• Complain

James Pengelly - The Official CompTIA Security+ Certification Study Guide (Exam SY0-501)

Here you can read online James Pengelly - The Official CompTIA Security+ Certification Study Guide (Exam SY0-501) full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2019, publisher: CompTIA, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    The Official CompTIA Security+ Certification Study Guide (Exam SY0-501)
  • Author:
  • Publisher:
    CompTIA
  • Genre:
  • Year:
    2019
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

The Official CompTIA Security+ Certification Study Guide (Exam SY0-501): summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "The Official CompTIA Security+ Certification Study Guide (Exam SY0-501)" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

This is the only official CompTIA study guide for the CompTIA Security+ IT certification exam.Created by CompTIA, this study guide was evaluated by subject matter experts to ensure it teaches the essential skills required to pass the CompTIA Security+ (SY0-501) IT certification exam.After reading the text, you will be able to do the following:
  • Identify the strategies used by threat actors to attack networks and hosts and how to defend against them.
  • Understand the principles of organizational security and the elements of effective security policies.
  • Recognize the technologies and uses of cryptographic standards and products.
  • Install and configure network and host-based security technologies.
  • Describe how wireless and remote access security is enforced.
  • About the Author/About CompTIACompTIA is the leading provider of vendor-neutral IT certifications in the world. With more than 2 million IT certifications issued worldwide, CompTIA is dedicated to helping IT professionals lead the charge in our digitally connected world.CompTIA offers everything you need to prepare for your IT certification exam. CompTIA content provides the only official content to train for CompTIA IT certification exams. The fully illustrated CompTIA books map directly to the exam objectives.About CompTIA Security+ CompTIA Security+ is an international, vendor-neutral IT certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career.No other certification that assesses baseline cybersecurity skills includes performance-based questions.Choose Security+ for DoD 8570 compliance because it focuses on the latest trends and techniques in risk management, risk mitigation, threat management and intrusion detection.

    James Pengelly: author's other books


    Who wrote The Official CompTIA Security+ Certification Study Guide (Exam SY0-501)? Find out the surname, the name of the author of the book and a list of all author's works by series.

    The Official CompTIA Security+ Certification Study Guide (Exam SY0-501) — read online for free the complete book (whole text) full work

    Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "The Official CompTIA Security+ Certification Study Guide (Exam SY0-501)" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

    Light

    Font size:

    Reset

    Interval:

    Bookmark:

    Make
    Glossary
    Glossary
    Title

    The Official CompTIA Security+ Study Guide (Exam SY0-501): 2019 Update

    COURSE EDITION: 1.0

    Acknowledgements

    James Pengelly Author Pamela J Taylor Content Developer Peter Bauer Content - photo 1

    James Pengelly, Author

    Pamela J. Taylor, Content Developer

    Peter Bauer, Content Editor

    Michelle Farney, Content Editor

    Thomas Reilly, Vice President Learning

    Katie Hoenicke, Director of Product Management

    Evan Burns, Senior Manager, Learning Technology Operations and Implementation

    James Chesterfield, Manager, Learning Content and Design

    Becky Mann, Senior Manager, Product Development

    Katherine Keyes, Content Specialist

    Notices
    DISCLAIMER

    While CompTIA, Inc. takes care to ensure the accuracy and quality of these materials, we cannot guarantee their accuracy, and all materials are provided without any warranty whatsoever, including, but not limited to, the implied warranties of merchantability or fitness for a particular purpose. The use of screenshots, photographs of another entity's products, or another entity's product name or service in this book is for editorial purposes only. No such use should be construed to imply sponsorship or endorsement of the book by nor any affiliation of such entity with CompTIA. This guide may contain links to sites on the Internet that are owned and operated by third parties (the "External Sites"). CompTIA is not responsible for the availability of, or the content located on or through, any External Site. Please contact CompTIA if you have any concerns regarding such links or External Sites.

    TRADEMARK NOTICES

    CompTIA, Security+, and the CompTIA logo are registered trademarks of CompTIA, Inc., in the U.S. and other countries. All other product and service names used may be common law or registered trademarks of their respective proprietors.

    COPYRIGHT NOTICE

    Copyright 2019 CompTIA, Inc. All rights reserved. Screenshots used for illustrative purposes are the property of the software proprietor. Except as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of CompTIA, 3500 Lacey Road, Suite 100, Downers Grove, IL 60515-5439.

