9780789759009

CompTIA Security+ SY0-501 Exam Cram

by ;
  • ISBN13:

    9780789759009

  • ISBN10:

    0789759004

  • Edition: 5th
  • Format: Paperback
  • Copyright: 2017-12-26
  • Publisher: Pearson IT Certification
  • Purchase Benefits
  • Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
  • We Buy This Book Back!
    In-Store Credit: $3.15
    Check/Direct Deposit: $3.00
    PayPal: $3.00
List Price: $44.99 Save up to $6.75
  • Buy New
    $38.24
    Add to Cart Free Shipping

    THIS ITEM IS TEMPORARILY UNAVAILABLE FROM THE PUBLISHER, BUT IS EXPECTED IN SOON. PLACE YOUR ORDER NOW AND WE WILL SHIP IT AS SOON AS IT ARRIVES.

Supplemental Materials

What is included with this book?

  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
  • The eBook copy of this book is not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Summary

CompTIA Security+ SY0-501 Exam Cram , Fifth Edition, is the perfect study guide to help you pass CompTIA’s newly updated version of the Security+ exam. It provides coverage and practice questions for every exam topic. The book contains a set of 150 questions. The powerful Pearson Test Prep practice test software provides real-time practice and feedback with all the questions so you can simulate the exam.


Covers the critical information you need to know to score higher on your Security+ exam!

·         Analyze indicators of compromise and determine types of attacks, threats, and risks to systems

·         Minimize the impact associated with types of attacks and vulnerabilities

·         Secure devices, communications, and network infrastructure

·         Effectively manage risks associated with a global business environment

·         Differentiate between control methods used to secure the physical domain

·         Identify solutions for the implementation of secure network architecture

·         Compare techniques for secure application development and deployment

·         Determine relevant identity and access management procedures

·         Implement security policies, plans, and procedures related to organizational security

·         Apply principles of cryptography and effectively deploy related solutions

 

Author Biography

Diane Barrett is the president of NextGard Technology and an associate professor at Bloomsburg University. She has done contract forensic and security assessment work for several years and has authored several other security and forensic books. She is a program director for ADFSL’s Conference on Digital Forensics, Security, and Law; the president of the Digital Forensic Certification Board; and a volunteer on the National CyberWatch Center’s Curriculum Standards Panel for Information Security Fundamentals. She holds many industry certifications, including CISSP, ISSMP, DFCP, and PCME, and also has several from CompTIA, including Security+. Diane’s education includes a Ph.D. in business administration with a specialization in information security, and a master of science degree in information technology, with a specialization in information security.


Marty M. Weiss has spent most of his career in information security, risk management, and compliance, helping large organizations. Marty holds a bachelor of science degree in computer studies from the University of Maryland University College and an MBA from the Isenberg School of Management at the University of Massachusetts Amherst. He holds several certifications, including CISSP, CISA, and Security+. Marty has authored and coauthored more than a half-dozen books on information technology, many that have been described as riveting and Dostoevsky-esque in reviews by his mother. In the little free time he has left, Marty occasionally molds minds as an adjunct professor with the University of Maryland University College. A Florida native, he now lives in New England somewhere between Boston and New York City.

Table of Contents

Part 1 - Threats, Attacks and Vulnerabilities
Chapter 1 – Attacks
Chapter 2 – Vulnerabilities and Deterrents

Part 2 – Technologies and Tools
Chapter 3 – Security Technologies
Chapter 4 – Security Tools

Part 3 - Architecture and Design
Chapter 5 – Secure Design
Chapter 6 – Security Architecture

Part 4 – Identity and Access Management
Chapter 7 – Identity and Access Management Concepts
Chapter 8 – Identity and Access Management Implementation

Part 5 – Risk Management
Chapter 9 – Risk Management Concepts
Chapter 10 – Risk Management Practices

Part 6 - Cryptography and PKI
Chapter 11 – Cryptography Tools and Techniques
Chapter 12 – Public Key Infrastructure

Rewards Program

Write a Review