CCNA Cybersecurity Operations Companion Guide
فهرست مطالب:
Introduction
Chapter 1 Cybersecurity and the Security Operations Center
Chapter 2 Windows Operating System
Chapter 3 Linux Operating System
Chapter 4 Network Protocols and Services
Chapter 5 Network Infrastructure
Chapter 6 Principles of Network Security
Chapter 7 Network Attacks: A Deeper Look
Chapter 8 Protecting the Network
Chapter 9 Cryptography and the Public Key Infrastructure
Chapter 10 Endpoint Security and Analysis
Chapter 11 Security Monitoring
Chapter 12 Intrusion Data Analysis
Chapter 13 Incident Response and Handling
Appendix A Answers to the “Check Your Understanding” Questions
CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide
فهرست مطالب:
Introduction
Chapter 1. Cybersecurity Fundamentals
Chapter 2. Cryptography
Chapter 3. Software-Defined Networking Security and Network Programmability
Chapter 4. Authentication, Authorization, Accounting (AAA) and Identity Management
Chapter 5. Network Visibility and Segmentation
Chapter 6. Infrastructure Security
Chapter 7. Cisco Next-Generation Firewalls and Cisco Next-Generation Intrusion Prevention Systems
Chapter 8. Virtual Private Networks (VPNs)
Chapter 9. Securing the Cloud
Chapter 10. Content Security
Chapter 11. Endpoint Protection and Detection
Chapter 12. Final Preparations Glossary of Key Terms
Appendix A. Answers to the “Do I Know This Already?” Quizzes and Q&A Sections
Appendix B. CCNP Security Core SCOR (350-701) Exam Updates
Appendix C. (Website only) Study Planner
CCNP Security Cisco Secure Firewall and Intrusion Prevention System Official Cert Guide
فهرست مطالب:
Introduction
Part I General Deployment
Part II Basic Security Operations
Part III Advanced Configurations
Part IV Conclusion
Part V Appendixes
CCNP Security VPN 642-648 Official Cert Guide
فهرست مطالب:
Part I ASA Architecture and Technologies Overview
Part II Cisco Clientless Remote-Access VPN Solutions
Part III Cisco AnyConnect Remote-Access VPN Solutions
Part IV Cisco Secure Desktop
Part V Cisco IPsec Remote-Access Client Solutions
Part VI Cisco Easy VPN Solutions
Part VII Cisco IPsec Site-to-Site VPN Solutions
Part VIII Exam Preparation
Part IX Appendixes
CEH v10 Certified Ethical Hacker Study Guide
فهرست مطالب:
Introduction
Assessment Test
Chapter 1: Ethical Hacking
Chapter 2: Networking Foundations
Chapter 3: Security Foundations
Chapter 4: Footprinting and Reconnaissance
Chapter 5: Scanning Networks
Chapter 6: Enumeration
Chapter 7: System Hacking
Chapter 8: Malware
Chapter 9: Sniffing
Chapter 10: Social Engineering
Chapter 11: Wireless Security
Chapter 12: Attack and Defense
Chapter 13: Cryptography
Chapter 14: Security Architecture and Design
Appendix: Answers to Review Questions
Index
CEH v11 Certified Ethical Hacker Study Guide
فهرست مطالب:
Introduction
Assessment Test
Chapter 1: Ethical Hacking
Chapter 2: Networking Foundations
Chapter 3: Security Foundations
Chapter 4: Footprinting and Reconnaissance
Chapter 5: Scanning Networks
Chapter 6: Enumeration
Chapter 7: System Hacking
Chapter 8: Malware
Chapter 9: Sniffing
Chapter 10: Social Engineering
Chapter 11: Wireless Security
Chapter 12: Attack and Defense
Chapter 13: Cryptography
Chapter 14: Security Architecture and Design
Chapter 15: Cloud Computing and the Internet of Things
Appendix: Answers to Review Questions
Index
Certified Ethical Hacker (CEH) Preparation Guide
فهرست مطالب:
About the Author
About the Technical Reviewer
Introduction
Chapter 1: Introduction to Ethical Hacking
Chapter 2: Footprinting and Reconnaissance/Scanning Networks
Chapter 3: Enumeration
Chapter 4: System Hacking
Chapter 5: Trojans, Backdoors, Viruses, and Worms
Chapter 6: Sniffers and Social Engineering
Chapter 7: Denial of Service
Chapter 8: Session Hijacking