    This book conveys no rights in the software or other products about which it was written; all use or licensing of such software or other products is the responsibility of the user according to terms and conditions of the owner. If you believe that this book, related materials, or any other CompTIA materials are being reproduced or transmitted without permission, please call 1-866-835-8020 or visit https://help.comptia.org .

    Table of Contents
    TitleAcknowledgements
    Notices
    About This Guide
    Guide Description
    How to Use This Book
    Lesson 1: Comparing and Contrasting Attacks
    LESSON INTRODUCTION
    LESSON OBJECTIVES
    Topic A: Compare and Contrast Information Security Roles
    Topic B: Explain Threat Actor Types
    Topic C: Compare and Contrast Social Engineering Attack Types
    Topic D: Determine Malware Types
    Activity 1-1: Comparing and Contrasting Attacks Review
    Summary
    Lesson 2: Comparing and Contrasting Security Controls
    LESSON INTRODUCTION
    LESSON OBJECTIVES
    Topic A: Compare and Contrast Security Control and Framework Types
    Topic B: Follow Incident Response Procedures
    Activity 2-1: Comparing and Contrasting Security Controls Review
    Summary
    Lesson 3: Assessing Security Posture with Software Tools
    LESSON INTRODUCTION
    LESSON OBJECTIVES
    Topic A: Explain Penetration Testing Concepts
    Topic B: Assess Security Posture with Topology Discovery Software Tools
    Topic C: Assess Security Posture with Fingerprinting and Sniffing Software Tools
    Topic D: Assess Security Posture with Vulnerability Scanning Software Tools
    Activity 3-1: Assessing Security Posture with Software Tools Review
    Summary
    Lesson 4: Explaining Basic Cryptography Concepts
    LESSON INTRODUCTION
    LESSON OBJECTIVES
    Topic A: Compare and Contrast Basic Concepts of Cryptography
    Topic B: Explain Hashing and Symmetric Cryptographic Algorithms
    Topic C: Explain Asymmetric Cryptographic Algorithms
    Activity 4-1: Explaining Basic Cryptography Concepts Review
    Summary
    Lesson 5: Implementing a Public Key Infrastructure
    LESSON INTRODUCTION
    LESSON OBJECTIVES
    Topic A: Implement Certificates and Certificate Authorities
    Topic B: Implement PKI Management
    Activity 5-1: Implementing a Public Key Infrastructure Review
    Summary
    Lesson 6: Implementing Identity and Access Management Controls
    LESSON INTRODUCTION
    LESSON OBJECTIVES
    Topic A: Compare and Contrast Identity and Authentication Concepts
    Topic B: Install and Configure Authentication Protocols
    Topic C: Implement Multifactor Authentication
    Activity 6-1: Implementing Identity and Access Management Controls Review
    Summary
    Lesson 7: Managing Access Services and Accounts
    LESSON INTRODUCTION
    LESSON OBJECTIVES
    Topic A: Install and Configure Authorization and Directory Services
    Topic B: Implement Access Management Controls
    Topic C: Differentiate Account Management Practices
    Topic D: Implement Account Auditing and Recertification
    Activity 7-1: Managing Access Services and Accounts Review
    Summary
    Lesson 8: Implementing a Secure Network Architecture
    LESSON INTRODUCTION
    LESSON OBJECTIVES
    Topic A: Implement Secure Network Architecture Concepts
    Topic B: Install and Configure a Secure Switching Infrastructure
    Topic C: Install and Configure Network Access Control
    Topic D: Install and Configure a Secure Routing and NAT Infrastructure
    Activity 8-1: Implementing a Secure Network Architecture Review
    Summary
    Lesson 9: Installing and Configuring Security Appliances
    LESSON INTRODUCTION
    LESSON OBJECTIVES
    Topic A: Install and Configure Firewalls and Proxies
    Topic B: Install and Configure Load Balancers
    Topic C: Install and Configure Intrusion Detection/Prevention Systems
    Topic D: Install and Configure Data Loss Prevention (DLP) Systems
    Topic E: Install and Configure Logging and SIEM Systems
    Activity 9-1: Installing and Configuring Security Appliances Review
    Next page
    Light

    Font size:

    Reset

    Interval:

    Bookmark:

    Make

    Similar books «The Official CompTIA Security+ Certification Study Guide (Exam SY0-501)»

    Look at similar books to The Official CompTIA Security+ Certification Study Guide (Exam SY0-501). We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


    Reviews about «The Official CompTIA Security+ Certification Study Guide (Exam SY0-501)»

    Discussion, reviews of the book The Official CompTIA Security+ Certification Study Guide (Exam SY0-501) and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.