CompTIA Security+ Certification All-in-One Exam Guide, Premium Fourth Edition with Online Practice Labs (Exam SY0-401)

by ; ; ; ;
  • ISBN13:


  • ISBN10:


  • Edition: 4th
  • Format: Package
  • Copyright: 2016-12-29
  • Publisher: McGraw-Hill Education

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $199.00 Save up to $50.42
  • Rent Book $149.25
    Add to Cart Free Shipping


Supplemental Materials

What is included with this book?

  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
  • The Rental copy of this book is not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Table of Contents

Part I: Network Security
Chapter 1: Network Device Configuration
Chapter 2: Secure Network Administration
Chapter 3: Secure Network Design
Chapter 4: Secure Wireless Networking

Part II: Compliance and Operational Security
Chapter 5: Risk Concepts
Chapter 6: System Integration Processes
Chapter 7: Risk Management
Chapter 8: Digital Forensics and Incident Response
Chapter 9: Security Awareness and Training
Chapter 10: Physical Security and Environmental Controls
Chapter 11: Security Controls

Part III: Threats and Vulnerabilities
Chapter 12: Attacks and Malware
Chapter 13: Social Engineering
Chapter 14: Application and Wireless Attacks
Chapter 15: Mitigation Techniques
Chapter 16: Threat and Vulnerability Discovery

Part IV: Application, Data, and Host Security
Chapter 17: Application Security Controls
Chapter 18: Mobile Device Security
Chapter 19: Host-based Security
Chapter 20: Securing Alternative Environments

Part V: Access Control and Identity Management
Chapter 21: Access Control and Identity Management
Chapter 22: Account Management

Part VI: Cryptography
Chapter 23: Cryptographic Concepts
Chapter 24: Cryptographic Methods
Appendix A: OSI Model and Internet Protocols

Rewards Program

Write a Review