|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
OR_on1226761404 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
201215s2021 nyua o 001 0 eng d |
040 |
|
|
|a YDX
|b eng
|e rda
|c YDX
|d N$T
|d OCLCO
|d OCLCF
|d YDX
|d PIF
|d OCLCO
|d VT2
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 1262684551
|
020 |
|
|
|a 1260467961
|q (electronic bk.)
|
020 |
|
|
|a 9781260467963
|q (electronic bk.)
|
020 |
|
|
|z 9781260467956
|q (paperback)
|
020 |
|
|
|z 1260467953
|q (paperback)
|
029 |
1 |
|
|a AU@
|b 000069670385
|
035 |
|
|
|a (OCoLC)1226761404
|z (OCoLC)1262684551
|
050 |
|
4 |
|a QA76.9.A25
|b D86 2021
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Dunkerley, Dawn,
|e author.
|
245 |
1 |
0 |
|a Mike Meyers' CompTIA Security+ Certification Passport (Exam SY0-601) /
|c Dawn Dunkerley.
|
264 |
|
1 |
|a New York :
|b McGraw-Hill Education,
|c [2021].
|
264 |
|
4 |
|c ©2021
|
300 |
|
|
|a 1 online resource (xxvi, 470 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Includes index.
|
505 |
0 |
|
|a Cover -- About the Author -- Title Page -- Copyright Page -- Dedication -- Contents at a Glance -- Contents -- Acknowledgments -- Introduction -- 1.0 Threats, Attacks, and Vulnerabilities -- Objective 1.1 Compare and contrast different types of social engineering techniques -- Objective 1.2 Given a scenario, analyze potential indicators to determine the type of attack -- Objective 1.3 Given a scenario, analyze potential indicators associated with application attacks -- Objective 1.4 Given a scenario, analyze potential indicators associated with network attacks -- Objective 1.5 Explain different threat actors, vectors, and intelligence sources -- Objective 1.6 Explain the security concerns associated with various types of vulnerabilities -- Objective 1.7 Summarize the techniques used in security assessments -- Objective 1.8 Explain the techniques used in penetration testing -- 5.0 Governance, Risk, and Compliance -- Objective 5.1 Compare and contrast various types of controls -- Objective 5.2 Explain the importance of applicable regulations, standards, or frameworks that impact organizational security posture -- Objective 5.3 Explain the importance of policies to organizational security -- Objective 5.4 Summarize risk management processes and concepts -- Objective 5.5 Explain privacy and sensitive data concepts in relation to security -- 2.0 Architecture and Design.
|
505 |
0 |
|
|a Objective 2.1 Explain the importance of security concepts in an enterprise environment -- Objective 2.2 Summarize virtualization and cloud computing concepts -- Objective 2.3 Summarize secure application development, deployment, and automation concepts -- Objective 2.4 Summarize authentication and authorization design concepts -- Objective 2.5 Given a scenario, implement cybersecurity resilience -- Objective 2.6 Explain the security implications of embedded and specialized systems -- Objective 2.7 Explain the importance of physical security controls -- Objective 2.8 Summarize the basics of cryptographic concepts -- 3.0 Implementation -- Objective 3.1 Given a scenario, implement secure protocols -- Objective 3.2 Given a scenario, implement host or application security solutions -- Objective 3.3 Given a scenario, implement secure network designs -- Objective 3.4 Given a scenario, install and configure wireless security settings -- Objective 3.5 Given a scenario, implement secure mobile solutions -- Objective 3.6 Given a scenario, apply cybersecurity solutions to the cloud -- Objective 3.7 Given a scenario, implement identity and account management controls -- Objective 3.8 Given a scenario, implement authentication and authorization solutions -- Objective 3.9 Given a scenario, implement public key infrastructure -- 4.0 Operations and Incident Response -- Objective 4.1 Given a scenario, use the appropriate tool to assess organizational security -- Objective 4.2 Summarize the importance of policies, processes, and procedures for incident response -- Objective 4.3 Given an incident, utilize appropriate data sources to support an investigation -- Objective 4.4 Given an incident, apply mitigation techniques or controls to secure an environment -- Objective 4.5 Explain the key aspects of digital forensics -- A About the Online Content -- System Requirements -- Your Total Seminars Training Hub Account -- Single User License Terms and Conditions -- TotalTester Online -- Technical Support -- Index.
|
520 |
|
|
|a Inside this study guide, you'll find practice questions and content review, exam tips, updated information on real-world cyberattacks, and enhanced coverage of emerging topics.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security
|x Examinations
|v Study guides.
|
650 |
|
0 |
|a Computer networks
|x Security measures
|x Examinations
|v Study guides.
|
650 |
|
0 |
|a Computer technicians
|x Certification
|v Study guides.
|
650 |
|
0 |
|a Electronic data processing personnel
|x Certification
|v Study guides.
|
650 |
|
6 |
|a Sécurité informatique
|x Examens
|v Guides de l'étudiant.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures
|x Examens
|v Guides de l'étudiant.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|x Examinations.
|2 fast
|0 (OCoLC)fst00872343
|
650 |
|
7 |
|a Computer security
|x Examinations.
|2 fast
|0 (OCoLC)fst00872489
|
650 |
|
7 |
|a Computer technicians
|x Certification.
|2 fast
|0 (OCoLC)fst00872659
|
650 |
|
7 |
|a Electronic data processing personnel
|x Certification.
|2 fast
|0 (OCoLC)fst00907100
|
655 |
|
7 |
|a Study guides.
|2 fast
|0 (OCoLC)fst01423888
|
700 |
1 |
|
|a Meyers, Mike,
|d 1961-
|e author.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781260467963/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 17153719
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2706057
|
994 |
|
|
|a 92
|b IZTAP
|