- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Complete coverage of every topic on the CompTIA Advanced Security Practitioner certification exam by the experts!
Get complete coverage of all objectives included on the CompTIA CASP+ exam CAS-003 from this comprehensive resource. Written by a team of leading information security experts, this authoritative guide fully addresses the skills required for securing a network and managing risk. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference. Also includes a voucher coupon for a 10% discount on your CompTIA exam!
Covers all exam domains, including:
Threats, attacks, and vulnerabilities
Technologies and tools
Architecture and design
Identity and access management
Risk management
Cryptography and PKI
Online content includes:
200 realistic practice exam questions
Interactive performance-based question quiz
Contents
PART I: Risk Management
Chapter 1: Security Influences and Risk
Chapter 2: Security Policies and Procedures
Chapter 3: Risk Mitigation, Strategies, and Controls
Chapter 4: Risk Metrics
PART II: Enterprise Security Architecture
Chapter 5: Network Security Components, Concepts and Architectures
Chapter 6: Security Controls for Host Devices
Chapter 7: Mobile Security Controls
Chapter 8: Vulnerabilities and Security Controls
PART III: Enterprise Security Operations
Chapter 9: Security Assessment
Chapter 10: Security Assessment Tools
Chapter 11: Incident Response and Recovery Procedures
PART IV: Technical Integration of Enterprise Security
Chapter 12: Hosts, Storage, Networks, and Applications
Chapter 13: Cloud and Virtualization
Chapter 14: Authentication and Authorization
Chapter 15: Cryptographic Techniques
Chapter 16: Securing Communications and Collaboration
PART V: Research, Development and Collaboration
Chapter 17: Research Methods and Industry Trends
Chapter 18: Technology Life Cycles and Security Activities
Chapter 19: Business Unit Interactions
Glossary