English Polski
On-line access


0.00 PLN
Bookshelf (0) 
Your bookshelf is empty
Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401)

Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401)

Publisher McGraw-Hill Education - Europe
Year 16/12/2014
Pages 1200
Version book
Readership level Professional and scholarly
ISBN 9780071836449
Categories Computer certification: CompTia, Computer security
Replaced by 9781260026375
$59.62 (with VAT)
219.19 PLN / €48.88 / £41.99
Delivery to United States

check shipping prices
Product to order
Delivery 3-4 weeks
Add to bookshelf

Book description

An all-new CompTIA Security+ exam guide from top CompTIA training and exam prep expert Mike MeyersIn Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401), the bestselling author and leading authority on CompTIA A+ certification brings his highly effective methodology to IT security for the first time. Like the exam, this book goes beyond knowledge application and is designed to ensure that security personnel anticipate security risks and guard against them. Meyers' "in the trenches" voice and the clarity of his explanations make his books the bestselling self-study resources available for professional certification. Digital content includes: 20+ lab simulations, 1+ hour of video training from Meyers, and hundreds of practice exam questionsMcGraw-Hill Professional is a Platinum-Level CompTIA Authorized Partner CAQC Authorized (CompTIA Approved Quality Curriculum) Includes Mike's toolbox of favorite network security related freeware/shareware

Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401)

Table of contents

Part I The CompTIA Security+ Exam
1. The Security+ Exam
2. Assessment Exam
Part II Stepping up to IT Security
3. The Basics of Security
4. Understanding Security Governance
5. Risk Management
6. IT Risk Assessment
Part III Cryptography
7. Understanding Cryptography
8. Cryptographic Methods
9. Application of Cryptographic Methods
10. Public Key Infrastructure
Part IV Authentication and Authorization
11. Understanding Identification and Authentication
12. Understanding Authorization
13. Authentication Methods and Services
14. User Account Management
Part V Host Security
15. Host Threats
16. Host Software Hardening
17. Host Network Service Hardening
18. Storage Security
19. Static Hosts
Part VI LAN Security
20. LAN Review
21. Network Threats
22. Network Hardening
23. Network Monitoring
Part VII Application Security
24. Host Application Threats
25. Web Application Threats
26. Application Hardening
27. Internet Service Hardening
28. Virtualization Security
Part VIII Wireless Security
29. Wireless Threats
30. Wireless Hardening
Part IX Physical Security
31. Environmental Security and Controls
32. Perimeter and Physical Controls
Part X Outside Security
33. Third-party Security
34. Cloud Computing
35. Mobile Security
Part XI People Security
36. Social Engineering
37. Security Training
Part XII Proactive Security
38. Security Assessment
39. Incident Response
40. Forensics
41. Business Continuity
42. Disaster Recovery

We also recommend books

Strony www Białystok Warszawa
801 777 223