Details

CompTIA Security+ Review Guide


CompTIA Security+ Review Guide

Exam SY0-601
5. Aufl.

von: James Michael Stewart

20,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 08.01.2021
ISBN/EAN: 9781119735427
Sprache: englisch
Anzahl Seiten: 576

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p><b>Learn the ins and outs of the IT security field and efficiently prepare for the CompTIA Security+ Exam SY0-601 with one easy-to-follow resource</b></p> <p><i>CompTIA Security+ Review Guide: Exam SY0-601, Fifth Edition</i> helps you to efficiently review for the leading IT security certification—CompTIA Security+ SY0-601. Accomplished author and security expert James Michael Stewart covers each domain in a straightforward and practical way, ensuring that you grasp and understand the objectives as quickly as possible.</p> <p>Whether you’re refreshing your knowledge or doing a last-minute review right before taking the exam, this guide includes access to a companion online test bank that offers hundreds of practice questions, flashcards, and glossary terms.</p> <p>Covering all five domains tested by Exam SY0-601, this guide reviews:</p> <ul> <li>Attacks, Threats, and Vulnerabilities</li> <li>Architecture and Design</li> <li>Implementation</li> <li>Operations and Incident Response</li> <li>Governance, Risk, and Compliance</li> </ul> <p>This newly updated Fifth Edition of <i>CompTIA Security+ Review Guide: Exam SY0-601 </i>is not just perfect for anyone hoping to take the SY0-601 Exam, but it is also an excellent resource for those wondering about entering the IT security field.</p>
<p>Introduction xix</p> <p><b>Chapter 1 Threats, Attacks, and Vulnerabilities 1</b></p> <p>1.1 Compare and contrast different types of social engineering techniques 5</p> <p>1.2 Given a scenario, analyze potential indicators to determine the type of attack 20</p> <p>1.3 Given a scenario, analyze potential indicators associated with application attacks 37</p> <p>1.4 Given a scenario, analyze potential indicators associated with network attacks 57</p> <p>1.5 Explain different threat actors, vectors, and intelligence sources 80</p> <p>1.6 Explain the security concerns associated with various types of vulnerabilities 91</p> <p>1.7 Summarize the techniques used in security assessments 99</p> <p>1.8 Explain the techniques used in penetration testing 109</p> <p>Review Questions 118</p> <p><b>Chapter 2 Architecture and Design 123</b></p> <p>2.1 Explain the importance of security concepts in an enterprise environment 128</p> <p>2.2 Summarize virtualization and cloud computing concepts 139</p> <p>2.3 Summarize secure application development, deployment, and automation concepts 152</p> <p>2.4 Summarize authentication and authorization design concepts 167</p> <p>2.5 Given a scenario, implement cybersecurity resilience 183</p> <p>2.6 Explain the security implications of embedded and specialized systems 196</p> <p>2.7 Explain the importance of physical security controls 208</p> <p>2.8 Summarize the basics of cryptographic concepts 220</p> <p>Review Questions 240</p> <p><b>Chapter 3 Implementation 245</b></p> <p>3.1 Given a scenario, implement secure protocols 248</p> <p>3.2 Given a scenario, implement host or application security solutions 262</p> <p>3.3 Given a scenario, implement secure network designs 280</p> <p>3.4 Given a scenario, install and configure wireless security settings 304</p> <p>3.5 Given a scenario, implement secure mobile solutions 315</p> <p>3.6 Given a scenario, apply cybersecurity solutions to the cloud 330</p> <p>3.7 Given a scenario, implement identity and account management controls 336</p> <p>3.8 Given a scenario, implement authentication and authorization solutions 344</p> <p>3.9 Given a scenario, implement public key infrastructure 355</p> <p>Review Questions 370</p> <p><b>Chapter 4 Operations and Incident Response 375</b></p> <p>4.1 Given a scenario, use the appropriate tool to assess organizational security 377</p> <p>4.2 Summarize the importance of policies, processes, and procedures for incident response 398</p> <p>4.3 Given an incident, utilize appropriate data sources to support an investigation 409</p> <p>4.4 Given an incident, apply mitigation techniques or controls to secure an environment 418</p> <p>4.5 Explain the key aspects of digital forensics 422</p> <p>Review Questions 435</p> <p><b>Chapter 5 Governance, Risk, and