CCNA Cybersecurity Operations Companion Guide

فهرست مطالب:

Introduction

Chapter 1 Cybersecurity and the Security Operations Center

Chapter 2 Windows Operating System

Chapter 3 Linux Operating System

Chapter 4 Network Protocols and Services

Chapter 5 Network Infrastructure

Chapter 6 Principles of Network Security

Chapter 7 Network Attacks: A Deeper Look

Chapter 8 Protecting the Network

Chapter 9 Cryptography and the Public Key Infrastructure

Chapter 10 Endpoint Security and Analysis

Chapter 11 Security Monitoring

Chapter 12 Intrusion Data Analysis

Chapter 13 Incident Response and Handling

Appendix A Answers to the “Check Your Understanding” Questions

CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide

فهرست مطالب:

Introduction

Chapter 1. Cybersecurity Fundamentals

Chapter 2. Cryptography

Chapter 3. Software-Defined Networking Security and Network Programmability

Chapter 4. Authentication, Authorization, Accounting (AAA) and Identity Management

Chapter 5. Network Visibility and Segmentation

Chapter 6. Infrastructure Security

Chapter 7. Cisco Next-Generation Firewalls and Cisco Next-Generation Intrusion Prevention Systems

Chapter 8. Virtual Private Networks (VPNs)

Chapter 9. Securing the Cloud

Chapter 10. Content Security

Chapter 11. Endpoint Protection and Detection

Chapter 12. Final Preparations Glossary of Key Terms

Appendix A. Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

Appendix B. CCNP Security Core SCOR (350-701) Exam Updates

Appendix C. (Website only) Study Planner

CCNP Security Cisco Secure Firewall and Intrusion Prevention System Official Cert Guide

فهرست مطالب:

Introduction

Part I General Deployment

Part II Basic Security Operations

Part III Advanced Configurations

Part IV Conclusion

Part V Appendixes

CCNP Security VPN 642-648 Official Cert Guide

فهرست مطالب:

Part I ASA Architecture and Technologies Overview

Part II Cisco Clientless Remote-Access VPN Solutions

Part III Cisco AnyConnect Remote-Access VPN Solutions

Part IV Cisco Secure Desktop

Part V Cisco IPsec Remote-Access Client Solutions

Part VI Cisco Easy VPN Solutions

Part VII Cisco IPsec Site-to-Site VPN Solutions

Part VIII Exam Preparation

Part IX Appendixes

CEH v10 Certified Ethical Hacker Study Guide

فهرست مطالب:

Introduction

Assessment Test

Chapter 1: Ethical Hacking

Chapter 2: Networking Foundations

Chapter 3: Security Foundations

Chapter 4: Footprinting and Reconnaissance

Chapter 5: Scanning Networks

Chapter 6: Enumeration

Chapter 7: System Hacking

Chapter 8: Malware

Chapter 9: Sniffing

Chapter 10: Social Engineering

Chapter 11: Wireless Security

Chapter 12: Attack and Defense

Chapter 13: Cryptography

Chapter 14: Security Architecture and Design

Appendix: Answers to Review Questions

Index

CEH v11 Certified Ethical Hacker Study Guide

فهرست مطالب:

Introduction

Assessment Test

Chapter 1: Ethical Hacking

Chapter 2: Networking Foundations

Chapter 3: Security Foundations

Chapter 4: Footprinting and Reconnaissance

Chapter 5: Scanning Networks

Chapter 6: Enumeration

Chapter 7: System Hacking

Chapter 8: Malware

Chapter 9: Sniffing

Chapter 10: Social Engineering

Chapter 11: Wireless Security

Chapter 12: Attack and Defense

Chapter 13: Cryptography

Chapter 14: Security Architecture and Design

Chapter 15: Cloud Computing and the Internet of Things

Appendix: Answers to Review Questions

Index

Certified Ethical Hacker (CEH) Preparation Guide

فهرست مطالب:

About the Author

About the Technical Reviewer

Introduction

Chapter 1: Introduction to Ethical Hacking

Chapter 2: Footprinting and Reconnaissance/Scanning Networks

Chapter 3: Enumeration

Chapter 4: System Hacking

Chapter 5: Trojans, Backdoors, Viruses, and Worms

Chapter 6: Sniffers and Social Engineering

Chapter 7: Denial of Service

Chapter 8: Session Hijacking

Chapter 9: Hacking Webservers

Chapter 10: Hacking Web Applications

Chapter 11: SQL Injections

CHAPTER 12: Hacking Wireless Networks

CHAPTER 13: Evading Intrusion Detection Systems, Firewalls, and Honeypots

CHAPTER 14: Buffer Overflow

CHAPTER 15: Cryptography

CHAPTER 16: Penetration Testing

Index

CISA Certified Information Systems Auditor Study Guide

فهرست مطالب کتاب CISA Certified Information Systems Auditor Study Guide:

Introduction

Assessment Test

Chapter 1: IT Governance and Management

Chapter 2: The Audit Process

Chapter 3: IT Life Cycle Management

Chapter 4: IT Service Management

Chapter 5: IT Infrastructure

Chapter 6: Business Continuity and Disaster Recovery

Chapter 7: Information Security Management

Chapter 8: Identity and Access Management

Index

Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide

فهرست مطالب کتابCisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide:

Introduction

Part I Introduction to Cybersecurity

Chapter 1 Security Principles

Chapter 2 Common Threats, Attacks, and Vulnerabilities

Chapter 3 Access Management

Chapter 4 Cryptography

Part II Network Security

Chapter 5 Introduction to Networking, Addressing, and TCP/IP Protocols

Chapter 6 Network Infrastructure

Chapter 7 Controlling Network Access

Chapter 8 Wireless SOHO Security

Part III Endpoint Security

Chapter 9 Operating Systems and Tools

Chapter 10 Endpoint Policies and Standards

Chapter 11 Network and Endpoint Malware Detection and Remediation

Chapter 12 Risk and Vulnerability Management

Chapter 13 Threat Intelligence

Chapter 14 Disaster Recovery and Business Continuity

Chapter 15 Incident Handling

Part IV CCST Cybersecurity Preparation

Chapter 16 Final Preparation

Chapter 17 Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide Exam Updates

Appendix A Answers to the “Do I Know This Already?” Quizzes and Review

Questions

Glossary

Index

Online Elements

Appendix B Memory Tables

Appendix C Memory Tables Answer Key

Appendix D Study Planner

Glossary

CISSP Cert Guide-Fifth Edition

:فهرست مطالب کتاب CISSP Cert Guide-Fifth Edition

CHAPTER 1 Security and Risk Management

CHAPTER 2 Asset Security

CHAPTER 3 Security Architecture and Engineering

CHAPTER 4 Communication and Network Security

CHAPTER 5 Identity and Access Management (IAM)

CHAPTER 6 Security Assessment and Testing

CHAPTER 7 Security Operations

CHAPTER 8 Software Development Security

CHAPTER 9 Final Preparation

Online Elements

APPENDIX A Memory Tables

APPENDIX B Memory Tables Answer Key

Glossary

CompTIA PenTest+ Certification For Dummies

فهرست مطالب:

Introduction

Part 1: Planning and Information Gathering

Part 2: Attacks and Exploits

Part 3: Post-Exploitation and Reporting

Part 4: Appendixes

Index

CompTIA PenTest+ Student Guide (Exam PT0-002)

فهرست مطالب:

Lesson 1: Scoping Organizational/Customer Requirements

Lesson 2: Defining the Rules of Engagement

Lesson 3: Footprinting and Gathering Intelligence

Lesson 4: Evaluating Human and Physical Vulnerabilities

Lesson 5: Preparing the Vulnerability Scan

Lesson 6: Scanning Logical Vulnerabilities

Lesson 7: Analyzing Scanning Results

Lesson 8: Avoiding Detection and Covering Tracks

Lesson 9: Exploiting the LAN and Cloud

Lesson 10: Testing Wireless Networks

Lesson 11: Targeting Mobile Devices

Lesson 12: Attacking Specialized Systems

Lesson 13: Web Application-Based Attacks

Lesson 14: Performing System Hacking

Lesson 15: Scripting and Software Development

Lesson 16: Leveraging the Attack: Pivot and Penetrate

Lesson 17: Communicating During the PenTesting Process

Lesson 18: Summarizing Report Components

Lesson 19: Recommending Remediation

Lesson 20: Performing Post-Report Delivery Activities

Appendix A: Mapping Course Content to CompTIA Certification+ (PT0-002)

Solutions

Glossary

Index