Essential Skills for a Successful IT Security Career. Learn the fundamentals of computer and information security while getting complete coverage of all the objectives for the latest release of the CompTIA Security certification exam. This up-to-date, full-color guide discusses communication, infrastructure, operational security, attack prevention, disaster recovery, computer forensics, and much more. Written and edited by leaders in the field, Principles of Computer Security: CompTIA Security and Beyond, Third Edition will help you pass CompTIA Security exam SY0-301 and become an IT security expert. From McGraw-Hill—a Gold-Level CompTIA Authorized Partner, this book offers Official CompTIA Approved Quality Content.
Find out how to...
- Ensure operational, organizational, and physical security
- Use cryptography and public key infrastructures (PKIs)
- Secure remote access, wireless, and virtual private networks (VPNs)
- Harden network devices, operating systems, and applications
- Defend against network attacks, such as denial of service, spoofing, hijacking, and password guessing
- Combat viruses, worms, Trojan horses, logic bombs, time bombs, and rootkits
- Manage e-mail, instant messaging, and web security
- Understand secure software development requirements
- Enable disaster recovery and business continuity
- Implement risk, change, and privilege management measures
- Handle computer forensics and incident response
- Understand legal, ethical, and privacy issues
The CD-ROM features:
- Two full practice exams
- PDF copy of the book
Each chapter includes:
- Learning objectives
- Photographs and illustrations
- Real-world examples
- Try This! and Cross Check exercises
- Key terms highlighted
- Tech Tips, Notes, and Warnings
- Exam Tips
- End-of-chapter quizzes and lab projects
Content
- Ch. 1: Introduction and Security Trends
- Ch. 2: General Security Concepts
- Ch. 3: Operational/Organizational Security
- Ch. 4: The Role of People in Security
- Ch. 5: Cryptography
- Ch. 6: Public Key Infrastructure
- Ch. 7: Standards and Protocols
- Ch. 8: Physical Security
- Ch. 9: Network Fundamentals
- Ch. 10: Infrastructure Security
- Ch. 11: Authentication and Remote Access
- Ch. 12: Wireless
- Ch. 13: Intrusion Detection Systems and Network Security
- Ch. 14: Baselines
- Ch. 15: Types of Attacks and Malicious Software
- Ch. 16: E-mail and Instant Messaging
- Ch. 17: Web Components
- Ch. 18: Secure Software Development
- Ch. 19: Disaster Recovery, Business Continuity, and Organizational Policies
- Ch. 20: Risk Management
- Ch. 21: Change Management
- Ch. 22: Privilege Management
- Ch. 23: Computer Forensics
- Ch. 24: Legal Issues and Ethics
- Ch. 25: Privacy
- Appendix A: Objective Map
- Appendix B: About the CD
ISBN | 9780071786195 |
Publisher | McGraw-Hill Education |
Product Type | Student Books, |
Year Level | VET, |
Author(s) | Wm. Arthur Conklin, Gregory B. White, Dwayne Williams, Roger L. Davis, Chuck Cothren, & Corey Schou |
Be The First To Review This Product!
Help other Teacher Superstore users shop smarter by writing reviews for products you have purchased.