Prepare for the CompTIA Security+ certification exam that covers the skills required to perform core security functions and pursue a career in IT. You will learn the basic principles of network security. Computer network vulnerabilities and threats are covered and you will learn how to safeguard computer networks. Network security planning, technology, and organization are discussed along with associated legal and ethical issues.
Lesson objectives and instruction succinctly review each major topic, including: network fundamentals, operational and organizational security, risk management, wireless security, change management, physical security, forensics, network attacks, and much more.
What You Will LearnIdentify the concepts of confidentiality, integrity, and availabilityImplement secure network administration principlesApply appropriate risk mitigation strategiesExplain the impact of physical security on computer and network securityUse assessment tools to discover security threats and vulnerabilitiesImplement appropriate security controls when performing account managementWho This Book Is For
Security professionals looking to get this credential, including systems administrators, network administrators, security administrators, junior IT auditors and penetration testers, security specialists, security consultants, security engineers, and more
Sheikh
CompTIA Security+ Certification Study Guide jetzt bestellen!
Zielgruppe
Professional/practitioner
Weitere Infos & Material
Chapter 1: General Security Concepts and Trends.- Chapter 2: Network Fundamentals Infrastructure Security.- Chapter 3: Wireless and Intrusion Detection System Network Security.- Chapter 4: Role of People in Security—Operational and Organizational Security.- Chapter 5: Risk Management.- Chapter 6: Change Management and Disaster Recovery.- Chapter 7: Physical Security.- Chapter 8: Forensics, Legal Issues, and Privacy.- Chapter 9: Attacks.- Chapter 10: Network Attacks.- Chapter 11: Baseline and Secure Software Development.- Chapter 12: Email, Instant Messaging, and Web Components.- Chapter 13: Authentication and Remote Access.- Chapter 14: Access Control and Privilege Management.- Chapter 15: Cryptography.- Chapter 16: Public Key Infrastructure.- Glossary.-
Ahmed Sheikh
is a Fulbright alumnus and has earned a master's degree in electrical engineering from Kansas State University, USA. He is a seasoned IT expert with a specialty in network security planning and skills in cloud computing. Currently, he is working as IT Expert Engineer at a leading IT electrical company.