Cargando…

Mike Meyers' CompTIA Security+ Certification Passport (Exam SY0-601) /

Inside this study guide, you'll find practice questions and content review, exam tips, updated information on real-world cyberattacks, and enhanced coverage of emerging topics.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Dunkerley, Dawn (Autor), Meyers, Mike, 1961- (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : McGraw-Hill Education, [2021].
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Mi 4500
001 OR_on1226761404
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 201215s2021 nyua o 001 0 eng d
040 |a YDX  |b eng  |e rda  |c YDX  |d N$T  |d OCLCO  |d OCLCF  |d YDX  |d PIF  |d OCLCO  |d VT2  |d OCLCO  |d OCLCQ 
019 |a 1262684551 
020 |a 1260467961  |q (electronic bk.) 
020 |a 9781260467963  |q (electronic bk.) 
020 |z 9781260467956  |q (paperback) 
020 |z 1260467953  |q (paperback) 
029 1 |a AU@  |b 000069670385 
035 |a (OCoLC)1226761404  |z (OCoLC)1262684551 
050 4 |a QA76.9.A25  |b D86 2021 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Dunkerley, Dawn,  |e author. 
245 1 0 |a Mike Meyers' CompTIA Security+ Certification Passport (Exam SY0-601) /  |c Dawn Dunkerley. 
264 1 |a New York :  |b McGraw-Hill Education,  |c [2021]. 
264 4 |c ©2021 
300 |a 1 online resource (xxvi, 470 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Includes index. 
505 0 |a Cover -- About the Author -- Title Page -- Copyright Page -- Dedication -- Contents at a Glance -- Contents -- Acknowledgments -- Introduction -- 1.0 Threats, Attacks, and Vulnerabilities -- Objective 1.1 Compare and contrast different types of social engineering techniques -- Objective 1.2 Given a scenario, analyze potential indicators to determine the type of attack -- Objective 1.3 Given a scenario, analyze potential indicators associated with application attacks -- Objective 1.4 Given a scenario, analyze potential indicators associated with network attacks -- Objective 1.5 Explain different threat actors, vectors, and intelligence sources -- Objective 1.6 Explain the security concerns associated with various types of vulnerabilities -- Objective 1.7 Summarize the techniques used in security assessments -- Objective 1.8 Explain the techniques used in penetration testing -- 5.0 Governance, Risk, and Compliance -- Objective 5.1 Compare and contrast various types of controls -- Objective 5.2 Explain the importance of applicable regulations, standards, or frameworks that impact organizational security posture -- Objective 5.3 Explain the importance of policies to organizational security -- Objective 5.4 Summarize risk management processes and concepts -- Objective 5.5 Explain privacy and sensitive data concepts in relation to security -- 2.0 Architecture and Design. 
505 0 |a Objective 2.1 Explain the importance of security concepts in an enterprise environment -- Objective 2.2 Summarize virtualization and cloud computing concepts -- Objective 2.3 Summarize secure application development, deployment, and automation concepts -- Objective 2.4 Summarize authentication and authorization design concepts -- Objective 2.5 Given a scenario, implement cybersecurity resilience -- Objective 2.6 Explain the security implications of embedded and specialized systems -- Objective 2.7 Explain the importance of physical security controls -- Objective 2.8 Summarize the basics of cryptographic concepts -- 3.0 Implementation -- Objective 3.1 Given a scenario, implement secure protocols -- Objective 3.2 Given a scenario, implement host or application security solutions -- Objective 3.3 Given a scenario, implement secure network designs -- Objective 3.4 Given a scenario, install and configure wireless security settings -- Objective 3.5 Given a scenario, implement secure mobile solutions -- Objective 3.6 Given a scenario, apply cybersecurity solutions to the cloud -- Objective 3.7 Given a scenario, implement identity and account management controls -- Objective 3.8 Given a scenario, implement authentication and authorization solutions -- Objective 3.9 Given a scenario, implement public key infrastructure -- 4.0 Operations and Incident Response -- Objective 4.1 Given a scenario, use the appropriate tool to assess organizational security -- Objective 4.2 Summarize the importance of policies, processes, and procedures for incident response -- Objective 4.3 Given an incident, utilize appropriate data sources to support an investigation -- Objective 4.4 Given an incident, apply mitigation techniques or controls to secure an environment -- Objective 4.5 Explain the key aspects of digital forensics -- A About the Online Content -- System Requirements -- Your Total Seminars Training Hub Account -- Single User License Terms and Conditions -- TotalTester Online -- Technical Support -- Index. 
520 |a Inside this study guide, you'll find practice questions and content review, exam tips, updated information on real-world cyberattacks, and enhanced coverage of emerging topics. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security  |x Examinations  |v Study guides. 
650 0 |a Computer networks  |x Security measures  |x Examinations  |v Study guides. 
650 0 |a Computer technicians  |x Certification  |v Study guides. 
650 0 |a Electronic data processing personnel  |x Certification  |v Study guides. 
650 6 |a Sécurité informatique  |x Examens  |v Guides de l'étudiant. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |x Examens  |v Guides de l'étudiant. 
650 7 |a Computer networks  |x Security measures  |x Examinations.  |2 fast  |0 (OCoLC)fst00872343 
650 7 |a Computer security  |x Examinations.  |2 fast  |0 (OCoLC)fst00872489 
650 7 |a Computer technicians  |x Certification.  |2 fast  |0 (OCoLC)fst00872659 
650 7 |a Electronic data processing personnel  |x Certification.  |2 fast  |0 (OCoLC)fst00907100 
655 7 |a Study guides.  |2 fast  |0 (OCoLC)fst01423888 
700 1 |a Meyers, Mike,  |d 1961-  |e author. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781260467963/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a YBP Library Services  |b YANK  |n 17153719 
938 |a EBSCOhost  |b EBSC  |n 2706057 
994 |a 92  |b IZTAP