ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601)

دانلود کتاب راهنمای گواهینامه CompTIA Security+ Mike Meyers، نسخه سوم (Exam SY0-601)

Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601)

مشخصات کتاب

Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601)

ویرایش: [3 ed.] 
نویسندگان:   
سری:  
ISBN (شابک) : 1260473694, 9781260473698 
ناشر: McGraw-Hill Education 
سال نشر: 2021 
تعداد صفحات: 832
[1258] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 31 Mb 

قیمت کتاب (تومان) : 51,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 5


در صورت تبدیل فایل کتاب Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب راهنمای گواهینامه CompTIA Security+ Mike Meyers، نسخه سوم (Exam SY0-601) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب راهنمای گواهینامه CompTIA Security+ Mike Meyers، نسخه سوم (Exam SY0-601)

راهنمای آزمون CompTIA Security+ به روز از استاد آموزش و آمادگی امتحان مایک مایرز در راهنمای گواهینامه CompTIA Security+™ Mike Meyers، نسخه سوم (Exam SY0-601)، متخصص برجسته در زمینه صدور گواهینامه و آموزش CompTIA روش‌شناسی بسیار مؤثر خود را برای امنیت فناوری اطلاعات آورده است. در هر فصل، ماژول ها اهداف امتحانی خاص را مشخص می کنند و مسیر یادگیری روشنی را ارائه می دهند. تمام اهداف آزمون رسمی پوشش داده شده است، و سوالات امتحان تمرینی پایان فصل مفاهیم ارائه شده را تقویت می کند. این منبع عملی فراتر از کاربرد دانش است و به شما مهارت هایی را می آموزد که برای پیش بینی خطرات امنیتی و محافظت در برابر آنها نیاز دارید. شامل تمامی مباحث امتحانی از جمله:
  • مدیریت ریسک
  • رمزنگاری
  • تأیید هویت و مجوز
  • میزبان، LAN و امنیت برنامه
  • امنیت بی‌سیم، ابری و موبایل
  • امنیت و کنترل‌های محیطی
محتوای آنلاین شامل:
  • 200+ سؤال امتحان تمرینی در یک موتور آزمایشی قابل تنظیم
  • یک ساعت + آموزش ویدیویی از Mike Meyers
  • شبیه‌سازی‌های آزمایشگاهی رایگان
  • li>
  • جعبه ابزار مایک از نرم افزارهای رایگان و اشتراکی مرتبط با امنیت شبکه



توضیحاتی درمورد کتاب به خارجی

An up-to-date CompTIA Security+ exam guide from training and exam preparation guru Mike Meyers In Mike Meyers’ CompTIA Security+™ Certification Guide, Third Edition (Exam SY0-601), the leading expert on CompTIA certification and training brings his highly effective methodology to IT security. Within each chapter, modules drill down on specific exam objectives, providing a clear learning path. All official exam objectives are covered, and chapter-ending practice exam questions reinforce the concepts presented. This practical resource goes beyond knowledge application and teaches you the skills you need to anticipate security risks and guard against them. Covers all the exam topics, including:
  • Risk management
  • Cryptography
  • Authentication and authorization
  • Host, LAN, and application security
  • Wireless, cloud, and mobile security
  • Environmental security and controls
Online content includes:
  • 200+ practice exam questions in a customizable test engine
  • One hour+ of video training from Mike Meyers
  • Free lab simulations
  • Mike’s toolbox of favorite network security–related freeware and shareware




