Cargando…

CompTIA Security+ Certification SY0-601 : the Total Course /

Your guide to prepare and clear the CompTIA Security+ Certification SY0-601 exam. About This Video Understand the various risk management concepts Learn the various cryptographic methods used to protect the critical keys in cryptography Understand the Diffie-Hellman key exchange agreement and method...

Descripción completa

Detalles Bibliográficos
Autores principales: Seminars, Total (Autor), Meyers, Mike (Autor), Lachance, Daniel (Autor)
Autor Corporativo: Safari, an O'Reilly Media Company
Formato: Electrónico Video
Idioma:Inglés
Publicado: Packt Publishing, 2021.
Edición:1st edition.
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a22000007a 4500
001 OR_on1268279555
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cnu||||||||
007 vz czazuu
008 120821s2021 xx --- o vleng d
040 |a AU@  |b eng  |c AU@  |d NZCPL  |d OCLCF  |d OCLCO  |d OCLCQ 
019 |a 1277195676  |a 1305851228 
020 |z 9781803231853 
024 8 |a 9781803231853 
029 0 |a AU@  |b 000069849383 
035 |a (OCoLC)1268279555  |z (OCoLC)1277195676  |z (OCoLC)1305851228 
049 |a UAMI 
100 1 |a Seminars, Total,  |e author. 
245 1 0 |a CompTIA Security+ Certification SY0-601 :  |b the Total Course /  |c Seminars, Total. 
250 |a 1st edition. 
264 1 |b Packt Publishing,  |c 2021. 
300 |a 1 online resource (1 video file, approximately 17 hr., 23 min.) 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a video file 
520 |a Your guide to prepare and clear the CompTIA Security+ Certification SY0-601 exam. About This Video Understand the various risk management concepts Learn the various cryptographic methods used to protect the critical keys in cryptography Understand the Diffie-Hellman key exchange agreement and methods In Detail Excel the CompTIA Security+ Certification SY0-601 exam by taking this course, which deep dives into the various concepts of risk management and various kinds of risk involved, and the various security standards such as PCI DSS and the Cloud Controls Matrix (CCM) define what types of security controls to put in place to mitigate risk both on-premises and in the cloud. Learn about data protection and the various cryptographic methods used to protect the critical keys in cryptography that keep communication secure. The course also reviews different types of certificates including web, email, code-signing, machine/computer, and user. Explore the 3 As--authentication, authorization, and accounting/auditing, which play a big role in IT security. Tracking activity through auditing provides accountability for access to resources such as files on a file server or database rows. Learn about securing dedicated systems using IoT. IoT devices are function-specific and can communicate over the Internet. Examples include environmental control devices, medical devices, and video surveillance systems. This episode also covers the Zigbee smart home automation protocol. Wrap up the course by understanding data backup; backing up data provides availability in the event of data deletion, corruption, or encryption through ransomware. This episode discusses backup settings such as compression and encryption, as well as full, differential, and incremental backup types. 
542 |f Packt Publishing  |g 2021 
550 |a Made available through: Safari, an O'Reilly Media Company. 
588 |a Online resource; Title from title screen (viewed July 30, 2021) 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
700 1 |a Meyers, Mike,  |e author. 
700 1 |a Lachance, Daniel,  |e author. 
710 2 |a Safari, an O'Reilly Media Company. 
856 4 0 |u https://learning.oreilly.com/videos/~/9781803231853/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
936 |a BATCHLOAD 
994 |a 92  |b IZTAP