Atnaujinkite slapukų nuostatas

CompTIA Securityplus Review Guide: Exam SY0-601 5th edition [Minkštas viršelis]

(Lan Wrights, Inc., Austin, Texas)
  • Formatas: Paperback / softback, 576 pages, aukštis x plotis x storis: 234x185x33 mm, weight: 771 g
  • Išleidimo metai: 08-Apr-2021
  • Leidėjas: Sybex Inc.,U.S.
  • ISBN-10: 1119735386
  • ISBN-13: 9781119735380
Kitos knygos pagal šią temą:
  • Formatas: Paperback / softback, 576 pages, aukštis x plotis x storis: 234x185x33 mm, weight: 771 g
  • Išleidimo metai: 08-Apr-2021
  • Leidėjas: Sybex Inc.,U.S.
  • ISBN-10: 1119735386
  • ISBN-13: 9781119735380
Kitos knygos pagal šią temą:

Learn the ins and outs of the IT security field and efficiently prepare for the CompTIA Security+ Exam SY0-601 with one easy-to-follow resource 

CompTIA Security+ Review Guide: Exam SY0-601, Fifth Edition helps you to efficiently review for the leading IT security certification—CompTIA Security+ SY0-601. Accomplished author and security expert James Michael Stewart covers each domain in a straightforward and practical way, ensuring that you grasp and understand the objectives as quickly as possible.  

Whether you’re refreshing your knowledge or doing a last-minute review right before taking the exam, this guide includes access to a companion online test bank that offers hundreds of practice questions, flashcards, and glossary terms. 

Covering all five domains tested by Exam SY0-601, this guide reviews: 

  • Attacks, Threats, and Vulnerabilities  
  • Architecture and Design  
  • Implementation  
  • Operations and Incident Response  
  • Governance, Risk, and Compliance 

This newly updated Fifth Edition of CompTIA Security+ Review Guide: Exam SY0-601 is not just perfect for anyone hoping to take the SY0-601 Exam, but it is also an excellent resource for those wondering about entering the IT security field. 

Introduction xix
Chapter 1 Threats, Attacks, And Vulnerabilities
1(122)
1.1 Compare and contrast different types of social engineering techniques
5(15)
1.2 Given a scenario, analyze potential indicators to determine the type of attack
20(17)
1.3 Given a scenario, analyze potential indicators associated with application attacks
37(20)
1.4 Given a scenario, analyze potential indicators associated with network attacks
57(23)
1.5 Explain different threat actors, vectors, and intelligence sources
80(11)
1.6 Explain the security concerns associated with various types of vulnerabilities
91(8)
1.7 Summarize the techniques used in security assessments
99(10)
1.8 Explain the techniques used in penetration testing
109(9)
Review Questions
118(5)
Chapter 2 Architecture And Design
123(122)
2.1 Explain the importance of security concepts in an enterprise environment
128(11)
2.2 Summarize virtualization and cloud computing concepts
139(13)
2.3 Summarize secure application development, deployment, and automation concepts
152(15)
2.4 Summarize authentication and authorization design concepts
167(16)
2.5 Given a scenario, implement cybersecurity resilience
183(13)
2.6 Explain the security implications of embedded and specialized systems
196(12)
2.7 Explain the importance of physical security controls
208(12)
2.8 Summarize the basics of cryptographic concepts
220(20)
Review Questions
240(5)
Chapter 3 Implementation
245(130)
3.1 Given a scenario, implement secure protocols
248(14)
3.2 Given a scenario, implement host or application security solutions
262(18)
3.3 Given a scenario, implement secure network designs
280(24)
3.4 Given a scenario, install and configure wireless security settings
304(11)
3.5 Given a scenario, implement secure mobile solutions
315(15)
3.6 Given a scenario, apply cybersecurity solutions tothe cloud
330(6)
3.7 Given a scenario, implement identity and account management controls
336(8)
3.8 Given a scenario, implement authentication and authorization solutions
344(11)
3.9 Given a scenario, implement public key infrastructure
355(15)
Review Questions
370(5)
Chapter 4 Operations And Incident Response
375(66)
4.1 Given a scenario, use the appropriate tool to assess organizational security
377(21)
4.2 Summarize the importance of policies, processes, and procedures for incident response
398(11)
4.3 Given an incident, utilize appropriate data sources to support an investigation
409(9)
4.4 Given an incident, apply mitigation techniques or controls to secure an environment
418(4)
4.5 Explain the key aspects of digital forensics
422(13)
Review Questions
435(6)
Chapter 5 Governance, Risk, And Compliance
441(58)
5.1 Compare and contrast various types of controls
443(3)
5.2 Explain the importance of applicable regulations, standards, or frameworks that impact organizational security posture
446(10)
5.3 Explain the importance of policies to organizational security
456(13)
5.4 Summarize risk management processes and concepts
469(17)
5.5 Explain privacy and sensitive data concepts in relation to security
486(8)
Review Questions
494(5)
Appendix: Answers to Review Questions
499(20)
Chapter 1 Threats, Attacks, And Vulnerabilities
500(5)
Chapter 2 Architecture And Design
505(3)
Chapter 3 Implementation
508(3)
Chapter 4 Operations And Incident Response
511(3)
Chapter 5 Governance, Risk, And Compliance
514(5)
Index 519
JAMES MICHAEL STEWART holds variety of certifications, including: Security+, Network+, A+, CySA+, PenTest+, CASP+, CTT+, CEH, CHFI, ECSA, ECIH, CND, CEI, CISSP, CISM, and CFR. He has been working with computers and technology for over thirty years. His work focuses on security, certification, and various operating systems. Michael has been teaching job skill and certification courses for over 25 years, such as CISSP, ethical hacking/penetration testing, computer forensics, and Security+. He has taught hundreds of classes, accumulating over 16,000 hours of instruction. His most recent publications include the CISSP Study Guide, 9th Edition. Michael has also contributed to many other security focused materials including exam preparation guides, practice exams, video instruction, and courseware. He has developed certification courseware and training materials as well as presented these materials in the classroom. Michael graduated in 1992 from the University of Texas at Austin.