Personnaliser

OK

CompTIA Security+ Certification Study Guide - Sheikh, Ahmed F.

Note : 0

0 avis
  • Soyez le premier à donner un avis

Vous en avez un à vendre ?

Vendez-le-vôtre

80,98 €

Produit Neuf

  • Ou 20,25 € /mois

    • Livraison : 25,00 €
    • Livré entre le 22 et le 27 avril
    Voir les modes de livraison

    Kelindo

    PRO Vendeur favori

    4,8/5 sur + de 1 000 ventes

    Apres acceptation de la commande, le delai moyen d'expedition depuis le Japon est de 48 heures. Le delai moyen de livraison est de 3 a 4 semaines. En cas de circonstances exceptionnelles, les delais peuvent s'etendre jusqu'à 2 mois.

    Publicité
     
    Vous avez choisi le retrait chez le vendeur à
    • Payez directement sur Rakuten (CB, PayPal, 4xCB...)
    • Récupérez le produit directement chez le vendeur
    • Rakuten vous rembourse en cas de problème

    Gratuit et sans engagement

    Félicitations !

    Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !

    En savoir plus

    Retour

    Horaires

        Note :


        Avis sur Comptia Security+ Certification Study Guide Format Broché  - Livre Informatique

        Note : 0 0 avis sur Comptia Security+ Certification Study Guide Format Broché  - Livre Informatique

        Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.


        Présentation Comptia Security+ Certification Study Guide Format Broché

         - Livre Informatique

        Livre Informatique - Sheikh, Ahmed F. - 01/09/2020 - Broché - Langue : Anglais

        . .

      • Auteur(s) : Sheikh, Ahmed F.
      • Editeur : Apress
      • Langue : Anglais
      • Parution : 01/09/2020
      • Format : Moyen, de 350g à 1kg
      • Nombre de pages : 288
      • Expédition : 547
      • Dimensions : 25.4 x 17.8 x 1.6
      • ISBN : 1484262336



      • Résumé :
        Prepare for the CompTIA Security+ certification exam that covers the skills required to perform core security functions and pursue a career in IT. You will learn the basic principles of network security.


        Computer network vulnerabilities and threats are covered and you will learn how to safeguard computer networks. Network security planning, technology, and organization are discussed along with associated legal and ethical issues. Lesson objectives and instruction succinctly review each major topic, including: network fundamentals, operational and organizational security, risk management, wireless security, change management, physical security, forensics, network attacks, and much more.





        What You Will Learn


        Identify the concepts of confidentiality, integrity, and availability
        Implement secure network administration principles
        Apply appropriate risk mitigation strategies
        Explain the impact of physical security on computer and network security
        Use assessment tools to discover security threats and vulnerabilities
        Implement appropriate security controls when performing account management






















        Who This Book Is For

        Security professionals looking to get this credential, including systems administrators, network administrators, security administrators, junior IT auditors and penetration testers, security specialists, security consultants, security engineers, and more

        Biographie:

        Ahmed Sheikh is a Fulbright alumnus and has earned a master's degree in electrical engineering from Kansas State University, USA. He is a seasoned IT expert with a specialty in network security planning and skills in cloud computing. Currently, he is working as IT Expert Engineer at a leading IT electrical company.

        Sommaire:

        Chapter 1. General Concepts

        Identify the concepts of confidentiality, integrity and availability.

        Perform packet level analysis.

         

        Chapter 2. Chapter 2. Network Fundamentals Infrastructure Security

        Explain the security function and purpose of network devices and technologies.

        Implement secure network administration principles.

        Differentiate network design elements and compounds.

        Use common protocols to employ infrastructure security.

        Identify commonly used default network ports.

        Chapter 3. IDS Wireless Security

        Apply secure network administration principles.

        Implement a wireless network in a secure manner.

        Chapter 4. Role of People in Security-Operational and Organizational Security

        Explain the importance of security-related awareness and training.

        Chapter 5. Risk Management

        Explain risk related concepts.

        Apply appropriate risk mitigation strategies.

        Chapter 6. Change Management

        Compare aspects of business continuity.

        Execute disaster recovery plans and procedures.

        Chapter 7. Physical Security

        Explain the impact of physical security on computer and network security.

        Explain the impact and proper use of environmental controls.

        Chapter 8. Forensics, Legal Issues, Privacy

        Apply appropriate incident response procedures.

        Identify the various laws that affect cybersecurity.

        Chapter 9. Attacks

        Identify the different types of malware that exist.

        Describe computer attacks.

        Chapter 10. Network Attacks

        Identify different types of network attacks.

        Use assessment tools to discover security threats and vulnerabilities.

        Chapter 11. Baseline Secure Software Development

        Explain the importance of application security.

        Carry out appropriate procedures to establish host security.

        Explain the importance of data security.

        Chapter 12. Email and IM Web Components

        Describe security issues associated with Email and Instant Messaging.

        Explain web applications, plug-ins, and related security issues.

        Explain web-based application security issues.

        Chapter 13. Authentication and Remote Access

        Explain the function and purpose of authentication services.

        Explain the fundamental concepts and best practices related to authentication.

        Identify the methods and protocols used for remote access to networks.

        Chapter 14. Access Control and Privilege Management

        Explain the fundamental concepts and best practices related to authorization and access control.

        Implement appropriate security controls when performing account management.

        Chapter 15. Cryptography

        Summarize general cryptography concepts.

        Apply appropriate cryptographic tools and products.

        Chapter 16. Public Key Infrastructure

        Explain the core concepts of public key infrastructure.

        Implement Public Key Infrastructure (PKI), certificate management and associated components.

        Détails de conformité du produit

        Consulter les détails de conformité de ce produit (

        Personne responsable dans l'UE

        )
        Le choixNeuf et occasion
        Minimum5% remboursés
        La sécuritéSatisfait ou remboursé
        Le service clientsÀ votre écoute
        LinkedinFacebookTwitterInstagramYoutubePinterestTiktok
        visavisa
        mastercardmastercard
        klarnaklarna
        paypalpaypal
        floafloa
        americanexpressamericanexpress
        Rakuten Logo
        • Rakuten Kobo
        • Rakuten TV
        • Rakuten Viber
        • Rakuten Viki
        • Plus de services
        • À propos de Rakuten
        Rakuten.com