CC Certified in Cybersecurity Study Guide

فهرست مطالب:

Introduction

PART I DOMAIN 1: SECURITY PRINCIPLES

CHAPTER 1 Confidentiality, Integrity, Availability, and Non-repudiation

CHAPTER 2 Authentication and Authorization

CHAPTER 3 Privacy

CHAPTER 4 Risk Management

CHAPTER 5 Security Controls

CHAPTER 6 Ethics

CHAPTER 7 Security Governance Processes

PART II DOMAIN 2: BUSINESS CONTINUITY (BC), DISASTER RECOVERY (DR) & INCIDENT RESPONSE (IR) CONCEPTS

CHAPTER 8 Business Continuity

CHAPTER 9 Disaster Recovery

CHAPTER 10 Incident Response

PART III DOMAIN 3: ACCESS CONTROLS CONCEPTS

CHAPTER 11 Physical Access Controls

CHAPTER 12 Logical Access Controls

PART IV DOMAIN 4: NETWORK SECURITY

CHAPTER 13 Computer Networking

CHAPTER 14 Network Threats and Attacks

CHAPTER 15 Threat Identification and Prevention

CHAPTER 16 Network Security Infrastructure

CHAPTER 17 Cloud Computing

PART V DOMAIN 5: SECURITY OPERATIONS

CHAPTER 18 Encryption

CHAPTER 19 Data Handling

CHAPTER 20 Logging and Monitoring

CHAPTER 21 Configuration Management

CHAPTER 22 Best Practice Security Policies

CHAPTER 23 Security Awareness Training

Index

CCNA Cyber Ops SECFND #210-250 Official Cert Guide

فهرست مطالب:

Part I Network Concepts

Part II Security Concepts

Part III Cryptography

Part IV Host-Based Analysis

Part V Security Monitoring and Attack Methods

Part VI Final Preparation

Part VII Appendixes

CCNA Cyber Ops SECFND 210-250 Official Cert Guide

فهرست مطالب:

Introduction

Part I Network Concepts

Part II Security Concepts

Part III Cryptography

Part IV Host-Based Analysis

Part V Security Monitoring and Attack Methods

Part VI Final Preparation

Part VII Appendixes

Elements Available on the Book Website

CCNA Cybersecurity Operations Companion Guide

فهرست مطالب:

Introduction

Chapter 1 Cybersecurity and the Security Operations Center

Chapter 2 Windows Operating System

Chapter 3 Linux Operating System

Chapter 4 Network Protocols and Services

Chapter 5 Network Infrastructure

Chapter 6 Principles of Network Security

Chapter 7 Network Attacks: A Deeper Look

Chapter 8 Protecting the Network

Chapter 9 Cryptography and the Public Key Infrastructure

Chapter 10 Endpoint Security and Analysis

Chapter 11 Security Monitoring

Chapter 12 Intrusion Data Analysis

Chapter 13 Incident Response and Handling

Appendix A Answers to the “Check Your Understanding” Questions

Glossary

Index

CCNA Cybersecurity Operations Companion Guide

فهرست مطالب:

Introduction

Chapter 1 Cybersecurity and the Security Operations Center

Chapter 2 Windows Operating System

Chapter 3 Linux Operating System

Chapter 4 Network Protocols and Services

Chapter 5 Network Infrastructure

Chapter 6 Principles of Network Security

Chapter 7 Network Attacks: A Deeper Look

Chapter 8 Protecting the Network

Chapter 9 Cryptography and the Public Key Infrastructure

Chapter 10 Endpoint Security and Analysis

Chapter 11 Security Monitoring

Chapter 12 Intrusion Data Analysis

Chapter 13 Incident Response and Handling

Appendix A Answers to the “Check Your Understanding” Questions

CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide

فهرست مطالب:

Introduction

Chapter 1. Cybersecurity Fundamentals

Chapter 2. Cryptography

Chapter 3. Software-Defined Networking Security and Network Programmability

Chapter 4. Authentication, Authorization, Accounting (AAA) and Identity Management

Chapter 5. Network Visibility and Segmentation

Chapter 6. Infrastructure Security

Chapter 7. Cisco Next-Generation Firewalls and Cisco Next-Generation Intrusion Prevention Systems

Chapter 8. Virtual Private Networks (VPNs)

