CompTIA Security+ Guide to Network Security Fundamentals
Häftad, Engelska, 2020
1 649 kr
Finns i fler format (1)
Produktinformation
- Utgivningsdatum2020-12-16
- Mått213 x 22 x 274 mm
- Vikt1 156 g
- SpråkEngelska
- Antal sidor784
- Upplaga7
- FörlagCengage Learning
- EAN9780357424377
Mer från samma författare
Technology for Success and Shelly Cashman Series Microsoft®Office 365 & Office 2019
Sandra Cable, Jennifer Campbell, Mark Ciampa, Barbara Clemens, Steven Freund, Mark Frydenberg, Ralph Hooper, Ellen Monk, Lisa Ruffolo, Susan Sebok, Joy Starks, Misty Vermaat, Sandra (NA) Cable, Jennifer (NA) Campbell, Mark (Western Kentucky University) Ciampa, Steven (University of Central Florida) Freund, Mark (Bentley University) Frydenberg, Ralph (Austin Community College) Hooper, Ellen (University of Delaware) Monk, Lisa (The Software Resource) Ruffolo
1 899 kr
Technology for Success
Jennifer Campbell, Mark Ciampa, Barbara Clemens, Steven Freund, Mark Frydenberg, Ralph Hooper, Lisa Ruffolo, Jill West, Jennifer (NA) Campbell, Mark (Western Kentucky University) Ciampa, Steven (University of Central Florida) Freund, Mark (Bentley University) Frydenberg, Ralph (Austin Community College) Hooper, Lisa (The Software Resource) Ruffolo, Jill (Georgia Northwestern Technical College) West
1 089 kr
Discovering Computers: Digital Technology, Data, and Devices
Jennifer Campbell, Mark Ciampa, Steven Freund, Mark Frydenberg, Susan Sebok, Misty Vermaat, Barbara Clemens, Jennifer (NA) Campbell, Mark (Western Kentucky University) Ciampa, Steven (University of Central Florida) Freund, Mark (Bentley University) Frydenberg, Susan (NA) Sebok, Misty (Purdue University Calumet) Vermaat
1 629 kr
Technology for Success and The Shelly Cashman Series® Microsoft® 365® & Office® 2021
Sandra Cable, Jennifer Campbell, Mark Ciampa, Barbara Clemens, Steven Freund, Ralph Hooper, Ellen Monk, Susan Sebok, Lisa Ruffolo, Joy Starks, Misty Vermaat, Corinne Hoisington, Sandra (NA) Cable, Jennifer (NA) Campbell, Mark (Western Kentucky University) Ciampa, Steven (University of Central Florida) Freund, Ralph (Austin Community College) Hooper, Ellen (University of Delaware) Monk, Susan (NA) Sebok, Lisa (The Software Resource) Ruffolo
1 899 kr
Technology For Success & The Shelly Cashman Series® Microsoft® 365® & Office® Introductory, First Edition
Jennifer Campbell, Mark Ciampa, Steven Freund, Rob Wilson, Lisa Ruffolo, Susan Sebok, Misty Vermaat, Jennifer (NA) Campbell, Mark (Western Kentucky University) Ciampa, Steven (University of Central Florida) Freund, Lisa (The Software Resource) Ruffolo, Susan (NA) Sebok, Misty (Purdue University Calumet) Vermaat
1 829 kr
Technology for Success
Jennifer Campbell, Mark Ciampa, Barbara Clemens, Steven Freund, Lisa Ruffolo, Jill West, Jennifer (NA) Campbell, Mark (Western Kentucky University) Ciampa, Steven (University of Central Florida) Freund, Lisa (The Software Resource) Ruffolo, Jill (Georgia Northwestern Technical College) West
869 kr
Du kanske också är intresserad av
Technology For Success & The Shelly Cashman Series® Microsoft® 365® & Office® Introductory, First Edition
Jennifer Campbell, Mark Ciampa, Steven Freund, Rob Wilson, Lisa Ruffolo, Susan Sebok, Misty Vermaat, Jennifer (NA) Campbell, Mark (Western Kentucky University) Ciampa, Steven (University of Central Florida) Freund, Lisa (The Software Resource) Ruffolo, Susan (NA) Sebok, Misty (Purdue University Calumet) Vermaat