Chapter 9: Hacking Webservers
Chapter 10: Hacking Web Applications
Chapter 11: SQL Injections
CHAPTER 12: Hacking Wireless Networks
CHAPTER 13: Evading Intrusion Detection Systems, Firewalls, and Honeypots
CHAPTER 14: Buffer Overflow
CHAPTER 15: Cryptography
CHAPTER 16: Penetration Testing
Index
CISA Certified Information Systems Auditor Study Guide
فهرست مطالب کتاب CISA Certified Information Systems Auditor Study Guide:
Introduction
Assessment Test
Chapter 1: IT Governance and Management
Chapter 2: The Audit Process
Chapter 3: IT Life Cycle Management
Chapter 4: IT Service Management
Chapter 5: IT Infrastructure
Chapter 6: Business Continuity and Disaster Recovery
Chapter 7: Information Security Management
Chapter 8: Identity and Access Management
Index
Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide
فهرست مطالب کتابCisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide:
Introduction
Part I Introduction to Cybersecurity
Chapter 1 Security Principles
Chapter 2 Common Threats, Attacks, and Vulnerabilities
Chapter 3 Access Management
Chapter 4 Cryptography
Part II Network Security
Chapter 5 Introduction to Networking, Addressing, and TCP/IP Protocols
Chapter 6 Network Infrastructure
Chapter 7 Controlling Network Access
Chapter 8 Wireless SOHO Security
Part III Endpoint Security
Chapter 9 Operating Systems and Tools
Chapter 10 Endpoint Policies and Standards
Chapter 11 Network and Endpoint Malware Detection and Remediation
Chapter 12 Risk and Vulnerability Management
Chapter 13 Threat Intelligence
Chapter 14 Disaster Recovery and Business Continuity
Chapter 15 Incident Handling
Part IV CCST Cybersecurity Preparation
Chapter 16 Final Preparation
Chapter 17 Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide Exam Updates
Appendix A Answers to the “Do I Know This Already?” Quizzes and Review
Questions
Glossary
Index
Online Elements
Appendix B Memory Tables
Appendix C Memory Tables Answer Key
Appendix D Study Planner
Glossary
CISSP Cert Guide-Fifth Edition
:فهرست مطالب کتاب CISSP Cert Guide-Fifth Edition
CHAPTER 1 Security and Risk Management
CHAPTER 2 Asset Security
CHAPTER 3 Security Architecture and Engineering
CHAPTER 4 Communication and Network Security
CHAPTER 5 Identity and Access Management (IAM)
CHAPTER 6 Security Assessment and Testing
CHAPTER 7 Security Operations
CHAPTER 8 Software Development Security
CHAPTER 9 Final Preparation
Online Elements
APPENDIX A Memory Tables
APPENDIX B Memory Tables Answer Key
Glossary
CompTIA PenTest+ Certification For Dummies
فهرست مطالب:
Introduction
Part 1: Planning and Information Gathering
Part 2: Attacks and Exploits
Part 3: Post-Exploitation and Reporting
Part 4: Appendixes
Index
CompTIA PenTest+ Student Guide (Exam PT0-002)
فهرست مطالب:
Lesson 1: Scoping Organizational/Customer Requirements
Lesson 2: Defining the Rules of Engagement
Lesson 3: Footprinting and Gathering Intelligence
Lesson 4: Evaluating Human and Physical Vulnerabilities
Lesson 5: Preparing the Vulnerability Scan
Lesson 6: Scanning Logical Vulnerabilities
Lesson 7: Analyzing Scanning Results
Lesson 8: Avoiding Detection and Covering Tracks
Lesson 9: Exploiting the LAN and Cloud
Lesson 10: Testing Wireless Networks
Lesson 11: Targeting Mobile Devices
Lesson 12: Attacking Specialized Systems
Lesson 13: Web Application-Based Attacks
Lesson 14: Performing System Hacking
Lesson 15: Scripting and Software Development
Lesson 16: Leveraging the Attack: Pivot and Penetrate
Lesson 17: Communicating During the PenTesting Process
Lesson 18: Summarizing Report Components
Lesson 19: Recommending Remediation
Lesson 20: Performing Post-Report Delivery Activities
Appendix A: Mapping Course Content to CompTIA Certification+ (PT0-002)
Solutions
Glossary
Index