CompTIA Security+ Study Guide Authorized Courseware: Exam SY0-301, 5th Edition Front Cover

CompTIA Security+ Study Guide Authorized Courseware: Exam SY0-301, 5th Edition

  • Length: 696 pages
  • Edition: 5
  • Publisher:
  • Publication Date: 2011-06-28
  • ISBN-10: 1118014731
  • ISBN-13: 9781118014738
  • Sales Rank: #1108722 (See Top 100 Books)
Description

The preparation you need for the new CompTIA Security+ exam SY0-301

This top-selling study guide helps candidates prepare for exam SY0-301 and certification as a CompTIA Security+ administrator. Inside the new, CompTIA Authorized edition, you’ll find complete coverage of all Security+ exam objectives, loads of real-world examples, and a CD packed with cutting-edge exam prep tools. The book covers key exam topics such as general security concepts, infrastructure security, the basics of cryptography, and much more.

  • Provides 100% coverage of all exam objectives for the new CompTIA Security+ exam SY0-301 including:
    • Network security
    • Compliance and operational security
    • Threats and vulnerabilities
    • Application, data and host security
    • Access control and identity management
    • Cryptography
  • Covers key topics such as general security concepts, communication and infrastructure security, the basics of cryptography, operational security, and more
  • Offers practical examples and insights drawn from the real world
  • Includes a CD with two practice exams, all chapter review questions, electronic flashcards, and more

Obtain your Security+ certification and jump-start your career. It’s possible with the kind of thorough preparation you’ll receive from CompTIA Security+ Study Guide, 5th Edition.

Table of Contents

Chapter 1: Measuring and Weighing Risk
Chapter 2: Infrastructure and Connectivity
Chapter 3: Protecting Networks
Chapter 4: Threats and Vulnerabilities
Chapter 5: Access Control and Identity Management
Chapter 6: Educating and Protecting the User
Chapter 7: Operating System and Application Security
Chapter 8: Cryptography Basics
Chapter 9: Cryptography Implementation
Chapter 10: Physical and Hardware-Based Security
Chapter 11: Security and Vulnerability in the Network
Chapter 12: Wireless Networking Security
Chapter 13: Disaster Recovery and Incident Response
Chapter 14: Security-Related Policies and Procedures
Chapter 15: Security Administration
Appendix A: About the Companion CD

To access the link, solve the captcha.