9781260019322

CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501)

by ; ; ; ;
  • ISBN13:

    9781260019322

  • ISBN10:

    1260019322

  • Edition: 5th
  • Format: Package
  • Copyright: 2018-01-08
  • Publisher: McGraw-Hill Education

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
  • We Buy This Book Back!
    In-Store Credit: $7.35
    Check/Direct Deposit: $7.00
    PayPal: $7.00
List Price: $60.00 Save up to $9.00
  • Rent Book $54.00
    Add to Cart Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 3-4 BUSINESS DAYS

Supplemental Materials

What is included with this book?

  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
  • The Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Table of Contents

Part 1: Threats, Attacks and Vulnerabilities
Chapter 1: Malware and indicators of compromise
Chapter 2: Types of attacks
Chapter 3: Threats
Chapter 4: Vulnerability scanning and penetration testing
Chapter 5: Vulnerabilities and Impacts

Part 2: Technologies and Tools
Chapter 6: Network components
Chapter 7: Security tools and technologies
Chapter 8: Troubleshoot common security issues
Chapter 9: Deploy mobile devices securely
Chapter 10: Implementing secure protocols

Part 3: Architecture and Design
Chapter 11: Architecture frameworks and secure network architectures
Chapter 12: Secure systems design and deployment
Chapter 13: Embedded systems
Chapter 14: Application development and deployment
Chapter 15: Cloud and virtualization
Chapter 16: Resiliency and Automation strategies
Chapter 17: Physical security controls

Part 4: Identity and Access Management
Chapter 18: Identity, access and accounts
Chapter 19: Identity and access services
Chapter 20: Identity and access management controls

Part 5: Risk Management
Chapter 21: Policies, plans and procedures
Chapter 22: Risk management and business impact analysis concepts
Chapter 23: Incident response, disaster recovery and continuity of operation
Chapter 24: Digital forensics
Chapter 25: Compare and contrast various types of controls
Chapter 26: Data security and privacy practices

Part 6: Cryptography and PKI
Chapter 27: Basic concepts of cryptography
Chapter 28: Cryptography algorithms
Chapter 29: Wireless security
Chapter 30: Public key infrastructure

Part 7: Apendices
Appendix A: OSI Model and Internet Protocols
Appendix B: About the CD
Glossary

Rewards Program

Write a Review