Mike Meyers' CompTIA Security+ Certification Passport (Exam SY0-601) /
Inside this study guide, you'll find practice questions and content review, exam tips, updated information on real-world cyberattacks, and enhanced coverage of emerging topics.
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
New York :
McGraw-Hill Education,
[2021].
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Cover
- About the Author
- Title Page
- Copyright Page
- Dedication
- Contents at a Glance
- Contents
- Acknowledgments
- Introduction
- 1.0 Threats, Attacks, and Vulnerabilities
- Objective 1.1 Compare and contrast different types of social engineering techniques
- Objective 1.2 Given a scenario, analyze potential indicators to determine the type of attack
- Objective 1.3 Given a scenario, analyze potential indicators associated with application attacks
- Objective 1.4 Given a scenario, analyze potential indicators associated with network attacks
- Objective 1.5 Explain different threat actors, vectors, and intelligence sources
- Objective 1.6 Explain the security concerns associated with various types of vulnerabilities
- Objective 1.7 Summarize the techniques used in security assessments
- Objective 1.8 Explain the techniques used in penetration testing
- 5.0 Governance, Risk, and Compliance
- Objective 5.1 Compare and contrast various types of controls
- Objective 5.2 Explain the importance of applicable regulations, standards, or frameworks that impact organizational security posture
- Objective 5.3 Explain the importance of policies to organizational security
- Objective 5.4 Summarize risk management processes and concepts
- Objective 5.5 Explain privacy and sensitive data concepts in relation to security
- 2.0 Architecture and Design.
- Objective 2.1 Explain the importance of security concepts in an enterprise environment
- Objective 2.2 Summarize virtualization and cloud computing concepts
- Objective 2.3 Summarize secure application development, deployment, and automation concepts
- Objective 2.4 Summarize authentication and authorization design concepts
- Objective 2.5 Given a scenario, implement cybersecurity resilience
- Objective 2.6 Explain the security implications of embedded and specialized systems
- Objective 2.7 Explain the importance of physical security controls
- Objective 2.8 Summarize the basics of cryptographic concepts
- 3.0 Implementation
- Objective 3.1 Given a scenario, implement secure protocols
- Objective 3.2 Given a scenario, implement host or application security solutions
- Objective 3.3 Given a scenario, implement secure network designs
- Objective 3.4 Given a scenario, install and configure wireless security settings
- Objective 3.5 Given a scenario, implement secure mobile solutions
- Objective 3.6 Given a scenario, apply cybersecurity solutions to the cloud
- Objective 3.7 Given a scenario, implement identity and account management controls
- Objective 3.8 Given a scenario, implement authentication and authorization solutions
- Objective 3.9 Given a scenario, implement public key infrastructure
- 4.0 Operations and Incident Response
- Objective 4.1 Given a scenario, use the appropriate tool to assess organizational security
- Objective 4.2 Summarize the importance of policies, processes, and procedures for incident response
- Objective 4.3 Given an incident, utilize appropriate data sources to support an investigation
- Objective 4.4 Given an incident, apply mitigation techniques or controls to secure an environment
- Objective 4.5 Explain the key aspects of digital forensics
- A About the Online Content
- System Requirements
- Your Total Seminars Training Hub Account
- Single User License Terms and Conditions
- TotalTester Online
- Technical Support
- Index.