فهرست مطالب

Cover
About the Authors
Title Page
Copyright Page
Dedication
Contents at a Glance
Contents
Acknowledgments
Introduction
Chapter 1 Risk Management
	Module 1-1: Defining Risk
		Asset
		Likelihood
		Threat Actor
		Vulnerability and Threat
		Circling Back to the Risk Definition
		Vectors
		Threat Intelligence
	Module 1-2: Risk Management Concepts
		Infrastructure
		Security Controls
		Risk Management Frameworks
	Module 1-3: Security Controls
		Control Categories
		Control Types
	Module 1-4: Risk Assessment
		Risk Assessment Processes and Concepts
		Quantitative Risk Assessment
		Qualitative Risk Assessment
		Putting It All Together: Risk Analysis
		Risk Response
	Module 1-5: Business Impact Analysis
		BIA Basics
		Types of Impact
		Locating Critical Resources
		Calculating Impact
		Calculating Downtime
	Module 1-6: Data Security and Data Protection
		Organizing Data
		Legal and Compliance
		Data Destruction
		Privacy Breaches
	Module 1-7: Personnel Risk and Policies
		Hiring
		Onboarding
		Personnel Management Policies
		Training
		Policies
		User Habits
		Offboarding
	Module 1-8: Third-Party Risk and Policies
		Third-Party Risk Management
		Agreement Types
	Questions
	Answers
Chapter 2 Cryptography
	Module 2-1: Cryptography Basics
		Essential Building Blocks
		Early Cryptography
		Cryptography Components
	Module 2-2: Cryptographic Methods
		Symmetric Cryptography
		Asymmetric Cryptography
		Hashing
		Limitations in Symmetric vs. Asymmetric Cryptography
		Hybrid Cryptography
		The Perfect Cryptosystem
	Module 2-3: Symmetric Cryptosystems
		DES
		3DES
		AES
		Blowfish
		Twofish
		RC4
		Summary of Symmetric Algorithm Characteristics
	Module 2-4: Asymmetric Cryptosystems
		RSA
		Diffie-Hellman
		PGP/GPG
		ECC
		ElGamal
	Module 2-5: Hashing Algorithms
		Hashing Process
		MD5
		SHA
		RIPEMD
		HMAC
	Module 2-6: Digital Signatures and Certificates
		Digital Signatures
		Digital Certificates
	Module 2-7: Public Key Infrastructure
		Keys, Algorithms, and Standards
		PKI Services
		Digital Certificates and PKI Structure
		Key Safety
		Trust Models
	Module 2-8: Cryptographic Attacks
		Attack Strategies
		Attackable Data
		Attack Scenarios
		Defending Password Storage
		Other Attack Options
	Module 2-9: Other Cryptosystems
		Homomorphic Encryption
		Blockchain
		Quantum Cryptography
	Questions
	Answers
Chapter 3 Identity and Account Management
	Module 3-1: Understanding Authentication
		Identification and AAA
		Identification and Authentication
		Authorization
		Accounting
		Trust
	Module 3-2: Authentication Methods and Access Controls
		Authentication Methods
		Biometrics
		Authorization and Access Control Schemes/Models
	Module 3-3: Account Management
		User Accounts
		Account Policies
		Account Administration
	Module 3-4: Point-to-Point Authentication
		PAP
		CHAP/MS-CHAP
		Remote Access Connection and Authentication Services
	Module 3-5: Network Authentication
		The Challenge of LAN Access Management
		Microsoft Networking
		LDAP and Secure LDAP
	Module 3-6: Identity Management Systems
		Trust
		Shared Authentication Schemes
	Questions
	Answers
Chapter 4 Tools of the Trade
	Module 4-1: Operating System Utilities
		Network Reconnaissance and Discovery
		File Manipulation
		Shell and Script Environments
	Module 4-2: Network Scanners
		Scanning Methods
		Scanning Targets
		Scanner Types
	Module 4-3: Protocol Analyzers
		Why Protocol Analyze?
		Wireshark
		tcpdump
	Module 4-4: Monitoring Networks
		Exploring Log Files
		Centralizing Log Files
		Security Information and Event Management
		Log File Management
	Questions
	Answers
Chapter 5 Securing Individual Systems
	Module 5-1: Types of System Attacks
		Attacking Applications
		Driver Manipulation
		Malicious Code or Script Execution
	Module 5-2: Malware
		Virus
		Cryptomalware/Ransomware
		Worm
		Trojan Horse
		Potentially Unwanted Programs
		Bots/Botnets
		Logic Bomb
		Keylogger
		RAT
		Rootkit
		Backdoor
	Module 5-3: Cybersecurity Resilience
		Non-persistence
		Redundancy
		Diversity
	Module 5-4: Securing Hardware
		Physical Attacks
		Securing the Systems
		Securing Boot Integrity
	Module 5-5: Securing Endpoints
		Hardening Operating Systems
		Anti-malware
		Data Execution Prevention
		File Integrity Monitors
		Data Loss Prevention
	Module 5-6: System Recycling
		Clear
		Purge
		Destroy
	Questions
	Answers
Chapter 6 The Basic LAN
	Module 6-1: Layer 2 LAN Attacks
		ARP Poisoning
		Man-in-the-Middle Attacks
		MAC Flooding
		MAC Cloning
	Module 6-2: Organizing LANs
		Configuration Management
		Network Segmentation
		Load Balancing
	Module 6-3: Implementing Secure Network Designs
		Securing the LAN
		Internet Connection Firewalls
		Securing Servers
	Module 6-4: Virtual Private Networks
		How VPNs Work
		Early VPNs
