CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501)

by ; ; ; ;
Edition: 5th
Format: Package
Pub. Date: 2018-01-08
Publisher(s): McGraw Hill
  • Free Shipping Icon

    This Item Qualifies for Free Shipping!*

    *Excludes marketplace orders.

List Price: $63.00

Buy Used

Arriving Soon. Will ship when available.
$45.00

Rent Book

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:1825 Days access
Downloadable:Lifetime Access
$67.50
$67.50

New Book

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Table of Contents

Part 1: Threats, Attacks and Vulnerabilities
Chapter 1: Malware and indicators of compromise
Chapter 2: Types of attacks
Chapter 3: Threats
Chapter 4: Vulnerability scanning and penetration testing
Chapter 5: Vulnerabilities and Impacts

Part 2: Technologies and Tools
Chapter 6: Network components
Chapter 7: Security tools and technologies
Chapter 8: Troubleshoot common security issues
Chapter 9: Deploy mobile devices securely
Chapter 10: Implementing secure protocols

Part 3: Architecture and Design
Chapter 11: Architecture frameworks and secure network architectures
Chapter 12: Secure systems design and deployment
Chapter 13: Embedded systems
Chapter 14: Application development and deployment
Chapter 15: Cloud and virtualization
Chapter 16: Resiliency and Automation strategies
Chapter 17: Physical security controls

Part 4: Identity and Access Management
Chapter 18: Identity, access and accounts
Chapter 19: Identity and access services
Chapter 20: Identity and access management controls

Part 5: Risk Management
Chapter 21: Policies, plans and procedures
Chapter 22: Risk management and business impact analysis concepts
Chapter 23: Incident response, disaster recovery and continuity of operation
Chapter 24: Digital forensics
Chapter 25: Compare and contrast various types of controls
Chapter 26: Data security and privacy practices

Part 6: Cryptography and PKI
Chapter 27: Basic concepts of cryptography
Chapter 28: Cryptography algorithms
Chapter 29: Wireless security
Chapter 30: Public key infrastructure

Part 7: Apendices
Appendix A: OSI Model and Internet Protocols
Appendix B: About the CD
Glossary

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.