ABE-IPSABE HOLDINGABE BOOKS
English Polski
On-line access

Bookstore

0.00 PLN
Bookshelf (0) 
Your bookshelf is empty
CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)

CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)

Authors
Publisher McGraw-Hill Education
Year 24/05/2021
Pages 784
Version paperback
Readership level General/trade
Language English
ISBN 9781260464009
Categories Computer certification: CompTia
$54.80 (with VAT)
243.60 PLN / €52.23 / £45.34
Qty:
Delivery to Argentina

check shipping prices
Product to order
Delivery 3-4 weeks
Add to bookshelf

Book description

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

This fully updated study guide covers every topic on the current version of the CompTIA Security+ exam

Get complete coverage of all objectives included on the CompTIA Security+ exam SY0-601 from this comprehensive resource. Written by a team of leading information security experts, this authoritative guide fully addresses the skills required to perform essential security functions and to secure hardware, systems, and software. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference.

Covers all exam domains, including:




Threats, Attacks, and Vulnerabilities
Architecture and Design
Implementation
Operations and Incident Response
Governance, Risk, and Compliance





Online content includes:




250 practice exam questions
Test engine that provides full-length practice exams and customizable quizzes by chapter or by exam domain

CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)

Table of contents

Part I Threats, Attacks, and Vulnerabilities

Chapter 1 Social Engineering Techniques

Chapter 2 Types of Attack Indicators

Chapter 3 Application Attack Indicators

Chapter 4 Network Attack Indicators

Chapter 5 Threat Actors, Vectors, and Intelligence Sources

Chapter 6 Vulnerabilities

Chapter 7 Security Assessments

Chapter 8 Penetration Testing

Part II Architecture and Design

Chapter 9 Enterprise Architecture

Chapter 10 Virtualization and Cloud Security

Chapter 11 Secure App Development, Deployment, and Automation Scripts

Chapter 12 Authentication and Authorization

Chapter 13 Cybersecurity Resilience

Chapter 14 Embedded and Specialized Systems

Chapter 15 Physical Security

Chapter 16 Cryptographic Concepts

Part III Implementation

Chapter 17 Secure Protocols

Chapter 18 Host and Application Security

Chapter 19 Secure Network Design

Chapter 20 Wireless Security

Chapter 21 Secure Mobile Solutions

Chapter 22 Implementing Cloud Security

Chapter 23 Identity and Account Management Controls

Chapter 24 Implementing Authentication and Authorization

Chapter 25 Public Key Infrastructure

Part IV Operations and Incident Response

Chapter 26 Tools/Assess Organizational Security

Chapter 27 Incident Response Policies and Procedures

Chapter 28 Investigations

Chapter 29 Mitigation Techniques and Controls

Chapter 30 Digital Forensics

Part V Governance, Risk, and Compliance

Chapter 31 Security Controls

Chapter 32 Regulations, Standards, and Frameworks

Chapter 33 Organizational Policies

Chapter 34 Risk Management

Chapter 35 Privacy
Strony www Białystok Warszawa
801 777 223