		IPsec VPNs
		TLS VPNs
	Module 6-5: Network-Based Intrusion Detection/Prevention
		Detection vs. Prevention
		Detecting Attacks
		Configuring Network-Based IDS/IPS
		Monitoring NIDS/NIPS
		Endpoint Detection and Response
	Questions
	Answers
Chapter 7 Securing Wireless LANs
	Module 7-1: Networking with 802.11
		Wireless Cryptographic Protocols
		Wireless Authentication Protocols
	Module 7-2: Attacking 802.11
		Wireless Survey/Stumbler
		Packet Capture
		Attack Tools
		Rogue Access Point
		Jamming
		Packet Sniffing
		Deauthentication Attack
		Near-Field Communication
		Replay Attacks
		WEP/WPA Attacks
		WPS Attacks
		Wireless Peripherals
	Module 7-3: Securing 802.11
		Installation Considerations
		Wireless Configuration
		Security Posture Assessment
	Questions
	Answers
Chapter 8 Securing Public Servers
	Module 8-1: Attacking and Defending Public Servers
		Distributed Denial-of-Service
		Route Security
		Quality of Service
		Monitoring Services
	Module 8-2: Virtualization Security
		Virtualization Architecture
		Containers
		Virtualization Risks
		Using Virtualization for Security
	Module 8-3: Cloud Deployment
		Let’s Talk Amazon
		Cloud Deployment Models
		Cloud Architecture Models
		Cloud Growing Pains
	Module 8-4: Securing the Cloud
		Cloud Security Controls
		Unique Cloud Security Solutions
	Questions
	Answers
Chapter 9 Securing Dedicated Systems
	Module 9-1: Embedded, Specialized, and Mobile Systems
		Embedded Systems
		SCADA/ICS
		Internet of Things
		Specialized Systems
		Mobile Systems
	Module 9-2: Connecting to Dedicated Systems
		Common Communication Technologies
		IoT-Specific Communication Technologies
	Module 9-3: Security Constraints for Dedicated Systems
		Hardware
		Programming
		Connectivity
	Module 9-4: Implementing Secure Mobile Solutions
		Mobile Device Management
		Deployment Models
		Inventory Control and Asset Tracking
		Application Management and Security
		Encryption and Authentication
		Enforcement and Monitoring for Device Security
	Questions
	Answers
Chapter 10 Physical Security
	Module 10-1: Physical Security Controls
		Passive Defensive Systems and Perimeter Controls
		Active Alert Systems
		Manned Defensive Systems
	Module 10-2: Environmental Controls
		EMI and RFI Shielding
		Fire Suppression
		HVAC
		Temperature and Humidity Controls
		Hot and Cold Aisles
		Environmental Monitoring
	Questions
	Answers
Chapter 11 Secure Protocols and Applications
	Module 11-1: Secure Internet Protocols
		DNS Security
		SNMP
		SSH
		FTP
		SRTP
	Module 11-2: Secure Web and E-mail
		HTTP
		HTTPS
		E-mail
	Module 11-3: Web Application Attacks
		Injection Attacks
		Hijacking and Related Attacks
		Other Web Application Attacks
	Module 11-4: Application Security
		Development
		Code Quality and Testing
		Staging
		Production
		Quality Assurance
		Getting Organized
	Module 11-5: Certificates in Security
		Certificate Concepts and Components
		PKI Concepts
		Online vs. Offline CA
		PKI TLS Scenario
		Types of Certificates
		Certificate Formats
		Key Escrow
	Questions
	Answers
Chapter12 Testing Infrastructure
	Module 12-1: Vulnerability Impact
		Device/Hardware Vulnerabilities
		Configuration Vulnerabilities
		Management/Design Vulnerabilities
	Module 12-2: Social Engineering
		Social Engineering Goals
		Principles
		Types of Attacks
	Module 12-3: Artificial Intelligence
		Understanding Artificial Intelligence
		Machine Learning Essentials
		OSINT
		Adversarial Artificial Intelligence
	Module 12-4: Security Assessment
		Threat Hunting
		Vulnerability Scans
		Penetration Testing
	Module 12-5: Assessment Tools
		Protocol Analyzer
		Network Scanner
		Vulnerability Scanner
		Configuration Compliance Scanner
		Penetration Testing with Metasploit
		Specific Tools Mentioned by CompTIA
		Interpreting Security Assessment Tool Results
	Questions
	Answers
Chapter 13 Dealing with Incidents
	Module 13-1: Incident Response
		Incident Response Concepts
		Incident Response Procedures
		Scenarios: Mitigation During and After an Incident
	Module 13-2: Digital Forensics
		Digital Forensics Concepts
		Data Volatility
		Critical Forensics Practices
		Data Acquisition
		Analyzing Evidence
	Module 13-3: Continuity of Operations and Disaster Recovery
		Risk Management Best Practices
		Contingency Planning and Resilience
		Functional Recovery Plans
		Backup and Restore Plans and Policies
	Questions
	Answers
Appendix A Exam Objective Map
	Exam SY0-601
Appendix B About the Online Content
	System Requirements
	Your Total Seminars Training Hub Account
		Privacy Notice
	Single User License Terms and Conditions
	TotalTester Online
	Other Book Resources
		Video Training from Mike Meyers
		TotalSim Simulations
		Mike’s Cool Tools
	Technical Support
Glossary
Index




نظرات کاربران