did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780735664265

CompTIA Security+ Training Kit (Exam SY0-301)

by ; ;
  • ISBN13:

    9780735664265

  • ISBN10:

    0735664269

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2013-09-15
  • Publisher: Microsoft Press
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $49.99

Summary

Ace your preparation for CompTIA Security+ Exam SY0-301 with this 2-in-1 Training Kit from Microsoft Press®. Work at your own pace through a series of lessons and practical exercises, and then assess your skills with the online practice test-featuring multiple, customizable testing options to meet your specific needs. Maximize your performance on the exam by learning to: Network Security Compliance and Operational Security Threats and Vulnerabilities Application, Data, and Host Security Access Control and Identity Management Cryptography

Author Biography

David Seidl serves as the Director of Information Security for Notre Dame in the Office of Information Technology. He bears broad responsibility for the information security on campus, and leads a team of six information security professionals. David has been a security professional for over 10 years, and has over 17 years of IT experience. He has a wide range of IT and Information Security experience ranging from system design to firewall and network security device administration, incident response and risk assessment.

Table of Contents

  • Introduction
  • Chapter 1: Risk management and incident response
  • Chapter 2: Network security technologies
  • Chapter 3: Secure network design and management
  • Chapter 4: Operational and environmental security
  • Chapter 5: Threats and attacks
  • Chapter 6: Monitoring, detection, and defense
  • Chapter 7: Vulnerability assessment and management
  • Chapter 8: The importance of application security
  • Chapter 9: Establishing host security
  • Chapter 10: Understanding data security
  • Chapter 11: Identity and access control
  • Chapter 12: Cryptography
  • Glossary
  • About the authors

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program