Compliance 441</b></p> <p>5.1 Compare and contrast various types of controls 443</p> <p>5.2 Explain the importance of applicable regulations, standards, or frameworks that impact organizational security posture 446</p> <p>5.3 Explain the importance of policies to organizational security 456</p> <p>5.4 Summarize risk management processes and concepts 469</p> <p>5.5 Explain privacy and sensitive data concepts in relation to security 486</p> <p>Review Questions 494</p> <p><b>Appendix Answers to Review Questions 499</b></p> <p>Chapter 1: Threats, Attacks, and Vulnerabilities 500</p> <p>Chapter 2: Architecture and Design 505</p> <p>Chapter 3: Implementation 508</p> <p>Chapter 4: Operations and Incident Response 511</p> <p>Chapter 5: Governance, Risk, and Compliance 514</p> <p>Index 519</p>
<p><b>JAMES MICHAEL STEWART</b> holds variety of certifications, including: Security+, Network+, A+, CySA+, PenTest+, CASP+, CTT+, CEH, CHFI, ECSA, ECIH, CND, CEI, CISSP, CISM, and CFR. He has been working with computers and technology for over thirty years. His work focuses on security, certification, and various operating systems. Michael has been teaching job skill and certification courses for over 25 years, such as CISSP, ethical hacking/penetration testing, computer forensics, and Security+. He has taught hundreds of classes, accumulating over 16,000 hours of instruction. His most recent publications include the <i>CISSP Study Guide, 9th Edition.</i> Michael has also contributed to many other security focused materials including exam preparation guides, practice exams, video instruction, and courseware. He has developed certification courseware and training materials as well as presented these materials in the classroom. Michael graduated in 1992 from the University of Texas at Austin.
<p><b>Includes one year of FREE access after activation to the interactive online learning environment and study tools:</b> <ul> <li><b>2 custom practice exams</b></li> <li><b>Over 900 electronic flashcards</b></li> <li><b> Searchable key term glossary</b></li> </ul> <p><b>Approach the CompTIA Security+ exam with confidence</b> <p>Before you take CompTIA's Security+ Exam SY0-601, reinforce your test prep with this concise guide that reviews all five exam domains: Attacks, Threats, and Vulnerabilities; Architecture and Design; Implementation; Operations and Incident Response; and Governance, Risk and Compliance. You'll find full coverage of all exam objectives—plus gain access to a practical and targeted set of online review tools. <ul> <li>Easy-to-use book is organized by exam domains for quick review</li> <li>Flexible review guide goes hand-in-hand with any learning tool on the market, including the Sybex<i> CompTIA Security+ Study Guide Exam SYO-601, Eighth Edition</i></li> <li>"Exam Essentials" section in each chapter helps you zero in on what you need to know</li> <li>Gain access to a complete set of online exam prep and review tools, including a hundreds of practice questions, electronic flashcards, and a full Glossary of Key Terms</li> </ul> <p><b>ABOUT THE CompTIA SECURITY+ PROGRAM</b> <p>The CompTIA Security+ exam certifies that the candidate is able to install and configure systems securely, perform threat analysis, mitigate risks, and operate under acceptable laws, policies, and regulations. It is considered the leading entry-level certification for security professionals. <p><b>Interactive learning environment</b> <p>Take your exam prep to the next level with Sybex's superior interactive online tools. To access our interactive learning environment simply visit <b>www.wiley.com/go/sybextestprep</b>, register your book to receive your unique PIN, and instantly gain one year of FREE access after activation to: <ul> <b><li>Interactive test bank</b> with 2 custom practice exams help you identify where you need additional study. Practice exams help you identify areas where further review is needed. Get more than 90% of the answers correct, and you're ready to take the certification exam.</li> <b><li>More than 900 electronic flashcards</b> to reinforce learning and last-minute prep before the exam</li> <b><li>Comprehensive glossary</b> in PDF format gives you instant access to the key terms so you are fully prepared</li> </ul>

Diese Produkte könnten Sie auch interessieren:

Google Earth For Dummies
Google Earth For Dummies
von: David A. Crowder
PDF ebook
19,99 €