دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: [3 ed.]
نویسندگان: Mike Meyers. Scott Jernigan
سری:
ISBN (شابک) : 1260473694, 9781260473698
ناشر: McGraw-Hill Education
سال نشر: 2021
تعداد صفحات: 832
[1258]
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 31 Mb
در صورت تبدیل فایل کتاب Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب راهنمای گواهینامه CompTIA Security+ Mike Meyers، نسخه سوم (Exam SY0-601) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Cover About the Authors Title Page Copyright Page Dedication Contents at a Glance Contents Acknowledgments Introduction Chapter 1 Risk Management Module 1-1: Defining Risk Asset Likelihood Threat Actor Vulnerability and Threat Circling Back to the Risk Definition Vectors Threat Intelligence Module 1-2: Risk Management Concepts Infrastructure Security Controls Risk Management Frameworks Module 1-3: Security Controls Control Categories Control Types Module 1-4: Risk Assessment Risk Assessment Processes and Concepts Quantitative Risk Assessment Qualitative Risk Assessment Putting It All Together: Risk Analysis Risk Response Module 1-5: Business Impact Analysis BIA Basics Types of Impact Locating Critical Resources Calculating Impact Calculating Downtime Module 1-6: Data Security and Data Protection Organizing Data Legal and Compliance Data Destruction Privacy Breaches Module 1-7: Personnel Risk and Policies Hiring Onboarding Personnel Management Policies Training Policies User Habits Offboarding Module 1-8: Third-Party Risk and Policies Third-Party Risk Management Agreement Types Questions Answers Chapter 2 Cryptography Module 2-1: Cryptography Basics Essential Building Blocks Early Cryptography Cryptography Components Module 2-2: Cryptographic Methods Symmetric Cryptography Asymmetric Cryptography Hashing Limitations in Symmetric vs. Asymmetric Cryptography Hybrid Cryptography The Perfect Cryptosystem Module 2-3: Symmetric Cryptosystems DES 3DES AES Blowfish Twofish RC4 Summary of Symmetric Algorithm Characteristics Module 2-4: Asymmetric Cryptosystems RSA Diffie-Hellman PGP/GPG ECC ElGamal Module 2-5: Hashing Algorithms Hashing Process MD5 SHA RIPEMD HMAC Module 2-6: Digital Signatures and Certificates Digital Signatures Digital Certificates Module 2-7: Public Key Infrastructure Keys, Algorithms, and Standards PKI Services Digital Certificates and PKI Structure Key Safety Trust Models Module 2-8: Cryptographic Attacks Attack Strategies Attackable Data Attack Scenarios Defending Password Storage Other Attack Options Module 2-9: Other Cryptosystems Homomorphic Encryption Blockchain Quantum Cryptography Questions Answers Chapter 3 Identity and Account Management Module 3-1: Understanding Authentication Identification and AAA Identification and Authentication Authorization Accounting Trust Module 3-2: Authentication Methods and Access Controls Authentication Methods Biometrics Authorization and Access Control Schemes/Models Module 3-3: Account Management User Accounts Account Policies Account Administration Module 3-4: Point-to-Point Authentication PAP CHAP/MS-CHAP Remote Access Connection and Authentication Services Module 3-5: Network Authentication The Challenge of LAN Access Management Microsoft Networking LDAP and Secure LDAP Module 3-6: Identity Management Systems Trust Shared Authentication Schemes Questions Answers Chapter 4 Tools of the Trade Module 4-1: Operating System Utilities Network Reconnaissance and Discovery File Manipulation Shell and Script Environments Module 4-2: Network Scanners Scanning Methods Scanning Targets Scanner Types Module 4-3: Protocol Analyzers Why Protocol Analyze? Wireshark tcpdump Module 4-4: Monitoring Networks Exploring Log Files Centralizing Log Files Security Information and Event Management Log File Management Questions Answers Chapter 5 Securing Individual Systems Module 5-1: Types of System Attacks Attacking Applications Driver Manipulation Malicious Code or Script Execution Module 5-2: Malware Virus Cryptomalware/Ransomware Worm Trojan Horse Potentially Unwanted Programs Bots/Botnets Logic Bomb Keylogger RAT Rootkit Backdoor Module 5-3: Cybersecurity Resilience Non-persistence Redundancy Diversity Module 5-4: Securing Hardware Physical Attacks Securing the Systems Securing Boot Integrity Module 5-5: Securing Endpoints Hardening Operating Systems Anti-malware Data Execution Prevention File Integrity Monitors Data Loss Prevention Module 5-6: System Recycling Clear Purge Destroy Questions Answers Chapter 6 The Basic LAN Module 6-1: Layer 2 LAN Attacks ARP Poisoning Man-in-the-Middle Attacks MAC Flooding MAC Cloning Module 6-2: Organizing LANs Configuration