CompTIA Security+ SY0-601 Exam Cram eBook, 6th Edition

Martin M. Weiss

CompTIA Security+ SY0-601 Exam Cram eBook, 6th Edition

By Martin M. Weiss
In stock
Add to cart
Martin M. Weiss
Published Date
CompTIA® Security+ SY0-601 Exam Cram, is the perfect study guide to help you pass the newly updated version of the CompTIA Security+ exam. It provides coverage and practice questions for every exam topic. Extensive prep tools include quizzes, Exam Alerts, and our essential last-minute review Cram Sheet. The powerful Pearson Test Prep practice software provides real-time practice and feedback with two complete exams.

Covers the critical information youll need to know to score higher on your Security+ SY0-601 exam!
  • Assess the different types of attacks, threats, and vulnerabilities organisations face
  • Understand security concepts across traditional, cloud, mobile, and IoT environments
  • Explain and implement security controls across multiple environments
  • Identify, analyse, and respond to operational needs and security incidents
  • Understand and explain the relevance of concepts related to governance, risk, and compliance

The full text downloaded to your computer

With eBooks you can:

  • search for key concepts, words and phrases
  • make highlights and notes as you study
  • share your notes with friends

eBooks are downloaded to your computer and accessible either offline through the Bookshelf (available as a free download), available online and also via the iPad and Android apps.

Upon purchase, you'll gain instant access to this eBook.

Time limit

The eBooks products do not have an expiry date. You will continue to access your digital ebook products whilst you have your Bookshelf installed.

Table of contents
  • Introduction
  • CHAPTER 1: Social Engineering Techniques
  • CHAPTER 2: Attack Basics
  • CHAPTER 3: Application Attacks
  • CHAPTER 4: Network Attacks
  • CHAPTER 5: Threat Actors, Vectors, and Intelligence Sources
  • CHAPTER 6: Vulnerabilities
  • CHAPTER 7: Security Assessment Techniques
  • CHAPTER 8: Penetration Testing Techniques
  • CHAPTER 9: Enterprise Security Concepts
  • CHAPTER 10: Virtualization and Cloud Computing
  • CHAPTER 11: Secure Application Development, Deployment, and Automation
  • CHAPTER 12: Authentication and Authorization Design
  • CHAPTER 13: Cybersecurity Resilience
  • CHAPTER 14: Embedded and Specialized Systems
  • CHAPTER 15: Physical Security Controls
  • CHAPTER 16: Cryptographic Concepts
  • CHAPTER 17: Secure Protocols
  • CHAPTER 18: Host and Application Security Solutions
  • CHAPTER 19: Secure Network Design
  • CHAPTER 20: Wireless Security Settings
  • CHAPTER 21: Secure Mobile Solutions
  • CHAPTER 22: Cloud Cybersecurity Solutions
  • CHAPTER 23: Identity and Account Management Controls
  • CHAPTER 24: Authentication and Authorization Solutions
  • CHAPTER 25: Public Key Infrastructure
  • CHAPTER 26: Organizational Security
  • CHAPTER 27: Incident Response
  • CHAPTER 28: Incident Investigation
  • CHAPTER 29: Incident Mitigation
  • CHAPTER 30: Digital Forensics
  • CHAPTER 31: Control Types
  • CHAPTER 32: Regulations, Standards, and Frameworks
  • CHAPTER 33: Organizational Security Policies
  • CHAPTER 34: Risk Management
  • CHAPTER 35: Sensitive Data and Privacy