1 829 kr
Technology for Success
Jennifer Campbell, Mark Ciampa, Barbara Clemens, Steven Freund, Lisa Ruffolo, Jill West, Jennifer (NA) Campbell, Mark (Western Kentucky University) Ciampa, Steven (University of Central Florida) Freund, Lisa (The Software Resource) Ruffolo, Jill (Georgia Northwestern Technical College) West
869 kr
Technology for Success and The Shelly Cashman Series® Microsoft® 365® & Office® 2021
Sandra Cable, Jennifer Campbell, Mark Ciampa, Barbara Clemens, Steven Freund, Ralph Hooper, Ellen Monk, Susan Sebok, Lisa Ruffolo, Joy Starks, Misty Vermaat, Corinne Hoisington, Sandra (NA) Cable, Jennifer (NA) Campbell, Mark (Western Kentucky University) Ciampa, Steven (University of Central Florida) Freund, Ralph (Austin Community College) Hooper, Ellen (University of Delaware) Monk, Susan (NA) Sebok, Lisa (The Software Resource) Ruffolo
1 899 kr
Technology for Success and Shelly Cashman Series Microsoft®Office 365 & Office 2019
Sandra Cable, Jennifer Campbell, Mark Ciampa, Barbara Clemens, Steven Freund, Mark Frydenberg, Ralph Hooper, Ellen Monk, Lisa Ruffolo, Susan Sebok, Joy Starks, Misty Vermaat, Sandra (NA) Cable, Jennifer (NA) Campbell, Mark (Western Kentucky University) Ciampa, Steven (University of Central Florida) Freund, Mark (Bentley University) Frydenberg, Ralph (Austin Community College) Hooper, Ellen (University of Delaware) Monk, Lisa (The Software Resource) Ruffolo
1 899 kr
Technology for Success
Jennifer Campbell, Mark Ciampa, Barbara Clemens, Steven Freund, Mark Frydenberg, Ralph Hooper, Lisa Ruffolo, Jill West, Jennifer (NA) Campbell, Mark (Western Kentucky University) Ciampa, Steven (University of Central Florida) Freund, Mark (Bentley University) Frydenberg, Ralph (Austin Community College) Hooper, Lisa (The Software Resource) Ruffolo, Jill (Georgia Northwestern Technical College) West
1 089 kr
Discovering Computers: Digital Technology, Data, and Devices
Jennifer Campbell, Mark Ciampa, Steven Freund, Mark Frydenberg, Susan Sebok, Misty Vermaat, Barbara Clemens, Jennifer (NA) Campbell, Mark (Western Kentucky University) Ciampa, Steven (University of Central Florida) Freund, Mark (Bentley University) Frydenberg, Susan (NA) Sebok, Misty (Purdue University Calumet) Vermaat
1 629 kr
Tillhör följande kategorier
Dr. Mark Ciampa is a professor of analytics and information systems and the program director of the graduate Cybersecurity Data Analytics program in the Gordon Ford College of Business at Western Kentucky University in Bowling Green, Kentucky. Prior to this, he was an associate professor and served as Director of Academic Computing at Volunteer State Community College in Gallatin, Tennessee for 20 years. Mark has worked in the IT industry as a computer consultant for businesses, government agencies and educational institutions. He has published over 25 articles in peer-reviewed journals and books. He is also the author of over 30 technology textbooks from Cengage, including "Security+ Guide to Network Security Fundamentals," 8e, "CompTIA CySA+ Guide to Cybersecurity Analyst," 3e, "CWNA Guide to Wireless LANs," 3e, "Guide to Wireless Communications," "Security Awareness: Applying Practical Cybersecurity In Your World," 6e and "Networking BASICS." Dr. Ciampa holds a PhD in technology management with a specialization in digital communication systems from Indiana State University and has certifications in security and healthcare.
