Exam Cram CompTIA Security+ SY0-501 eBook, 5th Edition

Diane Barrett all

Exam Cram CompTIA Security+ SY0-501 eBook, 5th Edition

By Diane Barrett, Martin M. Weiss
In stock
Add to cart
Diane Barrett all
Published Date
CompTIA Security+ SY0-501 Exam Cram, 5th Edition, is the perfect study guide to help you pass CompTIA’s newly updated version of the Security+ exam. It provides coverage and practice questions for every exam topic. The book contains a set of 150 questions. The powerful Pearson Test Prep practice test software provides real-time practice and feedback with all the questions so you can simulate the exam.

Covers the critical information you need to know to score higher on your Security+ exam!
  • Analyse indicators of compromise and determine types of attacks, threats, and risks to systems
  • Minimise the impact associated with types of attacks and vulnerabilities
  • Secure devices, communications, and network infrastructure
  • Effectively manage risks associated with a global business environment
  • Differentiate between control methods used to secure the physical domain
  • Identify solutions for the implementation of secure network architecture
  • Compare techniques for secure application development and deployment
  • Determine relevant identity and access management procedures
  • Implement security policies, plans, and procedures related to organisational security
  • Apply principles of cryptography and effectively deploy related solutions

The full text downloaded to your computer

With eBooks you can:

  • search for key concepts, words and phrases
  • make highlights and notes as you study
  • share your notes with friends

eBooks are downloaded to your computer and accessible either offline through the Bookshelf (available as a free download), available online and also via the iPad and Android apps.

Upon purchase, you'll gain instant access to this eBook.

Time limit

The eBooks products do not have an expiry date. You will continue to access your digital ebook products whilst you have your Bookshelf installed.

Table of contents
  • Chapter 1: Indicators of Compromise and Malware Types
  • Chapter 2: Attack Types
  • Chapter 3: Threat Actor Types and Attributes
  • Chapter 4: Penetration Testing
  • Chapter 5: Vulnerability Scanning
  • Chapter 6: Impacts Associated with Vulnerability Types
  • Chapter 7: Network Components
  • Chapter 8: Software Tools
  • Chapter 9: Security Issues
  • Chapter 10: Security Technologies
  • Chapter 11: Mobile Devices
  • Chapter 12: Secure Protocols
  • Chapter 13: Use Cases, Frameworks, and Best Practices
  • Chapter 14: Network Architecture
  • Chapter 15: Secure Systems Design
  • Chapter 16: Secure Staging Deployment
  • Chapter 17: Embedded Systems
  • Chapter 18: Secure Application Development and Deployment
  • Chapter 19: Cloud and Virtualization
  • Chapter 20: Reducing Risk
  • Chapter 21: Physical Security Controls
  • Chapter 22: Identity and Access Management Concepts
  • Chapter 23: Identity and Access Services
  • Chapter 24: Identity and Access Controls
  • Chapter 25: Account Management Practices
  • Chapter 26: Policies, Plans, and Procedures Related to Organizational Security
  • Chapter 27: Business Impact Analysis
  • Chapter 28: Risk Management Processes and Concepts
  • Chapter 29: Incident Response Procedures
  • Chapter 30: Forensics
  • Chapter 31: Disaster Recovery and Continuity of Operations
  • Chapter 32: Controls
  • Chapter 33: Data Security and Privacy Practices
  • Chapter 34: Cryptography
  • Chapter 35: Cryptography Algorithms
  • Chapter 36: Wireless Security Settings
  • Chapter 37: Public Key Infrastructure