Part 1: Threats, Attacks and Vulnerabilities Chapter 1: Malware and indicators of compromise Chapter 2: Types of attacks Chapter 3: Threats Chapter 4: Vulnerability scanning and penetration testing Chapter 5: Vulnerabilities and Impacts
Part 2: Technologies and Tools Chapter 6: Network components Chapter 7: Security tools and technologies Chapter 8: Troubleshoot common security issues Chapter 9: Deploy mobile devices securely Chapter 10: Implementing secure protocols
Part 3: Architecture and Design Chapter 11: Architecture frameworks and secure network architectures Chapter 12: Secure systems design and deployment Chapter 13: Embedded systems Chapter 14: Application development and deployment Chapter 15: Cloud and virtualization Chapter 16: Resiliency and Automation strategies Chapter 17: Physical security controls
Part 4: Identity and Access Management Chapter 18: Identity, access and accounts Chapter 19: Identity and access services Chapter 20: Identity and access management controls
Part 5: Risk Management Chapter 21: Policies, plans and procedures Chapter 22: Risk management and business impact analysis concepts Chapter 23: Incident response, disaster recovery and continuity of operation Chapter 24: Digital forensics Chapter 25: Compare and contrast various types of controls Chapter 26: Data security and privacy practices
Part 6: Cryptography and PKI Chapter 27: Basic concepts of cryptography Chapter 28: Cryptography algorithms Chapter 29: Wireless security Chapter 30: Public key infrastructure
Part 7: Apendices Appendix A: OSI Model and Internet Protocols Appendix B: About the CD Glossary
What is included with this book?
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.
Please wait while the item is added to your bag...
×
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description,
with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.