CISA Certified Information Systems Auditor Study Guide
فهرست مطالب کتاب CISA Certified Information Systems Auditor Study Guide:
Introduction
Assessment Test
Chapter 1: IT Governance and Management
Chapter 2: The Audit Process
Chapter 3: IT Life Cycle Management
Chapter 4: IT Service Management
Chapter 5: IT Infrastructure
Chapter 6: Business Continuity and Disaster Recovery
Chapter 7: Information Security Management
Chapter 8: Identity and Access Management
Index
Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide
فهرست مطالب کتابCisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide:
Introduction
Part I Introduction to Cybersecurity
Chapter 1 Security Principles
Chapter 2 Common Threats, Attacks, and Vulnerabilities
Chapter 3 Access Management
Chapter 4 Cryptography
Part II Network Security
Chapter 5 Introduction to Networking, Addressing, and TCP/IP Protocols
Chapter 6 Network Infrastructure
Chapter 7 Controlling Network Access
Chapter 8 Wireless SOHO Security
Part III Endpoint Security
Chapter 9 Operating Systems and Tools
Chapter 10 Endpoint Policies and Standards
Chapter 11 Network and Endpoint Malware Detection and Remediation
Chapter 12 Risk and Vulnerability Management
Chapter 13 Threat Intelligence
Chapter 14 Disaster Recovery and Business Continuity
Chapter 15 Incident Handling
Part IV CCST Cybersecurity Preparation
Chapter 16 Final Preparation
Chapter 17 Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide Exam Updates
Appendix A Answers to the “Do I Know This Already?” Quizzes and Review
Questions
Glossary
Index
Online Elements
Appendix B Memory Tables
Appendix C Memory Tables Answer Key
Appendix D Study Planner
Glossary
CISSP Cert Guide-Fifth Edition
:فهرست مطالب کتاب CISSP Cert Guide-Fifth Edition
CHAPTER 1 Security and Risk Management
CHAPTER 2 Asset Security
CHAPTER 3 Security Architecture and Engineering
CHAPTER 4 Communication and Network Security
CHAPTER 5 Identity and Access Management (IAM)
CHAPTER 6 Security Assessment and Testing
CHAPTER 7 Security Operations
CHAPTER 8 Software Development Security
CHAPTER 9 Final Preparation
Online Elements
APPENDIX A Memory Tables
APPENDIX B Memory Tables Answer Key
Glossary
CISSP: Certified Information Systems Security Professional Study Guide (Third Edition)
فهرست مطالب کتاب CISSP: Certified Information Systems Security Professional Study Guide:
Introduction
Assessment Test
Chapter 1 Accountability and Access Control
Chapter 2 Attacks and Monitoring
Chapter 3 ISO Model, Network Security, and Protocols
Chapter 4 Communications Security and Countermeasures
Chapter 5 Security Management Concepts and Principles
Chapter 6 Asset Value, Policies, and Roles
Chapter 7 Data and Application Security Issues
Chapter 8 Malicious Code and Application Attacks
Chapter 9 Cryptography and Private Key Algorithms
Chapter 10 PKI and Cryptographic Applications
Chapter 11 Principles of Computer Design
Chapter 12 Principles of Security Models
Chapter 13 Administrative Management
Chapter 14 Auditing and Monitoring
Chapter 15 Business Continuity Planning
Chapter 16 Disaster Recovery Planning
Chapter 17 Law and Investigations
Chapter 18 Incidents and Ethics
Chapter 19 Physical Security Requirements
Glossary
Index
CompTIA PenTest+ Certification For Dummies
فهرست مطالب:
Introduction
Part 1: Planning and Information Gathering
Part 2: Attacks and Exploits
Part 3: Post-Exploitation and Reporting
Part 4: Appendixes
Index
CompTIA PenTest+ Student Guide (Exam PT0-002)
فهرست مطالب:
Lesson 1: Scoping Organizational/Customer Requirements
Lesson 2: Defining the Rules of Engagement
Lesson 3: Footprinting and Gathering Intelligence
Lesson 4: Evaluating Human and Physical Vulnerabilities
Lesson 5: Preparing the Vulnerability Scan
Lesson 6: Scanning Logical Vulnerabilities
Lesson 7: Analyzing Scanning Results
Lesson 8: Avoiding Detection and Covering Tracks
Lesson 9: Exploiting the LAN and Cloud
