CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)

  • 30h 40m 21s
  • Greg White, Wm. Arthur Conklin
  • Recorded Books, Inc.
  • 2023

This fully updated study guide covers every topic on the current version of the CompTIA Security+ exam.

Get complete coverage of all objectives included on the CompTIA Security+ exam SY0-601 from this comprehensive resource. Written by a team of leading information security experts, this authoritative guide fully addresses the skills required to perform essential security functions and to secure hardware, systems, and software. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference.

Covers all exam domains, including: threats, attacks, and vulnerabilities; architecture and design; implementation; operations and incident response; and governance, risk, and compliance.

Online content includes: 250 practice exam questions and a test engine that provides full-length practice exams and customizable quizzes by chapter or by exam domain.

About the Author

Wm. Arthur Conklin, CompTIA Security+, CISSP, is an assistant professor in the Department of Information and Logistics Technology at the University of Houston.

Gregory White, CompTIA Security+, CISSP, is an associate professor in the Department of Computer Science at the University of Texas at San Antonio.

Greg White (San Antonio, TX), CompTIA Security+, CISSP, is an Associate Professor in the Department of Computer Science at the University of Texas at San Antonio. Dr. White is the Director of the Center for Infrastructure Assurance and Security at UTSA.

In this Audiobook

  • Introduction
  • Chapter 1 - Social Engineering Techniques
  • Chapter 2 - Types of Attack Indicators
  • Chapter 3 - Application Attack Indicators
  • Chapter 4 - Network Attack Indicators
  • Chapter 5 - Threat Actors, Vectors, and Intelligence Sources
  • Chapter 6 - Vulnerabilities
  • Chapter 7 - Security Assessments
  • Chapter 8 - Penetration Testing
  • Chapter 9 - Enterprise Security Architecture
  • Chapter 10 - Virtualization and Cloud Security
  • Chapter 11 - Secure Application Development, Deployment, and Automation Concepts
  • Chapter 12 - Authentication and Authorization
  • Chapter 13 - Cybersecurity Resilience
  • Chapter 14 - Embedded and Specialized Systems
  • Chapter 15 - Physical Security Controls
  • Chapter 16 - Cryptographic Concepts
  • Chapter 17 - Secure Protocols
  • Chapter 18 - Host and Application Security
  • Chapter 19 - Secure Network Design
  • Chapter 20 - Wireless Security
  • Chapter 21 - Secure Mobile Solutions
  • Chapter 22 - Implementing Cloud Security
  • Chapter 23 - Identity and Account Management Controls
  • Chapter 24 - Implement Authentication and Authorization
  • Chapter 25 - Public Key Infrastructure
  • Chapter 26 - Tools/Assess Organizational Security
  • Chapter 27 - Incident Response Policies, Processes, and Procedures
  • Chapter 28 - Investigations
  • Chapter 29 - Mitigation Techniques and Controls
  • Chapter 30 - Digital Forensics
  • Chapter 31 - Security Controls
  • Chapter 32 - Regulations, Standards, and Frameworks
  • Chapter 33 - Organizational Policies
  • Chapter 34 - Risk Management
  • Chapter 35 - Privacy
  • Appendix A OSI Model and Internet Protocols
  • Appendix B About the Online Content
SHOW MORE
FREE ACCESS

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE