Chapter 12. Security Architecture and Implementing Compensating Controls

This chapter covers the following topics:

4.0 Security Architecture and Tool Sets

4.3 Given a scenario, review security architecture and make recommendations to implement compensating controls.

Image Security Data Analytics: Discusses data aggregation and correlation, trend analysis, and historical analysis.

Image Manual Review: Covers reviewing firewall logs, Syslogs, authentication logs, and event logs.

Defense in Depth: Discusses the application of the defense-in-depth principle ...

Get CompTIA Cybersecurity Analyst (CySA+) Cert Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.