CC Certified in Cybersecurity Study Guide
فهرست مطالب:
Introduction
PART I DOMAIN 1: SECURITY PRINCIPLES
CHAPTER 1 Confidentiality, Integrity, Availability, and Non-repudiation
CHAPTER 2 Authentication and Authorization
CHAPTER 3 Privacy
CHAPTER 4 Risk Management
CHAPTER 5 Security Controls
CHAPTER 6 Ethics
CHAPTER 7 Security Governance Processes
PART II DOMAIN 2: BUSINESS CONTINUITY (BC), DISASTER RECOVERY (DR) & INCIDENT RESPONSE (IR) CONCEPTS
CHAPTER 8 Business Continuity
CHAPTER 9 Disaster Recovery
CHAPTER 10 Incident Response
PART III DOMAIN 3: ACCESS CONTROLS CONCEPTS
CHAPTER 11 Physical Access Controls
CHAPTER 12 Logical Access Controls
PART IV DOMAIN 4: NETWORK SECURITY
CHAPTER 13 Computer Networking
CHAPTER 14 Network Threats and Attacks
CHAPTER 15 Threat Identification and Prevention
CHAPTER 16 Network Security Infrastructure
CHAPTER 17 Cloud Computing
PART V DOMAIN 5: SECURITY OPERATIONS
CHAPTER 18 Encryption
CHAPTER 19 Data Handling
CHAPTER 20 Logging and Monitoring
CHAPTER 21 Configuration Management
CHAPTER 22 Best Practice Security Policies
CHAPTER 23 Security Awareness Training
Index
CCNA Cyber Ops SECFND #210-250 Official Cert Guide
فهرست مطالب:
Part I Network Concepts
Part II Security Concepts
Part III Cryptography
Part IV Host-Based Analysis
Part V Security Monitoring and Attack Methods
Part VI Final Preparation
Part VII Appendixes
CCNA Cyber Ops SECFND 210-250 Official Cert Guide
فهرست مطالب:
Introduction
Part I Network Concepts
Part II Security Concepts
Part III Cryptography
Part IV Host-Based Analysis
Part V Security Monitoring and Attack Methods
Part VI Final Preparation
Part VII Appendixes
Elements Available on the Book Website
CCNA Cybersecurity Operations Companion Guide
فهرست مطالب:
Introduction
Chapter 1 Cybersecurity and the Security Operations Center
Chapter 2 Windows Operating System
Chapter 3 Linux Operating System
Chapter 4 Network Protocols and Services
Chapter 5 Network Infrastructure
Chapter 6 Principles of Network Security
Chapter 7 Network Attacks: A Deeper Look
Chapter 8 Protecting the Network
Chapter 9 Cryptography and the Public Key Infrastructure
Chapter 10 Endpoint Security and Analysis
Chapter 11 Security Monitoring
Chapter 12 Intrusion Data Analysis
Chapter 13 Incident Response and Handling
Appendix A Answers to the “Check Your Understanding” Questions
Glossary
Index
CCNA Cybersecurity Operations Companion Guide
فهرست مطالب:
Introduction
Chapter 1 Cybersecurity and the Security Operations Center
Chapter 2 Windows Operating System
Chapter 3 Linux Operating System
Chapter 4 Network Protocols and Services
Chapter 5 Network Infrastructure
Chapter 6 Principles of Network Security
Chapter 7 Network Attacks: A Deeper Look
Chapter 8 Protecting the Network
Chapter 9 Cryptography and the Public Key Infrastructure
Chapter 10 Endpoint Security and Analysis
Chapter 11 Security Monitoring
Chapter 12 Intrusion Data Analysis
Chapter 13 Incident Response and Handling
Appendix A Answers to the “Check Your Understanding” Questions
CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide
فهرست مطالب:
Introduction
Chapter 1. Cybersecurity Fundamentals
Chapter 2. Cryptography
Chapter 3. Software-Defined Networking Security and Network Programmability
Chapter 4. Authentication, Authorization, Accounting (AAA) and Identity Management
Chapter 5. Network Visibility and Segmentation
Chapter 6. Infrastructure Security
Chapter 7. Cisco Next-Generation Firewalls and Cisco Next-Generation Intrusion Prevention Systems
Chapter 8. Virtual Private Networks (VPNs)
Chapter 9. Securing the Cloud
