Cargando…

Mike Meyers' CompTIA Security+ Certification Passport (Exam SY0-601) /

Inside this study guide, you'll find practice questions and content review, exam tips, updated information on real-world cyberattacks, and enhanced coverage of emerging topics.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Dunkerley, Dawn (Autor), Meyers, Mike, 1961- (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : McGraw-Hill Education, [2021].
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Cover
  • About the Author
  • Title Page
  • Copyright Page
  • Dedication
  • Contents at a Glance
  • Contents
  • Acknowledgments
  • Introduction
  • 1.0 Threats, Attacks, and Vulnerabilities
  • Objective 1.1 Compare and contrast different types of social engineering techniques
  • Objective 1.2 Given a scenario, analyze potential indicators to determine the type of attack
  • Objective 1.3 Given a scenario, analyze potential indicators associated with application attacks
  • Objective 1.4 Given a scenario, analyze potential indicators associated with network attacks
  • Objective 1.5 Explain different threat actors, vectors, and intelligence sources
  • Objective 1.6 Explain the security concerns associated with various types of vulnerabilities
  • Objective 1.7 Summarize the techniques used in security assessments
  • Objective 1.8 Explain the techniques used in penetration testing
  • 5.0 Governance, Risk, and Compliance
  • Objective 5.1 Compare and contrast various types of controls
  • Objective 5.2 Explain the importance of applicable regulations, standards, or frameworks that impact organizational security posture
  • Objective 5.3 Explain the importance of policies to organizational security
  • Objective 5.4 Summarize risk management processes and concepts
  • Objective 5.5 Explain privacy and sensitive data concepts in relation to security
  • 2.0 Architecture and Design.
  • Objective 2.1 Explain the importance of security concepts in an enterprise environment
  • Objective 2.2 Summarize virtualization and cloud computing concepts
  • Objective 2.3 Summarize secure application development, deployment, and automation concepts
  • Objective 2.4 Summarize authentication and authorization design concepts
  • Objective 2.5 Given a scenario, implement cybersecurity resilience
  • Objective 2.6 Explain the security implications of embedded and specialized systems
  • Objective 2.7 Explain the importance of physical security controls
  • Objective 2.8 Summarize the basics of cryptographic concepts
  • 3.0 Implementation
  • Objective 3.1 Given a scenario, implement secure protocols
  • Objective 3.2 Given a scenario, implement host or application security solutions
  • Objective 3.3 Given a scenario, implement secure network designs
  • Objective 3.4 Given a scenario, install and configure wireless security settings
  • Objective 3.5 Given a scenario, implement secure mobile solutions
  • Objective 3.6 Given a scenario, apply cybersecurity solutions to the cloud
  • Objective 3.7 Given a scenario, implement identity and account management controls
  • Objective 3.8 Given a scenario, implement authentication and authorization solutions
  • Objective 3.9 Given a scenario, implement public key infrastructure
  • 4.0 Operations and Incident Response
  • Objective 4.1 Given a scenario, use the appropriate tool to assess organizational security
  • Objective 4.2 Summarize the importance of policies, processes, and procedures for incident response
  • Objective 4.3 Given an incident, utilize appropriate data sources to support an investigation
  • Objective 4.4 Given an incident, apply mitigation techniques or controls to secure an environment
  • Objective 4.5 Explain the key aspects of digital forensics
  • A About the Online Content
  • System Requirements
  • Your Total Seminars Training Hub Account
  • Single User License Terms and Conditions
  • TotalTester Online
  • Technical Support
  • Index.