Buy CompTIA Security Guide to Network Security Fundamentals, 7th Edition PDF ebook by author Mark Ciampa – published by Cengage Learning in 2022 and save up to 80% compared to the print version of this textbook. With PDF version of this textbook, not only save you money, you can also highlight, add text, underline add post-it notes, bookmarks to pages, instantly search for the major terms or chapter titles, etc.
You can search our site for other versions of the CompTIA Security Guide to Network Security Fundamentals, 7th Edition PDF ebook. You can also search for others PDF ebooks from publisher Cengage Learning, as well as from your favorite authors. We have thousands of online textbooks and course materials (mostly in PDF) that you can download immediately after purchase.
Note: e-textBooks do not come with access codes, CDs/DVDs, workbooks, and other supplemental items.
- Full title: CompTIA Security Guide to Network Security Fundamentals, 7th Edition
- Edition: 7th
- Copyright year: 2022
- Publisher: Cengage Learning
- Author: Mark Ciampa
- ISBN: 9780357424506, 9780357424506
- Format: PDF
Description of CompTIA Security Guide to Network Security Fundamentals, 7th Edition:
This best-selling guide provides a complete, practical, and thoroughly up-to-date introduction to network and computer security. COMPTIA SECURITY GUIDE TO NETWORK SECURITY FUNDAMENTALS, Seventh Edition, maps to the new CompTIA Security SY0-601 Certification Exam, providing comprehensive coverage of all domain objectives to help readers prepare for professional certification and career success.Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.
Table of Contents of CompTIA Security Guide to Network Security Fundamentals, 7th Edition PDF ebook:
Brief ContentsTable of ContentsIntroductionPart 1: Security FundamentalsModule 1: Introduction To SecurityWhat Is Information Security?Who Are the Threat Actors?Vulnerabilities and AttacksSummaryKey TermsReview QuestionsCase ProjectsModule 2: Threat Management and Cybersecurity ResourcesPenetration TestingVulnerability ScanningCybersecurity ResourcesSummaryKey TermsReview QuestionsCase ProjectsPart 2: Endpoint SecurityModule 3: Threats and Attacks on EndpointsAttacks Using MalwareApplication AttacksAdversarial Artificial Intelligence AttacksSummaryKey TermsReview QuestionsCase ProjectsModule 4: Endpoint and Application Development SecurityThreat Intelligence SourcesSecuring Endpoint ComputersCreating and Deploying SecDevOpsSummaryKey TermsReview QuestionsCase ProjectsModule 5: Mobile, Embedded, and Specialized Device SecuritySecuring Mobile DevicesEmbedded Systems and Specialized DevicesSummaryKey TermsReview QuestionsCase ProjectsPart 3: CryptographyModule 6: Basic CryptographyDefining CryptographyCryptographic AlgorithmsCryptographic Attacks and DefensesUsing CryptographySummaryKey TermsReview QuestionsCase ProjectsModule 7: Public Key Infrastructure and Cryptographic ProtocolsDigital CertificatesPublic Key Infrastructure (PKI)Cryptographic ProtocolsImplementing CryptographySummaryKey TermsReview QuestionsCase ProjectsPart 4: Network SecurityModule 8: Networking Threats, Assessments, and DefensesAttacks on NetworksTools for Assessment and DefensePhysical Security ControlsSummaryKey TermsReview QuestionsCase ProjectsModule 9: Network Security Appliances and TechnologiesSecurity AppliancesSecurity TechnologiesSummaryKey TermsReview QuestionsCase ProjectsModule 10: Cloud and Virtualization SecurityCloud SecurityVirtualization SecuritySecure Network ProtocolsSummaryKey TermsReview QuestionsCase ProjectsModule 11: Wireless Network SecurityWireless AttacksVulnerabilities of WLAN SecurityWireless Security SolutionsAdditional Wireless Security ProtectionsSummaryKey TermsReview QuestionsCase ProjectsPart 5: Enterprise SecurityModule 12: AuthenticationTypes of Authentication CredentialsAuthentication SolutionsSummaryKey TermsReview QuestionsCase ProjectsModule 13: Incident Preparation, Response, and InvestigationIncident PreparationIncident ResponseIncident InvestigationSummaryKey TermsReview QuestionsCase ProjectsModule 14: Cybersecurity ResilienceBusiness ContinuityPoliciesSummaryKey TermsReview QuestionsCase ProjectsModule 15: Risk Management and Data PrivacyManaging RiskData PrivacySummaryKey TermsReview QuestionsCase ProjectsAppendices A: Comptia Security+ SY0-601 Certification Exam ObjectivesAppendices B: Two Rights & A Wrong: AnswersGlossaryIndex