Sign in
|
Register
|
Mobile
Home
Browse
About us
Help/FAQ
Advanced search
Home
>
Browse
>
CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601))
CITATION
Conklin, Wm. Arthur and
White, Greg
.
CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601))
. New York: McGraw-Hill Education, 2021.
Add to Favorites
Email to a Friend
Download Citation
CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601))
Authors:
Wm. Arthur Conklin
and
Greg White
Published:
April 2021
eISBN:
9781260464016
|
ISBN:
9781260464009
Open eBook
Book Description
Table of Contents
Cover
Title Page
Copyright Page
Dedication
About the Authors
Contents at a Glance
Contents
Preface
Acknowledgments
Introduction
Objective Map: Exam SY0-601
Part I Threats, Attacks, and Vulnerabilities
Chapter 1 Social Engineering Techniques
Chapter 2 Type of Attack Indicators
Chapter 3 Application Attack Indicators
Chapter 4 Network Attack Indicators
Chapter 5 Threat Actors, Vectors, and Intelligence Sources
Chapter 6 Vulnerabilities
Chapter 7 Security Assessments
Chapter 8 Penetration Testing
Part II Architecture and Design
Chapter 9 Enterprise Security Architecture
Chapter 10 Virtualization and Cloud Security
Chapter 11 Secure Application Development, Deployment, and Automation Concepts
Chapter 12 Authentication and Authorization
Chapter 13 Cybersecurity Resilience
Chapter 14 Embedded and Specialized Systems
Chapter 15 Physical Security Controls
Chapter 16 Cryptographic Concepts
Part III Implementation
Chapter 17 Secure Protocols
Chapter 18 Host and Application Security
Chapter 19 Secure Network Design
Chapter 20 Wireless Security
Chapter 21 Secure Mobile Solutions
Chapter 22 Implementing Cloud Security
Chapter 23 Identity and Account Management Controls
Chapter 24 Implement Authentication and Authorization
Chapter 25 Public Key Infrastructure
Part IV Operations and Incident Response
Chapter 26 Tools/Assess Organizational Security
Chapter 27 Incident Response Policies, Processes, and Procedures
Chapter 28 Investigations
Chapter 29 Mitigation Techniques and Controls
Chapter 30 Digital Forensics
Part V Governance, Risk, and Compliance
Chapter 31 Security Controls
Chapter 32 Regulations, Standards, and Frameworks
Chapter 33 Organizational Policies
Chapter 34 Risk Management
Chapter 35 Privacy
Part VI Appendixes and Glossary
Appendix A OSI Model and Internet Protocols
Appendix B About the Online Content
Glossary
Index