Management Network Segmentation Load Balancing Module 6-3: Implementing Secure Network Designs Securing the LAN Internet Connection Firewalls Securing Servers Module 6-4: Virtual Private Networks How VPNs Work Early VPNs IPsec VPNs TLS VPNs Module 6-5: Network-Based Intrusion Detection/Prevention Detection vs. Prevention Detecting Attacks Configuring Network-Based IDS/IPS Monitoring NIDS/NIPS Endpoint Detection and Response Questions Answers Chapter 7 Securing Wireless LANs Module 7-1: Networking with 802.11 Wireless Cryptographic Protocols Wireless Authentication Protocols Module 7-2: Attacking 802.11 Wireless Survey/Stumbler Packet Capture Attack Tools Rogue Access Point Jamming Packet Sniffing Deauthentication Attack Near-Field Communication Replay Attacks WEP/WPA Attacks WPS Attacks Wireless Peripherals Module 7-3: Securing 802.11 Installation Considerations Wireless Configuration Security Posture Assessment Questions Answers Chapter 8 Securing Public Servers Module 8-1: Attacking and Defending Public Servers Distributed Denial-of-Service Route Security Quality of Service Monitoring Services Module 8-2: Virtualization Security Virtualization Architecture Containers Virtualization Risks Using Virtualization for Security Module 8-3: Cloud Deployment Let’s Talk Amazon Cloud Deployment Models Cloud Architecture Models Cloud Growing Pains Module 8-4: Securing the Cloud Cloud Security Controls Unique Cloud Security Solutions Questions Answers Chapter 9 Securing Dedicated Systems Module 9-1: Embedded, Specialized, and Mobile Systems Embedded Systems SCADA/ICS Internet of Things Specialized Systems Mobile Systems Module 9-2: Connecting to Dedicated Systems Common Communication Technologies IoT-Specific Communication Technologies Module 9-3: Security Constraints for Dedicated Systems Hardware Programming Connectivity Module 9-4: Implementing Secure Mobile Solutions Mobile Device Management Deployment Models Inventory Control and Asset Tracking Application Management and Security Encryption and Authentication Enforcement and Monitoring for Device Security Questions Answers Chapter 10 Physical Security Module 10-1: Physical Security Controls Passive Defensive Systems and Perimeter Controls Active Alert Systems Manned Defensive Systems Module 10-2: Environmental Controls EMI and RFI Shielding Fire Suppression HVAC Temperature and Humidity Controls Hot and Cold Aisles Environmental Monitoring Questions Answers Chapter 11 Secure Protocols and Applications Module 11-1: Secure Internet Protocols DNS Security SNMP SSH FTP SRTP Module 11-2: Secure Web and E-mail HTTP HTTPS E-mail Module 11-3: Web Application Attacks Injection Attacks Hijacking and Related Attacks Other Web Application Attacks Module 11-4: Application Security Development Code Quality and Testing Staging Production Quality Assurance Getting Organized Module 11-5: Certificates in Security Certificate Concepts and Components PKI Concepts Online vs. Offline CA PKI TLS Scenario Types of Certificates Certificate Formats Key Escrow Questions Answers Chapter12 Testing Infrastructure Module 12-1: Vulnerability Impact Device/Hardware Vulnerabilities Configuration Vulnerabilities Management/Design Vulnerabilities Module 12-2: Social Engineering Social Engineering Goals Principles Types of Attacks Module 12-3: Artificial Intelligence Understanding Artificial Intelligence Machine Learning Essentials OSINT Adversarial Artificial Intelligence Module 12-4: Security Assessment Threat Hunting Vulnerability Scans Penetration Testing Module 12-5: Assessment Tools Protocol Analyzer Network Scanner Vulnerability Scanner Configuration Compliance Scanner Penetration Testing with Metasploit Specific Tools Mentioned by CompTIA Interpreting Security Assessment Tool Results Questions Answers Chapter 13 Dealing with Incidents Module 13-1: Incident Response Incident Response Concepts Incident Response Procedures Scenarios: Mitigation During and After an Incident Module 13-2: Digital Forensics Digital Forensics Concepts Data Volatility Critical Forensics Practices Data Acquisition Analyzing Evidence Module 13-3: Continuity of Operations and Disaster Recovery Risk Management Best Practices Contingency Planning and Resilience Functional Recovery Plans Backup and Restore Plans and Policies Questions Answers Appendix A Exam Objective Map Exam SY0-601 Appendix B About the Online Content System Requirements Your Total Seminars Training Hub Account Privacy Notice Single User License Terms and Conditions TotalTester Online Other Book Resources Video Training from Mike Meyers TotalSim Simulations Mike’s Cool Tools Technical Support Glossary Index