Chapter 10. Content Security
Chapter 11. Endpoint Protection and Detection
Chapter 12. Final Preparations Glossary of Key Terms
Appendix A. Answers to the “Do I Know This Already?” Quizzes and Q&A Sections
Appendix B. CCNP Security Core SCOR (350-701) Exam Updates
Appendix C. (Website only) Study Planner
CCNP and CCIE Security Core SCOR 350‑701 Official Cert Guide (2nd Edition)
فهرست مطالب کتاب CCNP and CCIE Security Core SCOR 350‑701 Official Cert Guide (2nd Edition):
Chapter 1: Cybersecurity Fundamentals
Chapter 2: Cryptography
Chapter 3: Software‑Defined Networking Security and Network Programmability
Chapter 4: Authentication, Authorization, Accounting (AAA) and Identity Management
Chapter 5: Network Visibility and Segmentation
Chapter 6: Infrastructure Security
Chapter 7: Cisco Secure Firewall
Chapter 8: Virtual Private Networks (VPNs)
Chapter 9: Securing the Cloud
Chapter 10: Content Security
Chapter 11: Endpoint Protection and Detection
Chapter 12: Final Preparation
Chapter 13: CCNP and CCIE Security Core SCOR (350‑701) Exam Updates
CCNP Security Cisco Secure Firewall and Intrusion Prevention System Official Cert Guide
فهرست مطالب:
Introduction
Part I General Deployment
Part II Basic Security Operations
Part III Advanced Configurations
Part IV Conclusion
Part V Appendixes
CCNP Security VPN 642-648 Official Cert Guide
فهرست مطالب:
Part I ASA Architecture and Technologies Overview
Part II Cisco Clientless Remote-Access VPN Solutions
Part III Cisco AnyConnect Remote-Access VPN Solutions
Part IV Cisco Secure Desktop
Part V Cisco IPsec Remote-Access Client Solutions
Part VI Cisco Easy VPN Solutions
Part VII Cisco IPsec Site-to-Site VPN Solutions
Part VIII Exam Preparation
Part IX Appendixes
CEH v10 Certified Ethical Hacker Study Guide
فهرست مطالب:
Introduction
Assessment Test
Chapter 1: Ethical Hacking
Chapter 2: Networking Foundations
Chapter 3: Security Foundations
Chapter 4: Footprinting and Reconnaissance
Chapter 5: Scanning Networks
Chapter 6: Enumeration
Chapter 7: System Hacking
Chapter 8: Malware
Chapter 9: Sniffing
Chapter 10: Social Engineering
Chapter 11: Wireless Security
Chapter 12: Attack and Defense
Chapter 13: Cryptography
Chapter 14: Security Architecture and Design
Appendix: Answers to Review Questions
Index
CEH v11 Certified Ethical Hacker Study Guide
فهرست مطالب:
Introduction
Assessment Test
Chapter 1: Ethical Hacking
Chapter 2: Networking Foundations
Chapter 3: Security Foundations
Chapter 4: Footprinting and Reconnaissance
Chapter 5: Scanning Networks
Chapter 6: Enumeration
Chapter 7: System Hacking
Chapter 8: Malware
Chapter 9: Sniffing
Chapter 10: Social Engineering
Chapter 11: Wireless Security
Chapter 12: Attack and Defense
Chapter 13: Cryptography
Chapter 14: Security Architecture and Design
Chapter 15: Cloud Computing and the Internet of Things
Appendix: Answers to Review Questions
Index
Certified Ethical Hacker (CEH) Preparation Guide
فهرست مطالب:
About the Author
About the Technical Reviewer
Introduction
Chapter 1: Introduction to Ethical Hacking
Chapter 2: Footprinting and Reconnaissance/Scanning Networks
Chapter 3: Enumeration
Chapter 4: System Hacking
Chapter 5: Trojans, Backdoors, Viruses, and Worms
Chapter 6: Sniffers and Social Engineering
Chapter 7: Denial of Service
Chapter 8: Session Hijacking
Chapter 9: Hacking Webservers
Chapter 10: Hacking Web Applications
Chapter 11: SQL Injections
CHAPTER 12: Hacking Wireless Networks
CHAPTER 13: Evading Intrusion Detection Systems, Firewalls, and Honeypots
CHAPTER 14: Buffer Overflow
CHAPTER 15: Cryptography
CHAPTER 16: Penetration Testing
Index