CompTIA Security+ Certification Study Guide - Sheikh, Ahmed F.
- Format: Broché Voir le descriptif
Vous en avez un à vendre ?
Vendez-le-vôtre80,98 €
Produit Neuf
Ou 20,25 € /mois
- Livraison : 25,00 €
- Livré entre le 22 et le 27 avril
- Payez directement sur Rakuten (CB, PayPal, 4xCB...)
- Récupérez le produit directement chez le vendeur
- Rakuten vous rembourse en cas de problème
Gratuit et sans engagement
Félicitations !
Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !
TROUVER UN MAGASIN
Retour
Avis sur Comptia Security+ Certification Study Guide Format Broché - Livre Informatique
0 avis sur Comptia Security+ Certification Study Guide Format Broché - Livre Informatique
Donnez votre avis et cumulez 5
Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.
-
Ruven Afanador: Angel Gitano
Occasion dès 115,99 €
-
Woman In The Mirror
Occasion dès 44,00 €
-
Logic, Language, And Meaning, Volume 2
Neuf dès 60,11 €
Occasion dès 79,45 €
-
Le Mans: The Official History 1923-29
Neuf dès 67,14 €
-
Elvis Presley On Tour Livre Usa 120 Pages 240 Photos Inedites ! Rare!
Occasion dès 59,00 €
-
L'Histoire La Vie Et Les Moeurs Et La Curiosité
Occasion dès 99,00 €
-
Art And Flair Of Mary Blair, The-Updated Edition
Neuf dès 44,17 €
Occasion dès 149,00 €
-
Das Lyrische Werk
Neuf dès 123,20 €
Occasion dès 77,30 €
-
Key Questions In Cardiac Surgery
Neuf dès 108,15 €
-
Kim Kardashian Selfish
Occasion dès 96,99 €
-
Obra Hermética
Occasion dès 45,08 €
-
Graham Hill Scrapbook 1929 -1966
Occasion dès 110,00 €
-
Michael Kenna - Arbres / Trees
2 avis
Occasion dès 95,00 €
-
Eighteenth Century Musical Instruments, France And Britain = Les Instruments De Musique Au Xviiie Siecle, France Et Grande-Bretagne: [Catalo
Occasion dès 55,50 €
-
Sailing The Seas
Neuf dès 45,00 €
-
77 Secrets De Mécaniciens
Neuf dès 58,04 €
Occasion dès 44,96 €
-
Crew Resource Management Training
Neuf dès 85,94 €
Occasion dès 82,99 €
-
Lillian Bassman / Paul Himmel
Occasion dès 106,99 €
-
And The Truth Shall Set You Free
Occasion dès 44,79 €
-
Ed Fox 02
9 avis
Occasion dès 58,89 €
Produits similaires
Présentation Comptia Security+ Certification Study Guide Format Broché
- Livre Informatique
Résumé :
Prepare for the CompTIA Security+ certification exam that covers the skills required to perform core security functions and pursue a career in IT. You will learn the basic principles of network security.
Computer network vulnerabilities and threats are covered and you will learn how to safeguard computer networks. Network security planning, technology, and organization are discussed along with associated legal and ethical issues. Lesson objectives and instruction succinctly review each major topic, including: network fundamentals, operational and organizational security, risk management, wireless security, change management, physical security, forensics, network attacks, and much more.
What You Will Learn
Identify the concepts of confidentiality, integrity, and availability
Implement secure network administration principles
Apply appropriate risk mitigation strategies
Explain the impact of physical security on computer and network security
Use assessment tools to discover security threats and vulnerabilities
Implement appropriate security controls when performing account management
Who This Book Is For
Security professionals looking to get this credential, including systems administrators, network administrators, security administrators, junior IT auditors and penetration testers, security specialists, security consultants, security engineers, and more
Biographie: Ahmed Sheikh is a Fulbright alumnus and has earned a master's degree in electrical engineering from Kansas State University, USA. He is a seasoned IT expert with a specialty in network security planning and skills in cloud computing. Currently, he is working as IT Expert Engineer at a leading IT electrical company.
Sommaire: Chapter 1. General Concepts Identify the concepts of confidentiality, integrity and availability. Perform packet level analysis. Chapter 2. Chapter 2. Network Fundamentals Infrastructure Security Explain the security function and purpose of network devices and technologies. Implement secure network administration principles. Differentiate network design elements and compounds. Use common protocols to employ infrastructure security. Identify commonly used default network ports. Chapter 3. IDS Wireless Security Apply secure network administration principles. Implement a wireless network in a secure manner. Chapter 4. Role of People in Security-Operational and Organizational Security Explain the importance of security-related awareness and training. Chapter 5. Risk Management Explain risk related concepts. Apply appropriate risk mitigation strategies. Chapter 6. Change Management Execute disaster recovery plans and procedures. Chapter 7. Physical Security Explain the impact of physical security on computer and network security. Explain the impact and proper use of environmental controls. Chapter 8. Forensics, Legal Issues, Privacy Apply appropriate incident response procedures. Identify the various laws that affect cybersecurity. Chapter 9. Attacks Identify the different types of malware that exist. Describe computer attacks. Chapter 10. Network Attacks Identify different types of network attacks. Use assessment tools to discover security threats and vulnerabilities. Chapter 11. Baseline Secure Software Development Explain the importance of application security. Carry out appropriate procedures to establish host security. Explain the importance of data security. Chapter 12. Email and IM Web Components Describe security issues associated with Email and Instant Messaging. Explain web-based application security issues. Chapter 13. Authentication and Remote Access Explain the function and purpose of authentication services. Explain the fundamental concepts and best practices related to authentication. Identify the methods and protocols used for remote access to networks. Chapter 14. Access Control and Privilege Management Explain the fundamental concepts and best practices related to authorization and access control. Implement appropriate security controls when performing account management. Chapter 15. Cryptography Summarize general cryptography concepts. Apply appropriate cryptographic tools and products. Chapter 16. Public Key Infrastructure Explain the core concepts of public key infrastructure. Implement Public Key Infrastructure (PKI), certificate management and associated components.
Détails de conformité du produit
Personne responsable dans l'UE