CompTIA Security SY0 401 Cert Guide Deluxe 3rd Edition by David L Prowse – Ebook PDF Instant Download/Delivery: 0789753332, 9780789753335
Full download CompTIA Security SY0 401 Cert Guide Deluxe 3rd Edition after payment
Product details:
ISBN 10: 0789753332
ISBN 13: 9780789753335
Author: David L Prowse
CompTIA Security SY0 401 Cert Guide Deluxe 3rd Table of contents:
-
Part I: Systems and Application Security
- Chapter 1: Introduction to Security
- Security Concepts
- Threats, Vulnerabilities, and Risks
- Security Principles (Confidentiality, Integrity, Availability)
- The Security Triad
- Chapter 2: Computer Systems Security
- Malware (Viruses, Worms, Trojans, Rootkits, Spyware, etc.)
- Malware Prevention and Troubleshooting
- Securing Computer Hardware and Peripherals
- Securing Mobile Devices
- Chapter 3: OS Hardening and Virtualization
- Hardening Operating Systems
- Patch Management
- Group Policies, Security Templates, Baselines
- Virtualization Security
- Chapter 4: Application Security
- Securing Web Browsers
- Application Development and Deployment Security (SDLC)
- Common Application Vulnerabilities and Attacks (XSS, SQL Injection, Buffer Overflows)
- Chapter 1: Introduction to Security
-
Part II: Network Infrastructure
- Chapter 5: Network Design Elements and Network Threats
- Network Design Elements (DMZ, Subnetting, VLANs, NAT)
- Common Network Attacks (Denial of Service, Man-in-the-Middle)
- Chapter 6: Network Perimeter Security
- Firewalls and Proxy Servers
- Intrusion Detection and Prevention Systems (IDS/IPS)
- Honeypots and Honeynets
- Chapter 7: Securing Network Media and Devices
- Network Devices (Routers, Switches, Wireless Access Points)
- Securing Wireless Networks (WPA2, RADIUS, EAP)
- Network Hardening Best Practices
- Chapter 5: Network Design Elements and Network Threats
-
Part III: Access Control
- Chapter 8: Physical Security and Authentication Models
- Physical Security Controls
- Authentication Factors and Types (Biometrics, Multifactor)
- Authentication Protocols (Kerberos, NTLM, SAML, OAuth)
- Chapter 9: Access Control Methods and Models
- Authorization Methods
- Access Control Models (DAC, MAC, RBAC)
- Identity and Access Management (IAM)
- Chapter 8: Physical Security and Authentication Models
-
Part IV: Assessments and Audits
- Chapter 10: Vulnerability and Risk Assessment
- Vulnerability Scanning
- Penetration Testing
- Risk Management (Risk Assessment, Mitigation)
- Chapter 11: Monitoring and Auditing
- Security Logs and SIEM
- Network Monitoring (Packet Sniffing, NetFlow)
- Incident Response
- Chapter 10: Vulnerability and Risk Assessment
-
Part V: Cryptography
- Chapter 12: Encryption and Hashing Concepts
- Symmetric and Asymmetric Encryption
- Hashing and Digital Signatures
- Key Management
- Chapter 13: PKI and Encryption Protocols
- Public Key Infrastructure (PKI)
- Certificates and CAs
- Secure Protocols (SSL/TLS, IPSec, SSH)
- Chapter 12: Encryption and Hashing Concepts
-
Part VI: Organizational Security
- Chapter 14: Redundancy and Disaster Recovery
- Business Continuity Planning (BCP)
- Disaster Recovery Planning (DRP)
- Backup and Recovery Strategies
- Chapter 15: Policies, Procedures, and People
- Security Policies, Standards, and Guidelines
- Security Awareness and Training
- Social Engineering
- Legal and Regulatory Compliance
- Chapter 14: Redundancy and Disaster Recovery
-
Part VII: Preparing for the CompTIA Security+ Exam
- Chapter 16: Taking the Real Exam
- Exam Format and Strategies
- Study Plan
- Last-Minute Review Tips
- Chapter 16: Taking the Real Exam
People also search for CompTIA Security SY0 401 Cert Guide Deluxe 3rd:
comptia security sy0 401 cert guide deluxe
comptia security+ 401
comptia security+ sy0-601 cert guide 5th edition
comptia security+ sy0-401
comptia security+ sy0-601 certification guide
Tags: David L Prowse, CompTIA, Security