Chapter 9. Securing the Cloud

Chapter 10. Content Security

Chapter 11. Endpoint Protection and Detection

Chapter 12. Final Preparations Glossary of Key Terms

Appendix A. Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

Appendix B. CCNP Security Core SCOR (350-701) Exam Updates

Appendix C. (Website only) Study Planner

CCNP and CCIE Security Core SCOR 350‑701 Official Cert Guide (2nd Edition)

فهرست مطالب کتاب CCNP and CCIE Security Core SCOR 350701 Official Cert Guide (2nd Edition):

Chapter 1: Cybersecurity Fundamentals

Chapter 2: Cryptography

Chapter 3: Software‑Defined Networking Security and Network Programmability

Chapter 4: Authentication, Authorization, Accounting (AAA) and Identity Management

Chapter 5: Network Visibility and Segmentation

Chapter 6: Infrastructure Security

Chapter 7: Cisco Secure Firewall

Chapter 8: Virtual Private Networks (VPNs)

Chapter 9: Securing the Cloud

Chapter 10: Content Security

Chapter 11: Endpoint Protection and Detection

Chapter 12: Final Preparation

Chapter 13: CCNP and CCIE Security Core SCOR (350‑701) Exam Updates

CCNP Security Cisco Secure Firewall and Intrusion Prevention System Official Cert Guide

فهرست مطالب:

Introduction

Part I General Deployment

Part II Basic Security Operations

Part III Advanced Configurations

Part IV Conclusion

Part V Appendixes

CCNP Security VPN 642-648 Official Cert Guide

فهرست مطالب:

Part I ASA Architecture and Technologies Overview

Part II Cisco Clientless Remote-Access VPN Solutions

Part III Cisco AnyConnect Remote-Access VPN Solutions

Part IV Cisco Secure Desktop

Part V Cisco IPsec Remote-Access Client Solutions

Part VI Cisco Easy VPN Solutions

Part VII Cisco IPsec Site-to-Site VPN Solutions

Part VIII Exam Preparation

Part IX Appendixes

CEH v10 Certified Ethical Hacker Study Guide

فهرست مطالب:

Introduction

Assessment Test

Chapter 1: Ethical Hacking

Chapter 2: Networking Foundations

Chapter 3: Security Foundations

Chapter 4: Footprinting and Reconnaissance

Chapter 5: Scanning Networks

Chapter 6: Enumeration

Chapter 7: System Hacking

Chapter 8: Malware

Chapter 9: Sniffing

Chapter 10: Social Engineering

Chapter 11: Wireless Security

Chapter 12: Attack and Defense

Chapter 13: Cryptography

Chapter 14: Security Architecture and Design

Appendix: Answers to Review Questions

Index

CEH v11 Certified Ethical Hacker Study Guide

فهرست مطالب:

Introduction

Assessment Test

Chapter 1: Ethical Hacking

Chapter 2: Networking Foundations

Chapter 3: Security Foundations

Chapter 4: Footprinting and Reconnaissance

Chapter 5: Scanning Networks

Chapter 6: Enumeration

Chapter 7: System Hacking

Chapter 8: Malware

Chapter 9: Sniffing

Chapter 10: Social Engineering

Chapter 11: Wireless Security

Chapter 12: Attack and Defense

Chapter 13: Cryptography

Chapter 14: Security Architecture and Design

Chapter 15: Cloud Computing and the Internet of Things

Appendix: Answers to Review Questions

Index

Certified Ethical Hacker (CEH) Preparation Guide

فهرست مطالب:

About the Author

About the Technical Reviewer

Introduction

Chapter 1: Introduction to Ethical Hacking

Chapter 2: Footprinting and Reconnaissance/Scanning Networks

Chapter 3: Enumeration

Chapter 4: System Hacking

Chapter 5: Trojans, Backdoors, Viruses, and Worms

Chapter 6: Sniffers and Social Engineering

Chapter 7: Denial of Service

Chapter 8: Session Hijacking

Chapter 9: Hacking Webservers

Chapter 10: Hacking Web Applications

Chapter 11: SQL Injections

CHAPTER 12: Hacking Wireless Networks

CHAPTER 13: Evading Intrusion Detection Systems, Firewalls, and Honeypots

CHAPTER 14: Buffer Overflow

CHAPTER 15: Cryptography

CHAPTER 16: Penetration Testing

Index