CompTIA Security+ Study Guide: Exam SY0-610

فهرست مطالب:

Section 1: Security Aims and Objectives

Section 2: Monitoring the Security Infrastructure

Section 3: Protecting the Security Environment

Section 4: Mock Tests

CompTIA Security+ SY0-701 Digestible Exam Study Guide 2024

فهرست مطالب کتاب CompTIA Security+ SY0-701:

Introduction

General Security Concepts

Threats, Vulnerabilities, and Mitigations

Security Architecture

Security Operations

Security Program Management and Oversight

END

Computer and Information Security Handbook

فهرست مطالب کتاب Computer and Information Security Handbook:

Part I: Overview of System and Network Security – A Comprehensive Introduction

Building a Secure Organization

A Cryptography Primer

Preventing System Intrusions

Guarding Against Network Intrusions

Unix and Linux Security

Eliminating the Security Weakness of Linux and Unix Operating Systems

Internet Security

The Botnet Problem

Intranet Security

Local Area Network Security

Wireless Network Security

Cellular Network Security

RFID Security

Part II: Managing Information Security

Information Security Essentials for IT Managers, Protecting Mission-Critical Systems

Security Management Systems

Information Technology Security Management

Identity Management

Intrusion Prevention and Detection Systems

Computer Forensics

Network Forensics

Firewalls

Penetration Testing

What Is Vulnerability Assessment?

Part III: Encryption Technology

Data Encryption

Satellite Encryption

Public Key Infrastructure

Instant-Messaging Security

Part IV: Privacy and Access Management

NET Privacy

Personal Privacy Policies

Virtual Private Networks

Identity Theft

VoIP Security

Part V: Storage Security

SAN Security

Storage Area Networking Devices Security

Risk Management

Part VI: Physical Security

Physical Security Essentials

Biometrics

Homeland Security

Information Warfare

Part VII: Advanced Security

Security Through Diversity

Reputation Management

Content Filtering

Data Loss Protection

Part VIII: Appendices

Appendix A

Appendix B

Appendix C

Appendix D

Appendix E

Appendix F

Appendix G

Appendix H

Appendix I

Appendix J

Computer Forensics: Investigating Network Intrusions and Cyber Crime

فهرست مطالب کتاب Computer Forensics: Investigating Network Intrusions and Cyber Crime:

PREFACE

CHAPTER 1: Network Forensics and Investigating Logs

CHAPTER 2: Investigating Network Traffic

CHAPTER 3: Investigating Web Attacks

CHAPTER 4: Router Forensics

CHAPTER 5: Investigating DoS Attacks

CHAPTER 6: Investigating Internet Crime

CHAPTER 7: Tracking E-Mails and Investigating E-Mail Crime

CHAPTER 8: Investigating Corporate Espionage

CHAPTER 9: Investigating Trademark and Copyright Infringement

CHAPTER 10: Investigating Sexual Harassment Incidents

CHAPTER 11: Investigating Child Pornography

INDEX

Computer Security and Cryptography

فهرست مطالب کتاب Computer Security and Cryptography:

CHAPTER 1: APERITIFS

CHAPTER 2: COLUMNAR TRANSPOSITION

CHAPTER 3: MONOALPHABETIC SUBSTITUTION

CHAPTER 4: POLYALPHABETIC SUBSTITUTION

CHAPTER 5: STATISTICAL TESTS

CHAPTER 6: THE EMERGENCE OF CIPHER MACHINES

CHAPTER 7: THE JAPANESE CIPHER MACHINES

CHAPTER 8: STREAM CIPHERS

CHAPTER 9: BLOCK-CIPHERS: LUCIFER, DES, AND AES

CHAPTER 10: THE PARADIGM OF PUBLIC KEY CRYPTOGRAPHY

CHAPTER 11: THE KNAPSACK CRYPTOSYSTEM

CHAPTER 12: THE RSA CRYPTOSYSTEM

CHAPTER 13: PRIME NUMBERS AND FACTORIZATION

CHAPTER 14: THE DISCRETE LOGARITHM PROBLEM

CHAPTER 15: ELLIPTIC CURVE CRYPTOGRAPHY

CHAPTER 16: KEY EXCHANGE IN A NETWORK

CHAPTER 17: DIGITAL SIGNATURES AND AUTHENTICATION

CHAPTER 18: APPLICATIONS OF CRYPTOGRAPHY

CHAPTER 19: CRYPTOGRAPHIC PATENTS

Computer Security Fundamentals Fourth Edition

فهرست مطالب کتاب Computer Security Fundamentals:

