
CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)
by Conklin, Wm. Arthur; White, Greg-
This Item Qualifies for Free Shipping!*
*Excludes marketplace orders.
-
We Buy This Book Back!
Buy New
Rent Book
Rent Digital
Used Book
We're Sorry
Sold Out
How Marketplace Works:
- This item is offered by an independent seller and not shipped from our warehouse
- Item details like edition and cover design may differ from our description; see seller's comments before ordering.
- Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
- Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
- Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.
Table of Contents
Chapter 1 Social Engineering Techniques
Chapter 2 Types of Attack Indicators
Chapter 3 Application Attack Indicators
Chapter 4 Network Attack Indicators
Chapter 5 Threat Actors, Vectors, and Intelligence Sources
Chapter 6 Vulnerabilities
Chapter 7 Security Assessments
Chapter 8 Penetration Testing
Part II Architecture and Design
Chapter 9 Enterprise Architecture
Chapter 10 Virtualization and Cloud Security
Chapter 11 Secure App Development, Deployment, and Automation Scripts
Chapter 12 Authentication and Authorization
Chapter 13 Cybersecurity Resilience
Chapter 14 Embedded and Specialized Systems
Chapter 15 Physical Security
Chapter 16 Cryptographic Concepts
Part III Implementation
Chapter 17 Secure Protocols
Chapter 18 Host and Application Security
Chapter 19 Secure Network Design
Chapter 20 Wireless Security
Chapter 21 Secure Mobile Solutions
Chapter 22 Implementing Cloud Security
Chapter 23 Identity and Account Management Controls
Chapter 24 Implementing Authentication and Authorization
Chapter 25 Public Key Infrastructure
Part IV Operations and Incident Response
Chapter 26 Tools/Assess Organizational Security
Chapter 27 Incident Response Policies and Procedures
Chapter 28 Investigations
Chapter 29 Mitigation Techniques and Controls
Chapter 30 Digital Forensics
Part V Governance, Risk, and Compliance
Chapter 31 Security Controls
Chapter 32 Regulations, Standards, and Frameworks
Chapter 33 Organizational Policies
Chapter 34 Risk Management
Chapter 35 Privacy
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.