CompTIA Security+ All-in-One Exam Guide (Exam SY0-501) (5 HAR/CDR)

CompTIA Security+ All-in-One Exam Guide (Exam SY0-501) (5 HAR/CDR)

  • ただいまウェブストアではご注文を受け付けておりません。 ⇒古書を探す
  • 製本 Hardcover:ハードカバー版/ページ数 647 p.
  • 言語 ENG
  • 商品コード 9781260019322
  • DDC分類 005.8

Full Description


This fully updated study guide covers every topic on the current version of the CompTIA Security+ examTake the latest version of the CompTIA Security+ exam with complete confidence using the detailed information contained in this highly effective self-study system. Written by a team of leading information security experts, this authoritative guide addresses the skills required for securing a network and managing risk and enables you to become CompTIA Security+ certified. CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501) covers all exam domains and features 200 accurate practice questions. To aid in study, the book features learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. All questions mirror those on the live test in style, format, and difficulty. Beyond fully preparing you for the challenging SY0-501 exam, the book also serves as a valuable on-the-job reference for IT professionals.* Provides 100% coverage of every objective on exam SY0-501* Electronic content includes 200 practice questions and a secured book PDF* Written by a team of experienced IT security academics

Contents

Part 1Chapter 1: Malware and Indicators of CompromiseChapter 2: AttacksChapter 3: Threat ActorsChapter 4: Vulnerability Scanning and Penetration TestingChapter 5: Vulnerabilities and ImpactsPart 2: Technologies and ToolsChapter 6: Network ComponentsChapter 7: Security Tools and TechnologiesChapter 8: Troubleshoot Common Security IssuesChapter 9: Deploy Mobile Devices SecurelyChapter 10: Implementing Secure ProtocolsPart 3: Architecture and DesignChapter 11: Architecture Frameworks and Secure Network ArchitecturesChapter 12: Secure Systems Design and DeploymentChapter 13: Embedded SystemsChapter 14: Application Development and DeploymentChapter 15: Cloud and VirtualizationChapter 16: Resiliency and Automation strategiesChapter 17: Physical Security ControlsPart 4: Identity and Access ManagementChapter 18: Identity, Access and AccountsChapter 19: Identity and Access ServicesChapter 20: Identity and Access Management ControlsPart 5: Risk ManagementChapter 21: Policies, Plans and ProceduresChapter 22: Risk Management and Business Impact Analysis ConceptsChapter 23: Incident Response, Disaster Recovery and Continuity of OperationChapter 24: Digital forensicsChapter 25: Compare and contrast various types of controlsChapter 26: Data Security and Privacy PracticesPart 6: Cryptography and PKIChapter 27: Cryptography ConceptsChapter 28: Cryptography AlgorithmsChapter 29: Wireless SecurityChapter 30: Public Key InfrastructureNER(01): WOW

最近チェックした商品