Używamy cookies, aby ułatwić korzystanie z Portalu. Możesz określić warunki przechowywania, dostępu do plików cookies w Twojej przeglądarce. Dowiedz się więcej.
strona główna Strona główna | Nowości | Promocje | Zapowiedzi Twoje konto | Zarejestruj | Schowek | Kontakt | Pomoc
mapa działów
Szukaj: szukanie zaawansowane
Koszyk
Książki \ Egzaminy

CompTIA Security+ Rapid Review (Exam SY0-301) Język: 2

978-0-7356-6685-6

Cena Brutto: 126.00

Cena netto: 120.00

Ilość:
Wersja: Drukowana
Autor Michael Gregg
Liczba_stron 258
Wydawnictwo Microsoft Press
Oprawa miękka
Data_Wydania 2013-01-01

CompTIA

Security+ Rapid Review (Exam SY0-301)


      Assess your readiness for CompTIA Security+ Exam SY0-301—and quickly identify where you need to focus and practice. This practical, streamlined guide walks you through each exam objective, providing 'need-to-know' checklists, review questions, tips, and links to further study—all designed to help bolster your preparation.

Reinforce your exam prep with a Rapid Review of these objectives:

  • Network security
  • Compliance and operational security
  • Threats and vulnerabilities
  • Application, data and host security
  • Access control and identity management
  • Cryptography

This book is an ideal complement to the in-depth training of the Microsoft Press® Training Kit and other exam-prep resources for CompTIA Security+ Exam SY0-301.

  1. Chapter 1 Network Security

    1. Objective 1.1: Explain the security function and purpose of network devices and technologies

    2. Objective 1.2: Apply and implement secure network administration principles

    3. Objective 1.3: Distinguish and differentiate network design elements and compounds

    4. Objective 1.4: Implement and use common protocols

    5. Objective 1.5: Identify commonly used default network ports

    6. Objective 1.6: Implement wireless networks in a secure manner

    7. Answers

  2. Chapter 2 Compliance and Operational Security

    1. Objective 2.1: Explain risk related concepts

    2. Objective 2.2: Carry out appropriate risk mitigation strategies

    3. Objective 2.3: Execute appropriate incident response procedures

    4. Objective 2.4: Explain the importance of security related awareness and training

    5. Objective 2.5: Compare and contrast aspects of business continuity

    6. Objective 2.6: Explain the impact and proper use of environmental controls

    7. Objective 2.7: Execute disaster recovery plans and procedures

    8. Objective 2.8: Exemplify the concepts of confidentiality, integrity, and availability (CIA)

    9. Answers

  3. Chapter 3 Threats and Vulnerabilities

    1. Objective 3.1: Analyze and differentiate among types of malware

    2. Objective 3.2: Analyze and differentiate among types of attacks

    3. Objective 3.3: Analyze and differentiate among types of social engineering attacks

    4. Objective 3.4: Analyze and differentiate among types of wireless attacks

    5. Objective 3.5: Analyze and differentiate among types of application attacks

    6. Exam need to know

    7. Objective 3.6: Analyze and differentiate among types of mitigation and deterrent techniques

    8. Objective 3.7: Implement assessment tools and techniques to discover security threats and vulnerabilities

    9. Objective 3.8: Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning

    10. Answers

  4. Chapter 4 Application, Data, and Host Security

    1. Objective 4.1: Explain the importance of application security

    2. Objective 4.2: Carry out appropriate procedures to establish host security

    3. Objective 4.3: Explain the importance of data security

    4. Answers

  5. Chapter 5 Access Control and Identity Management

    1. Objective 5.1: Explain the function and purpose of authentication services

    2. Objective 5.2: Explain the fundamental concepts and best practices related to authentication, authorization, and access control

    3. Objective 5.3: Implement appropriate security controls when performing account management

    4. Answers

  6. Chapter 6 Cryptography

    1. Objective 6.1: Summarize general cryptography concepts

    2. Objective 6.2: Use and apply appropriate cryptographic tools and products

    3. Objective 6.3: Explain the core concepts of public key infrastructure

    4. Objective 6.4: Implement PKI, certificate management, and associated components

    5. Answers

  1. Appendix Security+ Acronyms

powrót
 
Produkty Podobne
Exam Ref MD-101 Managing Modern Desktops
Exam Ref MD-100 Windows 10
Exam Ref MS-100 Microsoft 365 Identity and Services
Exam Ref MS-101 Microsoft 365 Mobility and Security
Exam Ref AZ-103 Microsoft Azure Administrator
Exam Ref AZ-900 Microsoft Azure Fundamentals
AWS Certified Cloud Practitioner (CLF-C01) Cert Guide
AWS Certified Solutions Architect - Associate (SAA-C01) Cert Guide
Exam Ref 70-698 Installing and Configuring Windows 10, 2nd Edition
Exam Ref 70-778 Analyzing and Visualizing Data with Microsoft Power BI
Więcej produktów