Chapter 1. Introduction to Computer Security

Chapter 2. Networks and the Internet

Chapter 3. Cyber Stalking, Fraud, and Abuse

Chapter 4. Denial of Service Attacks

Chapter 5. Malware

Chapter 6. Techniques Used by Hackers

Chapter 7. Industrial Espionage in Cyberspace

Chapter 8. Encryption

Chapter 9. Computer Security Technology

Chapter 10. Security Policies

Chapter 11. Network Scanning and Vulnerability Scanning

Chapter 12. Cyber Terrorism and Information Warfare

Chapter 13. Cyber Detective

Chapter 14. Introduction to Forensics

Chapter 15. Cybersecurity Engineering

Cross‑Site Scripting Attacks: XSS Exploits and Defense

فهرست مطالب کتاب CrossSite Scripting Attacks: XSS Exploits and Defense:

Chapter 1: Cross-site Scripting Fundamentals

Chapter 2: The XSS Discovery Toolkit

Chapter 3: XSS Theory

Chapter 4: XSS Attack Methods

Chapter 5: Advanced XSS Attack Vectors

Chapter 6: XSS Exploited

Chapter 7: Exploit Frameworks

Chapter 8: XSS Worms

Chapter 9: Preventing XSS Attacks

Cryptography and Network Security: Principles and Practice – Eighth Edition (Global Edition)

فهرست مطالب:

Part One: Background

Part Two: Symmetric Ciphers

Part Three: Asymmetric Ciphers

Part Four: Cryptographic Data Integrity Algorithms

Part Five: Mutual Trust

Part Six: Network and Internet Security

Digital Forensics Essentials Professional Series

فهرست مطالب کتاب Digital Forensics Essentials Professional Series:

Module 01: Computer Forensics Fundamentals

Fundamentals of Computer Forensics

Digital Evidence

Forensic Readiness

Roles and Responsibilities of a Forensic Investigator

Legal Compliance in Computer Forensics

Module 02: Computer Forensics Investigation Process

Forensic Investigation Process and its Importance

Forensic Investigation Process – Pre-investigation Phase

Forensic Investigation Process – Investigation Phase

Forensic Investigation Process – Post-investigation Phase

Module 03: Understanding Hard Disks and File Systems

Different Types of Disk Drives and their Characteristics

Logical Structure of a Disk

Booting Process of Windows, Linux, and Mac Operating Systems

File Systems of Windows, Linux, and Mac Operating Systems

File System Examination

Module 04: Data Acquisition and Duplication

Data Acquisition Fundamentals

Types of Data Acquisition

Data Acquisition Format

Data Acquisition Methodology

Module 05: Defeating Anti-forensics Techniques

Anti-forensics and its Techniques

Anti-forensics Countermeasures

Module 06: Windows Forensics

Volatile and Non-Volatile Information

Windows Memory and Registry Analysis

Cache, Cookie, and History Recorded in Web Browsers

Windows Files and Metadata

Module 07: Linux and Mac Forensics

Volatile and Non-Volatile Data in Linux

Analyze Filesystem Images Using The Sleuth Kit

Memory Forensics

Mac Forensics

Module 08: Network Forensics

Network Forensics Fundamentals

Event Correlation Concepts and Types

Identify Indicators of Compromise (IoCs) from Network Logs

Investigate Network Traffic

Module 09: Investigating Web Attacks

Web Application Forensics

IIS and Apache Web Server Logs

Investigating Web Attacks on Windows-based Servers

Detect and Investigate Attacks on Web Applications

Module 10: Dark Web Forensics

Dark Web

Dark Web Forensics

Tor Browser Forensics

Module 11: Investigating Email Crimes

Email Basics

Email Crime Investigation and its Steps

Module 12: Malware Forensics

Malware, its Components and Distribution Methods

Malware Forensics Fundamentals and Recognize Types of Malware Analysis

Static Malware Analysis

Analyze Suspicious Word Documents

Dynamic Malware Analysis

System Behavior Analysis

Network Behavior Analysis

Glossary

References

Digital Forensics with Open Source Tools

فهرست مطالب کتاب Digital Forensics with Open Source Tools:

About the Authors

Acknowledgments

Introduction

CHAPTER 1: Digital Forensics with Open Source Tools

CHAPTER 2: Open Source Examination Platform

CHAPTER 3: Disk and File System Analysis

CHAPTER 4: Windows Systems and Artifacts

CHAPTER 5: Linux Systems and Artifacts

CHAPTER 6: Mac OS X Systems and Artifacts

CHAPTER 7: Internet Artifacts

CHAPTER 8: File Analysis

CHAPTER 9: Automating Analysis and Extending Capabilities

Appendix A: Free, Non-open Tools of Note

Index

EC-Council Certified Incident Handler v3 – CEI Material

فهرست مطالب کتاب Certified Incident Handler: Building a Culture of Security:

What Is ECIH

ECIH TRAINING SCHEDULE AND EXAM Information

How to Access Course rel ated material

CLASS MINIMUM REQUIREMENTS, Basic Lab Setup

Requirements, and Lab Setup Environment

What Is EC-COUNCIL CYBERQ

What shoul d you ensure before going to Cl ass

How to Teach ECIH

Where to get help