Free shipping on all orders in the USA!

Exploration of Comptia Security+: Exam Guide SY0-401

ISBN: 9781539380177
Publisher: CreateSpace Independent Publishing Platform
Publication Date: 2016-10-18
Number of pages: 80
  • Sale
  • Regular price $28.00

Any used item that originally included an accessory such as an access code, one time use worksheet, cd or dvd, or other one time use accessories may not be guaranteed to be included or valid. By purchasing this item you acknowledge the above statement.

Description


This guide is an exploration of CompTIA Security+. It begins by exploring the security of the network. The various forms of threats to the security of the computer network of any organization are discussed in detail. The ways that they carry out their malicious activities are explored. You will learn the various measures which can be employed in an organization so as to ensure that the computer network is kept safe and secure. Compliance and operation security is explored in detail. The various mechanisms for ensuring that there is operational security are also covered. Data, host, and applications security are very important in any organization. The various forms which can be used to ensure that data has been secured are presented. You will also learn some of the mechanisms which most attackers employ so as to compromise the integrity of stored and on-transit data. The security of applications which have been installed into the hosts of an organization is of great importance. You will be guided on how to keep these secure. Host security is also extremely important. Whenever a single host within an organization has been attacked, the whole organization can be affected negatively. This is because the host can be used for attacking other hosts in the organization once it has been broken into. The identity of users accessing the resources of an organization is essential. There is a need for an organization to authorize users to access only particular resources and deny them access to some other resources. You will be guided on how to do this.
The following topics are discussed in this book:

Network Security
Compliance and Operation Security
Data, Application, and Host Security
Identity Management
Cryptography


Customer Reviews


MORE FROM THIS COLLECTION