CISA Certified Information Systems Auditor Study Guide

فهرست مطالب کتاب CISA Certified Information Systems Auditor Study Guide:

Introduction

Assessment Test

Chapter 1: IT Governance and Management

Chapter 2: The Audit Process

Chapter 3: IT Life Cycle Management

Chapter 4: IT Service Management

Chapter 5: IT Infrastructure

Chapter 6: Business Continuity and Disaster Recovery

Chapter 7: Information Security Management

Chapter 8: Identity and Access Management

Index

Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide

فهرست مطالب کتابCisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide:

Introduction

Part I Introduction to Cybersecurity

Chapter 1 Security Principles

Chapter 2 Common Threats, Attacks, and Vulnerabilities

Chapter 3 Access Management

Chapter 4 Cryptography

Part II Network Security

Chapter 5 Introduction to Networking, Addressing, and TCP/IP Protocols

Chapter 6 Network Infrastructure

Chapter 7 Controlling Network Access

Chapter 8 Wireless SOHO Security

Part III Endpoint Security

Chapter 9 Operating Systems and Tools

Chapter 10 Endpoint Policies and Standards

Chapter 11 Network and Endpoint Malware Detection and Remediation

Chapter 12 Risk and Vulnerability Management

Chapter 13 Threat Intelligence

Chapter 14 Disaster Recovery and Business Continuity

Chapter 15 Incident Handling

Part IV CCST Cybersecurity Preparation

Chapter 16 Final Preparation

Chapter 17 Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide Exam Updates

Appendix A Answers to the “Do I Know This Already?” Quizzes and Review

Questions

Glossary

Index

Online Elements

Appendix B Memory Tables

Appendix C Memory Tables Answer Key

Appendix D Study Planner

Glossary

CISSP Cert Guide-Fifth Edition

:فهرست مطالب کتاب CISSP Cert Guide-Fifth Edition

CHAPTER 1 Security and Risk Management

CHAPTER 2 Asset Security

CHAPTER 3 Security Architecture and Engineering

CHAPTER 4 Communication and Network Security

CHAPTER 5 Identity and Access Management (IAM)

CHAPTER 6 Security Assessment and Testing

CHAPTER 7 Security Operations

CHAPTER 8 Software Development Security

CHAPTER 9 Final Preparation

Online Elements

APPENDIX A Memory Tables

APPENDIX B Memory Tables Answer Key

Glossary

CISSP: Certified Information Systems Security Professional Study Guide (Third Edition)

فهرست مطالب کتاب CISSP: Certified Information Systems Security Professional Study Guide:

Introduction

Assessment Test

Chapter 1 Accountability and Access Control

Chapter 2 Attacks and Monitoring

Chapter 3 ISO Model, Network Security, and Protocols

Chapter 4 Communications Security and Countermeasures

Chapter 5 Security Management Concepts and Principles

Chapter 6 Asset Value, Policies, and Roles

Chapter 7 Data and Application Security Issues

Chapter 8 Malicious Code and Application Attacks

Chapter 9 Cryptography and Private Key Algorithms

Chapter 10 PKI and Cryptographic Applications

Chapter 11 Principles of Computer Design

Chapter 12 Principles of Security Models

Chapter 13 Administrative Management

Chapter 14 Auditing and Monitoring

Chapter 15 Business Continuity Planning

Chapter 16 Disaster Recovery Planning

Chapter 17 Law and Investigations

Chapter 18 Incidents and Ethics

Chapter 19 Physical Security Requirements

Glossary

Index

CompTIA PenTest+ Certification For Dummies

فهرست مطالب:

Introduction

Part 1: Planning and Information Gathering

Part 2: Attacks and Exploits

Part 3: Post-Exploitation and Reporting

Part 4: Appendixes

Index

CompTIA PenTest+ Student Guide (Exam PT0-002)

فهرست مطالب:

Lesson 1: Scoping Organizational/Customer Requirements

Lesson 2: Defining the Rules of Engagement

Lesson 3: Footprinting and Gathering Intelligence

Lesson 4: Evaluating Human and Physical Vulnerabilities

Lesson 5: Preparing the Vulnerability Scan

Lesson 6: Scanning Logical Vulnerabilities

Lesson 7: Analyzing Scanning Results

Lesson 8: Avoiding Detection and Covering Tracks

Lesson 9: Exploiting the LAN and Cloud

Lesson 10: Testing Wireless Networks

Lesson 11: Targeting Mobile Devices

Lesson 12: Attacking Specialized Systems

Lesson 13: Web Application-Based Attacks

Lesson 14: Performing System Hacking

Lesson 15: Scripting and Software Development

Lesson 16: Leveraging the Attack: Pivot and Penetrate

Lesson 17: Communicating During the PenTesting Process

Lesson 18: Summarizing Report Components

Lesson 19: Recommending Remediation

Lesson 20: Performing Post-Report Delivery Activities

Appendix A: Mapping Course Content to CompTIA Certification+ (PT0-002)

