دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 7
نویسندگان: Emmett Dulaney. Chuck Easttom
سری:
ISBN (شابک) : 1119416876, 9781119416876
ناشر: Sybex Inc
سال نشر: 2017
تعداد صفحات: 515
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 27 مگابایت
در صورت تبدیل فایل کتاب Comptia Security+ Study Guide: Exam SY0-501 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب راهنمای مطالعه Comptia Security+: Exam SY0-501 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
راهنمای مطالعه CompTIA Security+، ویرایش هفتم آمادگی ارزشمندی را برای آزمون SY0-501 ارائه می دهد. این کتاب که توسط یک تیم نویسنده متخصص نوشته شده است، 100٪ از اهداف امتحان را با توضیح واضح و مختصر پوشش می دهد. شما یاد خواهید گرفت که چگونه با استفاده از ابزارها و فناوری های استاندارد صنعت، با تهدیدات، حملات و آسیب پذیری ها مقابله کنید، در حالی که نقش معماری و طراحی را درک می کنید. از کارهای روزمره مانند مدیریت هویت و دسترسی تا موضوعات پیچیده مانند مدیریت ریسک و رمزنگاری، این راهنمای مطالعه به شما کمک میکند پایگاه دانش خود را در آمادگی برای آزمون Security+ تثبیت کنید. مثالهای عملی نشان میدهند که چگونه این فرآیندها در سناریوهای دنیای واقعی انجام میشوند و به شما این امکان را میدهند که بلافاصله مفاهیم ضروری را به برنامههای حین کار ترجمه کنید. شما همچنین به محیط یادگیری آنلاین Sybex دسترسی پیدا میکنید، که دارای یک جعبه ابزار قوی برای آمادگی کاملتر است: فلش کارتها، واژهنامه اصطلاحات کلیدی، سؤالات تمرینی، و یک امتحان پیشارزیابی شما را به همه چیزهایی که برای ورود به امتحان نیاز دارید مجهز میکند. مجموعه مهارت.
این راهنمای مطالعه توسط CompTIA تأیید و تأیید شده است، و بهطور کامل بهروزرسانی شده است تا با آخرین نسخه آزمون مطابقت داشته باشد. ابزارها و وظایف
گواهینامه CompTIA Security+ برای یک کارفرما ثابت می کند که شما دانش و مهارت لازم برای ایمن سازی برنامه ها، دستگاه ها و شبکه ها را دارید. تجزیه و تحلیل و پاسخ به تهدیدات؛ مشارکت در کاهش خطر، و خیلی بیشتر. از آنجایی که تهدیدهای داده هر روز بزرگتر می شوند، تقاضا برای متخصصان امنیتی واجد شرایط همچنان رو به افزایش است. اگر آمادهاید اولین گام را به سوی یک شغل پربار بردارید، راهنمای مطالعه CompTIA Security+، نسخه هفتم همراهی ایدهآل برای آمادگی کامل برای امتحان است.
CompTIA Security+ Study Guide, Seventh Edition offers invaluable preparation for Exam SY0-501. Written by an expert author team, this book covers 100% of the exam objectives with clear, concise explanation. You'll learn how to handle threats, attacks, and vulnerabilities using industry-standard tools and technologies, while understanding the role of architecture and design. From everyday tasks like identity and access management to complex topics like risk management and cryptography, this study guide helps you consolidate your knowledge base in preparation for the Security+ exam. Practical examples illustrate how these processes play out in real-world scenarios, allowing you to immediately translate essential concepts to on-the-job application. You also gain access to the Sybex online learning environment, which features a robust toolkit for more thorough prep: flashcards, glossary of key terms, practice questions, and a pre-assessment exam equip you with everything you need to enter the exam confident in your skill set.
This study guide is approved and endorsed by CompTIA, and has been fully updated to align with the latest version of the exam.
