The best fully integrated study system available
Official CompTIA Content! Prepare for CompTIA Security+ Exam SY0-301 with McGraw-Hillâ€”a Gold-Level CompTIA Authorized Partner offering Official CompTIA Approved Quality Content to give you the competitive edge on exam day.
With hundreds of practice questions and hands-on exercises, CompTIA Security+ Certification Study Guide covers what you need to know--and shows you how to prepare--for this challenging exam.
Covers all the exam topics, including:
Networking Basics and Terminology * Security Terminology * Security Policies and Standards * Types of Attacks * System Security Threats * Mitigating Security Threats * Implementing System Security * Securing the Network Infrastructure * Wireless Networking and Security * Authentication * Access Control * Cryptography * Managing a Public Key Infrastructure * Physical Security * Risk Analysis * Disaster Recovery and Business Continuity * Computer Forensics * Security Assessments and Audits * Monitoring and Auditing
with free online registration:
From the Author
Security is a critical part of information systems, and the need is on the rise for IT
professionals proficient in configuring systems in a secure manner and able to assess
security. The CompTIA Security+ Certification Study Guide is a comprehensive book that is designed to help you prepare for the Security+ exam (SY0-301), but also serves as a practical reference you can use after obtaining your certification.
This book is organized to serve as an in-depth review for the CompTIA Security+ certification exam (SY0-301) for both experienced security professionals and newcomers to the field of information system security. Each chapter covers a major aspect of the exam, with an emphasis on the â€œwhyâ€ as well as on the â€œhow toâ€ help organizations understand critical security technologies that should be implemented in their environment. This book also helps you understand how to assess and recommend ways of improving security within a company.
Chapter 1: Network Basics and Terminology
Chapter 2: Introduction to Security Terminology
Chapter 3: Security Policies and Standards
Chapter 4: Types of Attacks
Chapter 5: System Security Threats
Chapter 6: Mitigating Security Threats
Chapter 7: Implementing System Security
Chapter 8: Securing the Network Infrastructure
Chapter 9: Wireless Networking and Security
Chapter 10: Authentication
Chapter 11: Access Control
Chapter 12: Introduction to Cryptography
Chapter 13: Managing a Public Key Infrastructure
Chapter 14: Physical Security
Chapter 15: Risk Analysis
Chapter 16: Disaster Recovery and Business Continuity
Chapter 17: Introduction to Computer Forensics
Chapter 18: Security Assessments and Audits
Chapter 19: Understanding Monitoring and Auditing
Appendix: About the CD
Choose a Format to Add to Cart