Solutions

Glossary

Index

CompTIA PenTest+ Study Guide (Exam PT0-001)

فهرست مطالب:

Introduction

Assessment Test

Chapter 1 Penetration Testing

Chapter 2 Planning and Scoping Penetration Tests

Chapter 3 Information Gathering

Chapter 4 Vulnerability Scanning

Chapter 5 Analyzing Vulnerability Scans

Chapter 6 Exploit and Pivot

Chapter 7 Exploiting Network Vulnerabilities

Chapter 8 Exploiting Physical and Social Vulnerabilities

Chapter 9 Exploiting Application Vulnerabilities

Chapter 10 Exploiting Host Vulnerabilities

Chapter 11 Scripting for Penetration Testing

Chapter 12 Reporting and Communication

Appendix Answers to Review Questions

Index

CompTIA PenTest+ Study Guide Exam PT0-001

فهرست مطالب

Introduction

Assessment Test

Chapter 1: Penetration Testing

Chapter 2: Planning and Scoping Penetration Tests

Chapter 3: Information Gathering

Chapter 4: Vulnerability Scanning

Chapter 5: Analyzing Vulnerability Scans

Chapter 6: Exploit and Pivot

Chapter 7: Exploiting Network Vulnerabilities

Chapter 8: Exploiting Physical and Social Vulnerabilities

Chapter 9: Exploiting Application Vulnerabilities

Chapter 10: Exploiting Host Vulnerabilities

Chapter 11: Scripting for Penetration Testing

Chapter 12: Reporting and Communication

Appendix: Answers to Review Questions

Index

CompTIA Security+ All-in-One Exam Guide (Exam SY0-501)

فهرست مطالب:

Part I Threats, Attacks, and Vulnerabilities

Part II Technologies and Tools

Part III Architecture and Design

Part IV Identity and Access Management

Part V Risk Management

Part VI Cryptography and Public Key Infrastructure

Part VII Appendixes and Glossary

Appendix A OSI Model and Internet Protocols

Appendix B About the Download

CompTIA Security+ Practice Tests Exam SY0-701 – Third Edition

فهرست مطالب کتاب CompTIA Security+ Practice Tests Exam SY0-701 – Third Edition:

Introduction

Chapter 1 Domain 1.0: General Security Concepts

Chapter 2 Domain 2.0: Threats, Vulnerabilities, and Mitigations

Chapter 3 Domain 3.0: Security Architecture

Chapter 4 Domain 4.0: Security Operations

Chapter 5 Domain 5.0: Security Program Management and Oversight

Appendix Answers to Review Questions

Index

CompTIA Security+ Review Guide SY0-501

فهرست مطالب:

Introduction

Chapter 1: Threats, Attacks, and Vulnerabilities

Chapter 2: Technologies and Tools

Chapter 3: Architecture and Design

Chapter 4: Identity and Access Management

Chapter 5: Risk Management

Chapter 6: Cryptography and PKI

Appendix: Answers to Review Questions

Index

CompTIA Security+ Study Guide Exam SY0‑701

فهرست مطالب:

Table of Contents

Title Page

Copyright

Dedication

Acknowledgments

About the Authors

About the Technical Editor

About the Technical Proofreader

Introduction

Chapter 1: Today’s Security Professional

Chapter 2: Cybersecurity Threat Landscape

Chapter 3: Malicious Code

Chapter 4: Social Engineering and Password Attacks

Chapter 5: Security Assessment and Testing

Chapter 6: Application Security

Chapter 7: Cryptography and the PKI

Chapter 8: Identity and Access Management

Chapter 9: Resilience and Physical Security

Chapter 10: Cloud and Virtualization Security

Chapter 11: Endpoint Security

Chapter 12: Network Security

Chapter 13: Wireless and Mobile Security

Chapter 14: Monitoring and Incident Response

Chapter 15: Digital Forensics

Chapter 16: Security Governance and Compliance

Chapter 17: Risk Management and Privacy

Index

WILEY END USER LICENSE AGREEMENT