9781260019322

CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501)

by ; ; ; ;
  • ISBN13:

    9781260019322

  • ISBN10:

    1260019322

  • Edition: 5th
  • Format: Package
  • Copyright: 2018-01-08
  • Publisher: McGraw-Hill Education

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
  • We Buy This Book Back!
    In-Store Credit: $8.93
    Check/Direct Deposit: $8.50
    PayPal: $8.50
List Price: $48.60 Save up to $14.58
  • Rent Book $34.02
    Add to Cart Free Shipping

    TERM
    PRICE
    DUE
    IN STOCK USUALLY SHIPS IN 24 HOURS

Supplemental Materials

What is included with this book?

Table of Contents

Part 1: Threats, Attacks and Vulnerabilities
Chapter 1: Malware and indicators of compromise
Chapter 2: Types of attacks
Chapter 3: Threats
Chapter 4: Vulnerability scanning and penetration testing
Chapter 5: Vulnerabilities and Impacts

Part 2: Technologies and Tools
Chapter 6: Network components
Chapter 7: Security tools and technologies
Chapter 8: Troubleshoot common security issues
Chapter 9: Deploy mobile devices securely
Chapter 10: Implementing secure protocols

Part 3: Architecture and Design
Chapter 11: Architecture frameworks and secure network architectures
Chapter 12: Secure systems design and deployment
Chapter 13: Embedded systems
Chapter 14: Application development and deployment
Chapter 15: Cloud and virtualization
Chapter 16: Resiliency and Automation strategies
Chapter 17: Physical security controls

Part 4: Identity and Access Management
Chapter 18: Identity, access and accounts
Chapter 19: Identity and access services
Chapter 20: Identity and access management controls

Part 5: Risk Management
Chapter 21: Policies, plans and procedures
Chapter 22: Risk management and business impact analysis concepts
Chapter 23: Incident response, disaster recovery and continuity of operation
Chapter 24: Digital forensics
Chapter 25: Compare and contrast various types of controls
Chapter 26: Data security and privacy practices

Part 6: Cryptography and PKI
Chapter 27: Basic concepts of cryptography
Chapter 28: Cryptography algorithms
Chapter 29: Wireless security
Chapter 30: Public key infrastructure

Part 7: Apendices
Appendix A: OSI Model and Internet Protocols
Appendix B: About the CD
Glossary

Rewards Program

Write a Review