CompTIA Security+ SY0-401 Cert Guide, Academic Edition
Comp Secu SY04 Aut Ce ePub_1
Read your book anywhere, on any device, through RedShelf's cloud based eReader.
Digital Notes and Study Tools
Built-in study tools include highlights, study guides, annotations, definitions, flashcards, and collaboration.
The publisher of this book allows a portion of the content to be used offline.
( 5 pages per
1 days )
The publisher of this book allows a portion of the content to be printed.
Additional Book Details
This is the eBook version of the print title. Note that the eBook does not provide access to the practice test software that accompanies the print book. Access to the videos and exercises is available through product registration at Pearson IT Certification; or see instructions in back pages of your eBook. Learn, prepare, and practice for CompTIA Security+ SY0-401 exam success with this CompTIA Authorized Cert Guide, Academic Edition from Pearson IT Certification, a leader in IT Certification learning and a CompTIA Authorized Platinum Partner. The DVD features three complete practice exams, complete video solutions to 31 hands-on labs, plus 31 interactive flash-based simulations that include drag-and-drop and matching to reinforce the learning. Master CompTIA’s Security+ SY0-401 exam topics Assess your knowledge with chapter-ending quizzes Reinforce your knowledge of key concepts with chapter review activities Practice with realistic exam questions on the DVD Includes complete video solutions to 31 hands-on labs Plus 31 interactive simulations on key exam topics CompTIA Security+ SY0-401 Authorized Cert Guide, Academic Edition includes video solutions to the hands-on labs, practice tests, and interactive simulations that let the reader learn by doing. Best-selling author and expert instructor David L. Prowse shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. The book presents you with an organized test preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Chapter review activities help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your approach to passing the exam. The companion Academic Edition DVD contains the powerful Pearson IT Certification Practice Test engine, with three complete practice exams and hundreds of exam-realistic questions. The assessment engine offers you a wealth of customization options and reporting features, laying out a complete assessment of your knowledge to help you focus your study where it is needed most. The Academic Edition DVD also includes complete video solutions to 31 hands-on labs in the book and 31 interactive simulations on key exam topics to reinforce the learning by doing. Learning activities such as test password strength, match the type of Malware with its definition, find the security issues in the network map, and disallow a user access to the network on Saturday and Sunday. Interactive Simulations: 2-1: Identifying Malware Types 2-2: Securing the BIOS 2-4: Filtering E-mails 3-3: Stopping Services in the Command Prompt 4-1: Securing Web Browsers 5-1: Creating a DMZ 5-3: Defending against the Web Shell 6-1a: Understanding Port Numbers, Part A 6-1b: Understanding Port Numbers, Part B 6-1c: Understanding Port Numbers, Part C 6-2a: Identifying Network Attacks, Part A 6-2b: Identifying Network Attacks, Part B 6-2c: Identifying Network Attacks, Part C 6-2d: Identifying Network Attacks, Part D 7-1: Configuring a Firewall's Ruleset 8-4: Planning Network Security 9-1: Choosing Physical Security Methods 9-2: Selecting the Correct Authentication Technology 9-3: Understanding 802.1X 10-1: Password Strength 10-2: Configuring Logon Hours 10-3: Understanding Access Control Models 11-1a: Risk Assessment, Part A 11-1b: Risk Assessment, Part B 11-1c: Vulnerability Management Process 12-1: Capturing and Analyzing Packets 12-2: Deciphering Log Files 13-1: Understanding Symmetric and Asymmetric Algorithms 15-1: Configuring RAID 16-1a: Identifying Social Engineering Attacks, Part A 16-1b: Identifying Social Engineering Attacks, Part B Hands-On Labs Video Solutions: 2-1: Using Free Malware Scanning Programs 2-2: Securing the BIOS 2-3: Securing Mobile Devices 3-1: Discerning and Updating Service Pack Level 3-2: Securing a Virtual Machine 3-3: Working with Services in Windows and Linux 4-1: Securing Web Browsers 4-2: Whitelisting and Blacklisting Applications with a Windows Server Policy 5-2: Subnetting a Network 6-1: Scanning Ports 7-2: Configuring Packet Filtering and NAT 7-3: Configuring an Inbound Filter 8-1: Securing a Wireless Device 8-2: Enabling MAC Filtering 8-3: Wardriving and the Cure 9-3: Understanding 802.1X 9-4: Setting Up a Secure VPN 10-1: Configuring Complex Passwords 10-2: Configuring Password Policies and User Accounts Restrictions 10-4: Configuring User and Group Permissions 11-2: Mapping and Scanning the Network 11-3: Defending Against Password Cracking 12-1: Capturing and Analyzing Packets 12-2: Deciphering Log Files 12-3: Auditing Files 13-1: Understanding Symmetric and Asymmetric Algorithms 13-2: Disabling the LM Hash 14-1: Understanding PKI 14-2: Making an SSH Connection 15-1: Configuring RAID 17-1: Analyzing Test Questions Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this CompTIA authorized study guide helps you master the concepts and techniques that will allow you to succeed on the exam the first time. The CompTIA authorized study guide helps you master all the topics on the Security+ exam, including Core computer system security OS hardening and virtualization Application security Network design elements and threats Perimeter security Network media and devices security Physical security and authentication models Access control Vulnerability and risk assessment Monitoring and auditing Cryptography, including PKI Redundancy and disaster recovery Policies and procedures
|Sold By||Pearson Education|
|ISBNs||9780789753632, 0789753634, 9780789753632, 0133925609, 9780133925609|
|Number of Pages||619|