9780735664265

CompTIA Security+ Training Kit (Exam SY0-301)

by ; ;
  • ISBN13:

    9780735664265

  • ISBN10:

    0735664269

  • Edition: 1st
  • Format: Paperback
  • Copyright: 9/15/2013
  • Publisher: Microsoft Press
  • Purchase Benefits
  • Free Shipping On Orders Over $59!
    Your order must be $59 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $49.99

Summary

Ace your preparation for CompTIA Security+ Exam SY0-301 with this 2-in-1 Training Kit from Microsoft Press®. Work at your own pace through a series of lessons and practical exercises, and then assess your skills with the online practice test-featuring multiple, customizable testing options to meet your specific needs. Maximize your performance on the exam by learning to: Network Security Compliance and Operational Security Threats and Vulnerabilities Application, Data, and Host Security Access Control and Identity Management Cryptography

Author Biography

David Seidl serves as the Director of Information Security for Notre Dame in the Office of Information Technology. He bears broad responsibility for the information security on campus, and leads a team of six information security professionals. David has been a security professional for over 10 years, and has over 17 years of IT experience. He has a wide range of IT and Information Security experience ranging from system design to firewall and network security device administration, incident response and risk assessment.

Table of Contents

  • Introduction
  • Chapter 1: Risk management and incident response
  • Chapter 2: Network security technologies
  • Chapter 3: Secure network design and management
  • Chapter 4: Operational and environmental security
  • Chapter 5: Threats and attacks
  • Chapter 6: Monitoring, detection, and defense
  • Chapter 7: Vulnerability assessment and management
  • Chapter 8: The importance of application security
  • Chapter 9: Establishing host security
  • Chapter 10: Understanding data security
  • Chapter 11: Identity and access control
  • Chapter 12: Cryptography
  • Glossary
  • About the authors

Rewards Program

Write a Review