CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501)

Author:   Wm. Arthur Conklin ,  Greg White ,  Dwayne Williams ,  Chuck Cothren
Publisher:   McGraw-Hill Education
Edition:   5th edition
ISBN:  

9781260019322


Publication Date:   20 January 2018
Format:   Hardback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $86.00 Quantity:  
Add to Cart

Share |

CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501)


Add your own review!

Overview

This fully updated study guide covers every topic on the current version of the CompTIA Security+ exam Take the latest version of the CompTIA Security+ exam with complete confidence using the detailed information contained in this highly effective self-study system. Written by a team of leading information security experts, this authoritative guide addresses the skills required for securing a network and managing risk and enables you to become CompTIA Security+ certified. CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501) covers all exam domains and features 200 accurate practice questions. To aid in study, the book features learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. All questions mirror those on the live test in style, format, and difficulty. Beyond fully preparing you for the challenging SY0-501 exam, the book also serves as a valuable on-the-job reference for IT professionals. * Provides 100% coverage of every objective on exam SY0-501 * Electronic content includes 200 practice questions and a secured book PDF * Written by a team of experienced IT security academics

Full Product Details

Author:   Wm. Arthur Conklin ,  Greg White ,  Dwayne Williams ,  Chuck Cothren
Publisher:   McGraw-Hill Education
Imprint:   McGraw-Hill Education
Edition:   5th edition
Weight:   1.232kg
ISBN:  

9781260019322


ISBN 10:   1260019322
Publication Date:   20 January 2018
Audience:   General/trade ,  General
Format:   Hardback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Part 1: Threats, Attacks and Vulnerabilities Chapter 1: Malware and Indicators of Compromise Chapter 2: Attacks Chapter 3: Threat Actors Chapter 4: Vulnerability Scanning and Penetration Testing Chapter 5: Vulnerabilities and Impacts Part 2: Technologies and Tools Chapter 6: Network Components Chapter 7: Security Tools and Technologies Chapter 8: Troubleshoot Common Security Issues Chapter 9: Deploy Mobile Devices Securely Chapter 10: Implementing Secure Protocols Part 3: Architecture and Design Chapter 11: Architecture Frameworks and Secure Network Architectures Chapter 12: Secure Systems Design and Deployment Chapter 13: Embedded Systems Chapter 14: Application Development and Deployment Chapter 15: Cloud and Virtualization Chapter 16: Resiliency and Automation strategies Chapter 17: Physical Security Controls Part 4: Identity and Access Management Chapter 18: Identity, Access and Accounts Chapter 19: Identity and Access Services Chapter 20: Identity and Access Management Controls Part 5: Risk Management Chapter 21: Policies, Plans and Procedures Chapter 22: Risk Management and Business Impact Analysis Concepts Chapter 23: Incident Response, Disaster Recovery and Continuity of Operation Chapter 24: Digital forensics Chapter 25: Compare and contrast various types of controls Chapter 26: Data Security and Privacy Practices Part 6: Cryptography and PKI Chapter 27: Cryptography Concepts Chapter 28: Cryptography Algorithms Chapter 29: Wireless Security Chapter 30: Public Key Infrastructure

Reviews

Author Information

Wm. Arthur Conklin (Houston, TX), Security+, CISSP, is an Assistant Professor in the Information and Logistics Technology department at the University of Houston. In addition to his PhD, Mr. Conklin has a MBA from UTSA, and two graduate degrees in Electrical Engineering from the Naval Postgraduate School in Monterey, California. Dr. Conklin's interests are information security, systems theory, and secure software design. Greg White (San Antonio, TX), CompTIA Security+, CISSP, is an Associate Professor in the Department of Computer Science at the University of Texas at San Antonio. Dr. White is the Director of the Center for Infrastructure Assurance and Security at UTSA. Chuck Cothren is a Research Scientist at University of Texas at San Antonio (UTSA) Center for Infrastructure Assurance and Security (CIAS) and currently serves on the Information Security Association's Alamo Chapter Board of Directors. Mr. Cothren has a wide array of security experience including performing controlled penetration testing, network security policies, computer intrusion forensics, and computer training. He is a Certified Information Systems Security Professional (CISSP) and has co-authored other McGraw-Hill/Osborne titles. Mr. Cothren holds a B.S. in Industrial Distribution from Texas A&M University. Roger L. Davis is a Senior Internal Audit Manager at NuSkin Enterprises and is responsible for evaluating global business operations in over 35 countries. He is a retired Air Force Colonel with over 20 years of military and information security experience. Mr. Davis is a Certified Information Systems Security Professional (CISSP) and holds a Master's Degree in Computer Science from George Washington University.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MDRG1

 VIEW OUR LATEST READING GUIDE HERE 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List