Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401)

  • 11h 56m
  • Bobby E. Rogers, Mike Meyers
  • McGraw-Hill/Osborne
  • 2015

In Mike Meyers’ CompTIA Security+ Certification Guide (Exam SY0-401), the bestselling author and leading authority on CompTIA A+ certification brings his highly effective methodology to IT security for the first time. Like the exam, this book goes beyond knowledge application and is designed to ensure that security personnel anticipate security risks and guard against them. Meyers’ “in the trenches” voice and the clarity of his explanations make his books the bestselling self-study resources available for professional certification.

  • Digital content includes: 20+ lab simulations, 1+ hour of video training from Meyers, and hundreds of practice exam questions
  • McGraw-Hill Professional is a Platinum-Level CompTIA Authorized Partner
  • CAQC Authorized (CompTIA Approved Quality Curriculum)
  • Includes Mike's toolbox of favorite network security related freeware/shareware

About the Authors

Mike Meyers (Houston, TX) CompTIA A+, CompTIA Network+, CompTIA Security+, MCP is the industry’s leading authority on CompTIA A+ certification and the bestselling author of eight editions of CompTIA A+ Certification All-in-One Exam Guide.

Bobby E. Rogers, CompTIA Mobility+, CompTIA A+, CompTIA Network+, CompTIA Security+, is an information security engineer working as a contractor for Department of Defense agencies, helping to secure, certify, and accredit their information systems.

In this Book

  • CompTIA Approved Quality Content
  • Introduction
  • Meet the Security+ Exam
  • Assessment Exam
  • The Basics of Security
  • Understanding Security Governance
  • Risk Management
  • IT Risk Assessment
  • Understanding Cryptography
  • Cryptographic Methods
  • Application of Cryptographic Methods
  • Public Key Infrastructure
  • Understanding Identification and Authentication
  • Understanding Authorization
  • Authentication Methods and Services
  • User Account Management
  • Host Threats
  • Host Hardening
  • Hardening Host Network Services
  • Storage Security
  • Static Hosts
  • LAN Review
  • Network Threats
  • Network Hardening
  • Network Monitoring
  • Host Application Threats
  • Web Application Threats
  • Application Hardening
  • Internet Service Hardening
  • Virtualization Security
  • Wireless Threats
  • Wireless Hardening
  • Environmental Security and Controls
  • Perimeter and Physical Controls
  • Third-Party Security
  • Cloud Security
  • Mobile Security
  • Social Engineering
  • Security Training
  • Security Assessment
  • Incident Response
  • Forensics Procedures
  • Business Continuity
  • Disaster Recovery
  • Glossary