To an employer, the CompTIA Security+ certification proves that you have the knowledge base and skill set to secure applications, devices, and networks; analyze and respond to threats; participate in risk mitigation, and so much more. As data threats loom larger every day, the demand for qualified security professionals will only continue to grow. If you're ready to take the first step toward a rewarding career, CompTIA Security+ Study Guide, Seventh Edition is the ideal companion for thorough exam preparation.
CompTIA® Security+® Study Guide Acknowledgments About the Authors Contents at a Glance Contents Table of Exercises Introduction Assessment Test Answers to Assessment Test Chapter 1 Managing Risk Risk Terminology Threat Assessment Risk Assessment Computing Risk Assessment Assessing Privacy Acting on Your Risk Assessment Risks Associated with Cloud Computing Risks Associated with Virtualization Developing Policies, Standards, and Guidelines Implementing Policies Understanding Control Types and False Positives/Negatives Risk Management Best Practices Change Management Summary Exam Essentials Review Questions Chapter 2 Monitoring and Diagnosing Networks Monitoring and Diagnosing Networks Terminology Frameworks, Best Practices, and Configuration Guides Industry-Standard Frameworks and Reference Architectures National Institute of Standards and Technology (NIST) Benchmarks/Secure Configuration Guides Secure Network Architecture Concepts Zones Tunneling/VPN Placing Security Devices SDN IDS vs. IPS Secure Systems Design Hardware and Firmware Security Operating Systems Peripherals Secure Staging Deployment Concepts Summary Exam Essentials Review Questions Chapter 3 Understanding Devices and Infrastructure Infrastructure Terminology Designing with Security in Mind Firewalls VPNs and VPN Concentrators Intrusion Detection Systems Router Switch Proxy Load Balancer Access Point SIEM DLP Network Access Control (NAC) Mail Gateway Bridge SSL/TLS Accelerators SSL Decryptors Media Gateway Hardware Security Module Summary Exam Essentials Review Questions Chapter 4 Identity and Access Management Using Tools to Assess Your Network Protocol Analyzer Network Scanners Password Cracker Vulnerability Scanners Command-Line Tools Additional Tools Troubleshooting Common Security Issues Access Issues Configuration Issues Security Technologies Intrusion Detection Systems Antimalware Firewalls and Related Devices Other Systems Identity and Access Management Concepts Identification vs. Authentication Authentication (Single Factor) and Authorization Multifactor Authentication Biometrics Federations Potential Authentication and Access Problems LDAP PAP, SPAP, and CHAP Kerberos Working with RADIUS TACACS, TACACS+, XTACACS OATH One-Time Passwords SAML Install and Configure Identity and Access Services Mandatory Access Control Discretionary Access Control Role-Based Access Control Rule-Based Access Control ABAC Smartcards Tokens File and Database Security Summary Exam Essentials Review Questions Chapter 5 Wireless Network Threats Wireless Threat Terminology Wireless Vulnerabilities to Know Replay Rogue APs and Evil Twins Jamming WPS Bluejacking Bluesnarfing NFC and RFID Disassociation Wireless Commonsense Wireless Attack Analogy Summary Exam Essentials Review Questions Chapter 6 Securing the Cloud Cloud-Related Terminology Working with Cloud Computing Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Private Cloud Public Cloud Community Cloud Hybrid Cloud Working with Virtualization Understanding Hypervisors Understanding Containers and Application Cells VDI/VDE On-Premise vs. Hosted vs. Cloud VM Escape Protection VM Sprawl Avoidance Security and the Cloud Cloud Access Security Brokers Cloud Storage Security as a Service Summary Exam Essentials Review Questions Chapter 7 Host, Data, and Application Security Threat Actors and Attributes Script Kiddies Hacktivist Organized Crime Nation-States/APT Insiders Competitors Use of Open Source Intelligence Types of Vulnerabilities Configuration Issues User Issues