CompTIA Security+ Certification Study Guide, Fourth Edition (Exam SY0-601)

CompTIA Security+ Certification Study Guide, Fourth Edition (Exam SY0-601)

Clarke, Glen

McGraw-Hill Education

11/2021

944

Mole

Inglês

9781260467932

15 a 20 dias

1511

Descrição não disponível.
Networking Basics and Terminology
Introduction to Security Terminology
Security Policies and Standards
Types of Attacks
Vulnerabilities and Threats
Mitigating Security Threats
Implementing Host-based Security
Securing the Network Infrastructure
Wireless Networking and Security
Authentication
Authorization and Access Control
Introduction to Cryptography
Managing a Public Key Infrastructure
Physical Security
Application Attacks and Security
Virtualization and Cloud Security
Risk Analysis
Disaster Recovery and Business Continuity
Understanding Monitoring and Auditing
Security Assessments and Audits
Incident Response and Computer Forensics
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
CompTIA Security+, CompTIA, SY0-601, certification, security, cybersecurity, self-study, study guide, exam prep, exam preparation, exam-focused, Glen Clarke, get certified, get ahead, Security Threats, Security Attacks, Security Vulnerabilities, Social engineering techniques, Attack Indicators, Application Attack Indicators, Network Attack Indicators, Threat actors, Threat vectors, intelligence sources, Vulnerabilities, Security Assessments, Penetration Testing, Security Architecture, Security Design, Enterprise Architecture, Virtualization, Cloud Security, Secure App Development, Secure App deployment, Secure App Automation scripts, Authentication, Authorization, Cybersecurity Resilience, Embedded systems, Specialized systems, Physical Security, Cryptographic Concepts, Security Implementation, Secure Protocols, Host Security, Application Security, Secure Network Design, Wireless Security, Secure Mobile Solutions, Implementing Cloud Security, Identity controls, Account management controls, Implementing Authentication, Implementing Authorization, Public Key Infrastructure, PKI, Security Operations, Incident Response, security Tools, Assess Organizational Security, Incident Response Policies, Incident Response Procedures, Investigations, Mitigation Techniques, Mitigation Controls, Digital Forensics, Governance, Risk, Compliance, Security Controls, Security Regulations, Security Standards, Security Frameworks, Organizational Policies, Risk Management, Privacy