Contents at a Glance

Introduction

Part I: Threats, Attacks, and Vulnerabilities

CHAPTER 1 Comparing and Contrasting Different Types of Social Engineering Techniques

CHAPTER 2 Analyzing Potential Indicators to Determine the Type of Attack

CHAPTER 3 Analyzing Potential Indicators Associated with Application Attacks

CHAPTER 4 Analyzing Potential Indicators Associated with Network Attacks

CHAPTER 5 Understanding Different Threat Actors, Vectors, and Intelligence Sources

CHAPTER 6 Understanding the Security Concerns Associated with Various Types of Vulnerabilities

CHAPTER 7 Summarizing the Techniques Used in Security Assessments

CHAPTER 8 Understanding the Techniques Used in Penetration Testing

Part II: Architecture and Design

CHAPTER 9 Understanding the Importance of Security Concepts in an Enterprise Environment

CHAPTER 10 Summarizing Virtualization and Cloud Computing Concepts

CHAPTER 11 Summarizing Secure Application Development, Deployment, and Automation Concepts

CHAPTER 12 Summarizing Authentication and Authorization Design Concepts

CHAPTER 13 Implementing Cybersecurity Resilience

CHAPTER 14 Understanding the Security Implications of Embedded and Specialized Systems

CHAPTER 15 Understanding the Importance of Physical Security Controls

CHAPTER 16 Summarizing the Basics of Cryptographic Concepts

Part III: Implementation

CHAPTER 17 Implementing Secure Protocols

CHAPTER 18 Implementing Host or Application Security Solutions

CHAPTER 19 Implementing Secure Network Designs

CHAPTER 20 Installing and Configuring Wireless Security Settings

CHAPTER 21 Implementing Secure Mobile Solutions

CHAPTER 22 Applying Cybersecurity Solutions to the Cloud

CHAPTER 23 Implementing Identity and Account Management Controls

CHAPTER 24 Implementing Authentication and Authorization Solutions

CHAPTER 25 Implementing Public Key Infrastructure

Part IV: Operations and Incident Response

CHAPTER 26 Using the Appropriate Tool to Assess Organizational Security

CHAPTER 27 Summarizing the Importance of Policies, Processes, and Procedures for Incident Response

CHAPTER 28 Using Appropriate Data Sources to Support an Investigation

CHAPTER 29 Applying Mitigation Techniques or Controls to Secure an Environment

CHAPTER 30 Understanding the Key Aspects of Digital Forensics

Part V: Governance, Risk, and Compliance

CHAPTER 31 Comparing and Contrasting the Various Types of Controls

CHAPTER 32 Understanding the Importance of Applicable Regulations, Standards, or Frameworks That Impact Organizational Security Posture

CHAPTER 33 Understanding the Importance of Policies to Organizational Security

CHAPTER 34 Summarizing Risk Management Processes and Concepts

CHAPTER 35 Understanding Privacy and Sensitive Data Concepts in Relation to Security

Part VI: Final Preparation

CHAPTER 36 Final Preparation

Glossary of Key Terms

APPENDIX A Answers to the “Do I Know This Already?” Quizzes and Review Questions

APPENDIX B CompTIA Security+ (SY0-601) Cert Guide Exam Updates

Index

Online Elements:

APPENDIX C Study Planner

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.149.27.202