in to access the full document!