- I. SECURITY FUNDAMENTALS1.Introduction to Securitya.Who are the attackers?i.Categories of threat actors ii.Attributes of actors b.Attack vectors and their causesi.Avenues of attacks ii.Vulnerabilities that create attack vectors iii.Social engineering attacks c.Cybersecurity standards i.Regulations and standards ii.Frameworks iii.Configuration guidelines d.Sources of informationi.Threat intelligence sources ii.Research sources 2.Security Evaluationsa.Security assessments i.Threat hunting ii.Vulnerability scansiii.Security information and event management (SIEM) iv.Security orchestration, automation, response (SOAR)b.Penetration testing i.What is penetration testing? ii.Types of reconnaissance iii.Exercise types (II. DEVICE SECURITY3.Threats and Attacks on Devices a.Attacks using malware i.Circulationii.Infectioniii.Concealmentiv.Payload capabilitiesb.Adversarial AI attacks c.Application attacks i.Web server application attacksii.Hijackingiii.Overflow attacksiv.Advertising attacksv.Browser vulnerabilities4.Client and Application Securitya.Securing client devices i.Endpoint protection ii.Boot integrity iii.Database protection iv.Hardware and software protection b.Creating and deploying SecDevOps i.Application developmentii.Secure coding techniquesiii.Code testing5.Mobile, Embedded and Specialized Device Securitya.Securing mobile devices i.Mobile device types and deploymentii.Mobile device risksiii.Securing mobile devicesiv.Mobile management toolsb.Embedded and IoT device security i.Types of embedded systemsii.IoT devicesiii.Specialized devicesc.Keeping specialized devices secure i.Vulnerabilities ii.Securing communications III. CRYPTOGRAPHY6.Basic Cryptography a.Defining cryptographyb.Cryptographic algorithmsc.Cryptographic attacksd.Using cryptography7.Advanced Cryptography and PKI a.Implementing cryptographyb.Digital certificatesc.Public Key Infrastructure (PKI)d.Cryptographic transport protocols IV. NETWORK SECURITY8.Network Threats, Assessments, and Defensesa.Attacks on networks i.Interceptionii.Poisoningiii.Denial of Serviceb.Assessing network and organizational security i.Network reconnaissance and discovery ii.File manipulation iii.Shell and script environments iv.Packet capture and replay c.Physical security defenses i.External perimeter defensesii.Internal physical access securityiii.Computer hardware security9.Network Security Design and Technologiesa.Security through network devices i.Standard network devicesii.Network security hardwareb.Security through architecture and design c.Implementing secure protocols d.Enterprise network security concepts i.Configuration management ii.Data protection 10.Wireless Network Security a.Wireless attacks i.Bluetooth attacksii.Near field communication attacksiii.Radio frequency identification attacksiv.Wireless local area network attacksb.Vulnerabilities of IEEE wireless securityc.Wireless security solutions i.Wi-Fi Protected Access ii.Wi-Fi Protected Access 2iii.Additional wireless security protections11.Cloud and Virtualization Security a.Cloud securityi.Cloud concepts and models ii.Cloud security solutions 1.Cloud security controls2.Cloud security solutionsb.Virtualization securityi.Virtualization concepts ii.Securing virtual environments ENTERPRISE SECURITY12.Identity and Access Management (IAM) a.Authentication credentials i.What you know: passwordsii.What you have: tokens, cards, and cell phonesiii.What you are: biometricsiv.What you do: behavioral biometricsv.Where you are: geolocationb.Identity and account management controls c.Access services 13.Incident Response and Investigationa.Incident response plans and procedures i.What is an incident response plan? ii.Incident response exercises iii.Attack frameworks b.Investiga