The preparation you need for the new CompTIA Security+ exam SY0-301
This top-selling study guide helps candidates prepare for exam SY0-301 and certification as a CompTIA Security+ administrator. Inside the new, CompTIA Authorized edition, you'll find complete coverage of all Security+ exam objectives, loads of real-world examples, and a CD packed with cutting-edge exam prep tools. The book covers key exam topics such as general security concepts, infrastructure security, the basics of cryptography, and much more.
* Provides 100% coverage of all exam objectives for the new CompTIA Security+ exam SY0-301 including:
* Network security
* Compliance and operational security
* Threats and vulnerabilities
* Application, data and host security
* Access control and identity management
* Cryptography
* Covers key topics such as general security concepts, communication and infrastructure security, the basics of cryptography, operational security, and more
* Offers practical examples and insights drawn from the real world
* Includes a CD with two practice exams, all chapter review questions, electronic flashcards, and more
Obtain your Security+ certification and jump-start your career. It's possible with the kind of thorough preparation you'll receive from CompTIA Security+ Study Guide, 5th Edition.
Auflage
Sprache
Verlagsort
Zielgruppe
Editions-Typ
Illustrationen
Maße
Höhe: 23.3 cm
Breite: 18.7 cm
Dicke: 35 mm
Gewicht
ISBN-13
978-1-118-01473-8 (9781118014738)
Schweitzer Klassifikation
Emmett Dulaney is an associate professor at Anderson University. He has written several certification books on Windows, Security, IT project management, and UNIX, and is coauthor of two of Sybex's leading certification titles: CompTIA Security+ Study Guide and CompTIA A+ Complete Study Guide. He is also a well-known certification columnist for Redmond magazine and CertCities.com.
Foreword.
Introduction.
Assessment Test.
Chapter 1 Measuring and Weighing Risk.
Chapter 2 Infrastructure and Connectivity.
Chapter 3 Protecting Networks.
Chapter 4 Threats and Vulnerabilities.
Chapter 5 Access Control and Identity Management.
Chapter 6 Educating and Protecting the User.
Chapter 7 Operating System and Application Security.
Chapter 8 Cryptography Basics.
Chapter 9 Cryptography Implementation.
Chapter 10 Physical and Hardware-based Security.
Chapter 11 Securing the Network Environment.
Chapter 12 Wireless Networking Security.
Chapter 13 Disaster Recovery and Incident Response.
Chapter 14 Security Policies and Procedures.
Chapter 15 Security Administration.
Appendix A About the Companion CD.
Glossary.
Index.