Principles of Computer Security: CompTIA Security+ and Beyond, Fifth Edition (Exam SY0-501)

  • 23h 54m
  • Chuck Cothren, Dwayne Williams, Gregory White, Roger Davis, Wm. Author Conklin
  • McGraw-Hill/Osborne
  • 2018

Fully updated computer security essentials—quality approved by CompTIA

Learn IT security fundamentals while getting complete coverage of the objectives for the latest release of CompTIA Security+ certification exam SY0-501. This thoroughly revised, full-color textbook discusses communication, infrastructure, operational security, attack prevention, disaster recovery, computer forensics, and much more. Written by a pair of highly respected security educators, Principles of Computer Security: CompTIA Security+ and Beyond, Fifth Edition (Exam SY0-501) will help you pass the exam and become a CompTIA certified computer security expert.

Find out how to:

  • Ensure operational, organizational, and physical security
  • Use cryptography and public key infrastructures (PKIs)
  • Secure remote access, wireless networks, and virtual private networks (VPNs)
  • Authenticate users and lock down mobile devices
  • Harden network devices, operating systems, and applications
  • Prevent network attacks, such as denial of service, spoofing, hijacking, and password guessing
  • Combat viruses, worms, Trojan horses, and rootkits
  • Manage e-mail, instant messaging, and web security
  • Explore secure software development requirements
  • Implement disaster recovery and business continuity measures
  • Handle computer forensics and incident response
  • Understand legal, ethical, and privacy issues

Each chapter includes:

  • Learning objectives
  • Real-world examples
  • Try This! and Cross Check exercises
  • Tech Tips, Notes, and Warnings
  • Exam Tips
  • End-of-chapter quizzes and lab projects

In this Book

  • About This Book
  • Foreword
  • Introduction
  • Instructor Web Site
  • Introduction and Security Trends
  • General Security Concepts
  • Operational and Organizational Security
  • The Role of People in Security
  • Cryptography
  • Applied Cryptography
  • Public Key Infrastructure
  • Physical Security
  • Network Fundamentals
  • Infrastructure Security
  • Authentication and Remote Access
  • Wireless Security and Mobile Devices
  • Intrusion Detection Systems and Network Security
  • System Hardening and Baselines
  • Types of Attacks and Malicious Software
  • E-Mail and Instant Messaging
  • Web Components
  • Secure Software Development
  • Business Continuity, Disaster Recovery, and Organizational Policies
  • Risk Management
  • Change Management
  • Incident Response
  • Computer Forensics
  • Legal Issues and Ethics
  • Privacy
  • Glossary
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 5.0 of 4 users Rating 5.0 of 4 users (4)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)