Part I: Threat Management Chapter 1: Applying Reconnaissance Techniques Chapter 2: Analyzing the Results of Reconnaissance Chapter 3: Responding to Network-Based Threats Chapter 4: Securing a Cooperate Network Part II: Vulnerability Management Chapter 5: Implementing Vulnerability Management Processes Chapter 6: Vulnerability Scanning Part III: Cyber Incident Response Chapter 7: The Incident Response Process Chapter 8: Determining the Impact of Incidents Chapter 9: Preparing the Incident Response Toolkit Chapter 10: Selecting the Best Course of Action Part IV: Security Architectures Chapter 11: Frameworks, Policies, Controls, and Procedures Chapter 12: Identity and Access Management Chapter 13: Putting in Compensating Controls Chapter 14: Secure Software Development Chapter 15: Tool Sets Part V: Appendices Appendix A: Exam Objective Map Appendix B: About the CD Glossary
Fernando J. Maym , Ph.D., CompTIA CySA+, CISSP(R), is a security practitioner with more than 25 years of experience in the field. He is the author of more than a dozen publications and holds three patents. Dr. Maymi's awards include the U.S. Department of the Army Research and Development Achievement Award, and he was recognized as a HENAAC Luminary. Brent Chapman, CompTIA, CySA+, GCIH, GCFA, CISSP, is a recognized cyber security expert who has served as an instructor and researcher at the United States Military Academy at West Point. He is currently a project manager at the Defense Innovation Unit, Experimental (DIUx) in Silicon Valley.