CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501)
38%
off

CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501)

4 (22 ratings by Goodreads)
By (author)  , By (author)  , By (author)  , By (author)  , By (author) 

Free delivery worldwide

Available. Dispatched from the UK in 2 business days
When will my order arrive?

Description

This fully updated study guide covers every topic on the current version of the CompTIA Security+ exam

Take the latest version of the CompTIA Security+ exam with complete confidence using the detailed information contained in this highly effective self-study system. Written by a team of leading information security experts, this authoritative guide addresses the skills required for securing a network and managing risk and enables you to become CompTIA Security+ certified.

CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501) covers all exam domains and features 200 accurate practice questions. To aid in study, the book features learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. All questions mirror those on the live test in style, format, and difficulty. Beyond fully preparing you for the challenging SY0-501 exam, the book also serves as a valuable on-the-job reference for IT professionals.

* Provides 100% coverage of every objective on exam SY0-501
* Electronic content includes 200 practice questions and a secured book PDF
* Written by a team of experienced IT security academics
show more

Product details

  • Hardback | 647 pages
  • 195.58 x 233.68 x 40.64mm | 1,232g
  • OH, United States
  • English
  • 5th edition
  • Illustrations, unspecified
  • 1260019322
  • 9781260019322
  • 498,762

Table of contents

Part 1: Threats, Attacks and Vulnerabilities
Chapter 1: Malware and Indicators of Compromise
Chapter 2: Attacks
Chapter 3: Threat Actors
Chapter 4: Vulnerability Scanning and Penetration Testing
Chapter 5: Vulnerabilities and Impacts

Part 2: Technologies and Tools
Chapter 6: Network Components
Chapter 7: Security Tools and Technologies
Chapter 8: Troubleshoot Common Security Issues
Chapter 9: Deploy Mobile Devices Securely
Chapter 10: Implementing Secure Protocols

Part 3: Architecture and Design
Chapter 11: Architecture Frameworks and Secure Network Architectures
Chapter 12: Secure Systems Design and Deployment
Chapter 13: Embedded Systems
Chapter 14: Application Development and Deployment
Chapter 15: Cloud and Virtualization
Chapter 16: Resiliency and Automation strategies
Chapter 17: Physical Security Controls

Part 4: Identity and Access Management
Chapter 18: Identity, Access and Accounts
Chapter 19: Identity and Access Services
Chapter 20: Identity and Access Management Controls

Part 5: Risk Management
Chapter 21: Policies, Plans and Procedures
Chapter 22: Risk Management and Business Impact Analysis Concepts
Chapter 23: Incident Response, Disaster Recovery and Continuity of Operation
Chapter 24: Digital forensics
Chapter 25: Compare and contrast various types of controls
Chapter 26: Data Security and Privacy Practices

Part 6: Cryptography and PKI
Chapter 27: Cryptography Concepts
Chapter 28: Cryptography Algorithms
Chapter 29: Wireless Security
Chapter 30: Public Key Infrastructure
show more

About Wm. Arthur Conklin

Wm. Arthur Conklin (Houston, TX), Security+, CISSP, is an Assistant Professor in the Information and Logistics Technology department at the University of Houston. In addition to his PhD, Mr. Conklin has a MBA from UTSA, and two graduate degrees in Electrical Engineering from the Naval Postgraduate School in Monterey, California. Dr. Conklins interests are information security, systems theory, and secure software design.



Greg White (San Antonio, TX), CompTIA Security+, CISSP, is an Associate Professor in the Department of Computer Science at the University of Texas at San Antonio. Dr. White is the Director of the Center for Infrastructure Assurance and Security at UTSA.



Chuck Cothren is a Research Scientist at University of Texas at San Antonio (UTSA) Center for Infrastructure Assurance and Security (CIAS) and currently serves on the Information Security Associations Alamo Chapter Board of Directors. Mr. Cothren has a wide array of security experience including performing controlled penetration testing, network security policies, computer intrusion forensics, and computer training. He is a Certified Information Systems Security Professional (CISSP) and has co-authored other McGraw-Hill/Osborne titles. Mr. Cothren holds a B.S. in Industrial Distribution from Texas A&M University.



Roger L. Davis is a Senior Internal Audit Manager at NuSkin Enterprises and is responsible for evaluating global business operations in over 35 countries. He is a retired Air Force Colonel with over 20 years of military and information security experience. Mr. Davis is a Certified Information Systems Security Professional (CISSP) and holds a Masters Degree in Computer Science from George Washington University.
show more

Rating details

22 ratings
4 out of 5 stars
5 32% (7)
4 41% (9)
3 23% (5)
2 5% (1)
1 0% (0)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X