Zero-Day Exploits Other Issues Embedded Systems Security Application Vulnerabilities Input Vulnerabilities Memory Vulnerabilities Secure Programming Programming Models Software Testing Specific Types of Testing Secure Coding Standards Application Configuration Baselining Operating System Patch Management Application Patch Management Other Application Security Issues Databases and Technologies Database Security Secure Configurations Code Issues Summary Exam Essentials Review Questions Chapter 8 Cryptography An Overview of Cryptography Historical Cryptography Modern Cryptography Working with Symmetric Algorithms Working with Asymmetric Algorithms Cryptography Concepts Hashing Algorithms Rainbow Tables and Salt Key Stretching Cryptanalysis Methods Wi-Fi Encryption Using Cryptographic Systems Confidentiality and Strength Integrity When to Encrypt Digital Signatures Authentication Nonrepudiation Key Features Understanding Cryptography Standards and Protocols The Origins of Encryption Standards Public Key Infrastructure X.509/Public Key Cryptography Standards X.509 Public Key Infrastructure Pretty Good Privacy SSL and TLS Using Public Key Infrastructure Hardware-Based Encryption Devices Data Encryption Authentication Summary Exam Essentials Review Questions Chapter 9 Threats, Attacks, and Vulnerabilities Threat and Attack Terminology Living in a World of Viruses Symptoms of a Virus Infection How Viruses Work Types of Viruses Managing Spam to Avoid Viruses Antivirus Software Malware and Crypto-Malware Understanding Various Types of Application/Service Attacks Identifying Denial-of-Service and Distributed Denial-of-Service Attacks Man-in-the-Middle Attacks Buffer Overflow Injection Cross-Site Scripting and Request Forgery Privilege Escalation ARP Poisoning Amplification DNS Poisoning Domain Hijacking Man-in-the-Browser Zero-Day Exploits Replay Attacks Pass the Hash Hijacking and Related Attacks Driver Manipulation MAC and IP Spoofing Attacks Summary Exam Essentials Review Questions Chapter 10 Social Engineering and Other Foes Social Engineering and Physical Security Terminology Understanding Social Engineering Types of Social Engineering Attacks What Motivates an Attack? The Principles Behind Social Engineering Social Engineering Attack Examples Understanding Physical Security Lighting Signs Fencing, Gates, and Cages Security Guards Alarms Safe Secure Cabinets and Enclosures Protected Distribution Protected Cabling Airgap Mantrap Faraday Cage Lock Types Biometrics Barricades/Bollards Tokens/Cards Environmental Controls Cable Locks Screen Filters Cameras Motion Detection Logs Infrared Detection Key Management Various Control Types An Analogy of Control Types Data Security and Privacy Practices Data Destruction and Media Sanitation Data Sensitivity Labeling and Handling Data Roles Data Retention Legal and Compliance Summary Exam Essentials Review Questions Chapter 11 Security Administration Connection Types Cellular Bluetooth Wi-Fi Infrared SATCOM Mobile Devices BYOD Issues Enforcement Account Management Concepts Account Types General Concepts Summary Exam Essentials Review Questions Chapter 12 Disaster Recovery and Incident Response Disaster and Incident Related Terminology Penetration Testing What Should You Test? Vulnerability Scanning Issues Associated with Business Continuity Types of Storage Mechanisms Crafting a Disaster-Recovery Plan Incident Response Procedures Understanding Incident Response Tabletop Exercises Summary Exam Essentials Review Questions Appendix Answers to Review Questions Chapter 1: Managing Risk Chapter 2: Monitoring and Diagnosing Networks Chapter 3: Understanding Devices and Infrastructure Chapter 4: Identity and Access Management Chapter 5: Wireless Network Threats Chapter 6: Securing the Cloud Chapter 7: Host, Data, and Application Security Chapter 8: Cryptography Chapter 9: Threats, Attacks, and Vulnerabilities Chapter 10: Social Engineering and Other Foes Chapter 11: Security Administration Chapter 12: Disaster Recovery and Incident Response Index Advert EULA