Lesson 10: Testing Wireless Networks
Lesson 11: Targeting Mobile Devices
Lesson 12: Attacking Specialized Systems
Lesson 13: Web Application-Based Attacks
Lesson 14: Performing System Hacking
Lesson 15: Scripting and Software Development
Lesson 16: Leveraging the Attack: Pivot and Penetrate
Lesson 17: Communicating During the PenTesting Process
Lesson 18: Summarizing Report Components
Lesson 19: Recommending Remediation
Lesson 20: Performing Post-Report Delivery Activities
Appendix A: Mapping Course Content to CompTIA Certification+ (PT0-002)
Solutions
Glossary
Index
CompTIA PenTest+ Study Guide (Exam PT0-001)
فهرست مطالب:
Introduction
Assessment Test
Chapter 1 Penetration Testing
Chapter 2 Planning and Scoping Penetration Tests
Chapter 3 Information Gathering
Chapter 4 Vulnerability Scanning
Chapter 5 Analyzing Vulnerability Scans
Chapter 6 Exploit and Pivot
Chapter 7 Exploiting Network Vulnerabilities
Chapter 8 Exploiting Physical and Social Vulnerabilities
Chapter 9 Exploiting Application Vulnerabilities
Chapter 10 Exploiting Host Vulnerabilities
Chapter 11 Scripting for Penetration Testing
Chapter 12 Reporting and Communication
Appendix Answers to Review Questions
Index
CompTIA PenTest+ Study Guide Exam PT0-001
فهرست مطالب
Introduction
Assessment Test
Chapter 1: Penetration Testing
Chapter 2: Planning and Scoping Penetration Tests
Chapter 3: Information Gathering
Chapter 4: Vulnerability Scanning
Chapter 5: Analyzing Vulnerability Scans
Chapter 6: Exploit and Pivot
Chapter 7: Exploiting Network Vulnerabilities
Chapter 8: Exploiting Physical and Social Vulnerabilities
Chapter 9: Exploiting Application Vulnerabilities
Chapter 10: Exploiting Host Vulnerabilities
Chapter 11: Scripting for Penetration Testing
Chapter 12: Reporting and Communication
Appendix: Answers to Review Questions
Index
CompTIA Security+ All-in-One Exam Guide (Exam SY0-501)
فهرست مطالب:
Part I Threats, Attacks, and Vulnerabilities
Part II Technologies and Tools
Part III Architecture and Design
Part IV Identity and Access Management
Part V Risk Management
Part VI Cryptography and Public Key Infrastructure
Part VII Appendixes and Glossary
Appendix A OSI Model and Internet Protocols
Appendix B About the Download
CompTIA Security+ Practice Tests Exam SY0-701 – Third Edition
فهرست مطالب کتاب CompTIA Security+ Practice Tests Exam SY0-701 – Third Edition:
Introduction
Chapter 1 Domain 1.0: General Security Concepts
Chapter 2 Domain 2.0: Threats, Vulnerabilities, and Mitigations
Chapter 3 Domain 3.0: Security Architecture
Chapter 4 Domain 4.0: Security Operations
Chapter 5 Domain 5.0: Security Program Management and Oversight
Appendix Answers to Review Questions
Index
CompTIA Security+ Review Guide SY0-501
فهرست مطالب:
Introduction
Chapter 1: Threats, Attacks, and Vulnerabilities
Chapter 2: Technologies and Tools
Chapter 3: Architecture and Design
Chapter 4: Identity and Access Management
Chapter 5: Risk Management
Chapter 6: Cryptography and PKI
Appendix: Answers to Review Questions
Index
CompTIA Security+ Study Guide Exam SY0‑701
فهرست مطالب:
Table of Contents
Title Page
Copyright
Dedication
Acknowledgments
About the Authors
About the Technical Editor
About the Technical Proofreader
Introduction
Chapter 1: Today’s Security Professional
Chapter 2: Cybersecurity Threat Landscape
Chapter 3: Malicious Code
Chapter 4: Social Engineering and Password Attacks
Chapter 5: Security Assessment and Testing
Chapter 6: Application Security
Chapter 7: Cryptography and the PKI
Chapter 8: Identity and Access Management
Chapter 9: Resilience and Physical Security
Chapter 10: Cloud and Virtualization Security
Chapter 11: Endpoint Security
Chapter 12: Network Security
Chapter 13: Wireless and Mobile Security
Chapter 14: Monitoring and Incident Response
Chapter 15: Digital Forensics
Chapter 16: Security Governance and Compliance
Chapter 17: Risk Management and Privacy
Index
WILEY END USER LICENSE AGREEMENT