CompTIA PenTest+ Study Guide (Exam PT0-001)
فهرست مطالب:
Introduction
Assessment Test
Chapter 1 Penetration Testing
Chapter 2 Planning and Scoping Penetration Tests
Chapter 3 Information Gathering
Chapter 4 Vulnerability Scanning
Chapter 5 Analyzing Vulnerability Scans
Chapter 6 Exploit and Pivot
Chapter 7 Exploiting Network Vulnerabilities
Chapter 8 Exploiting Physical and Social Vulnerabilities
Chapter 9 Exploiting Application Vulnerabilities
Chapter 10 Exploiting Host Vulnerabilities
Chapter 11 Scripting for Penetration Testing
Chapter 12 Reporting and Communication
Appendix Answers to Review Questions
Index
CompTIA PenTest+ Study Guide Exam PT0-001
فهرست مطالب
Introduction
Assessment Test
Chapter 1: Penetration Testing
Chapter 2: Planning and Scoping Penetration Tests
Chapter 3: Information Gathering
Chapter 4: Vulnerability Scanning
Chapter 5: Analyzing Vulnerability Scans
Chapter 6: Exploit and Pivot
Chapter 7: Exploiting Network Vulnerabilities
Chapter 8: Exploiting Physical and Social Vulnerabilities
Chapter 9: Exploiting Application Vulnerabilities
Chapter 10: Exploiting Host Vulnerabilities
Chapter 11: Scripting for Penetration Testing
Chapter 12: Reporting and Communication
Appendix: Answers to Review Questions
Index
CompTIA Security+ All-in-One Exam Guide (Exam SY0-501)
فهرست مطالب:
Part I Threats, Attacks, and Vulnerabilities
Part II Technologies and Tools
Part III Architecture and Design
Part IV Identity and Access Management
Part V Risk Management
Part VI Cryptography and Public Key Infrastructure
Part VII Appendixes and Glossary
Appendix A OSI Model and Internet Protocols
Appendix B About the Download
CompTIA Security+ Practice Tests Exam SY0-701 – Third Edition
فهرست مطالب کتاب CompTIA Security+ Practice Tests Exam SY0-701 – Third Edition:
Introduction
Chapter 1 Domain 1.0: General Security Concepts
Chapter 2 Domain 2.0: Threats, Vulnerabilities, and Mitigations
Chapter 3 Domain 3.0: Security Architecture
Chapter 4 Domain 4.0: Security Operations
Chapter 5 Domain 5.0: Security Program Management and Oversight
Appendix Answers to Review Questions
Index
CompTIA Security+ Review Guide SY0-501
فهرست مطالب:
Introduction
Chapter 1: Threats, Attacks, and Vulnerabilities
Chapter 2: Technologies and Tools
Chapter 3: Architecture and Design
Chapter 4: Identity and Access Management
Chapter 5: Risk Management
Chapter 6: Cryptography and PKI
Appendix: Answers to Review Questions
Index
CompTIA Security+ Study Guide Exam SY0‑701
فهرست مطالب:
Table of Contents
Title Page
Copyright
Dedication
Acknowledgments
About the Authors
About the Technical Editor
About the Technical Proofreader
Introduction
Chapter 1: Today’s Security Professional
Chapter 2: Cybersecurity Threat Landscape
Chapter 3: Malicious Code
Chapter 4: Social Engineering and Password Attacks
Chapter 5: Security Assessment and Testing
Chapter 6: Application Security
Chapter 7: Cryptography and the PKI
Chapter 8: Identity and Access Management
Chapter 9: Resilience and Physical Security
Chapter 10: Cloud and Virtualization Security
Chapter 11: Endpoint Security
Chapter 12: Network Security
Chapter 13: Wireless and Mobile Security
Chapter 14: Monitoring and Incident Response
Chapter 15: Digital Forensics
Chapter 16: Security Governance and Compliance
Chapter 17: Risk Management and Privacy
Index
WILEY END USER LICENSE AGREEMENT
CompTIA Security+ Study Guide: Exam SY0-610
فهرست مطالب:
Section 1: Security Aims and Objectives
Section 2: Monitoring the Security Infrastructure
Section 3: Protecting the Security Environment
Section 4: Mock Tests
CompTIA Security+ SY0-701 Digestible Exam Study Guide 2024
فهرست مطالب کتاب CompTIA Security+ SY0-701:
Introduction
General Security Concepts
Threats, Vulnerabilities, and Mitigations
Security Architecture
Security Operations
Security Program Management and Oversight
END
CompTIA Tech+ Study Guide Exam FC0-U71
فهرست مطالب کتاب CompTIA Tech+ Study Guide:
Introduction
Assessment Test
Chapter 1 Core Hardware Component
Chapter 2 Peripherals and Connectors
Chapter 3 Computing Devices and the Internet of Things
Chapter 4 Operating Systems
Chapter 5 Software Applications
Chapter 6 Software Development
Chapter 7 Database Fundamentals
Chapter 8 Networking Concepts and Technologies
Chapter 9 Cloud Computing and Artificial Intelligence
Chapter 10 Security Concepts and Threats
Chapter 11 Security Best Practices
Chapter 12 Data Continuity and Computer Support
Appendix A Answers to Written Labs
Appendix B Answers to Review Questions
Index
Computer and Information Security Handbook
فهرست مطالب کتاب Computer and Information Security Handbook:
Part I: Overview of System and Network Security – A Comprehensive Introduction
Building a Secure Organization
A Cryptography Primer
Preventing System Intrusions
Guarding Against Network Intrusions
Unix and Linux Security
Eliminating the Security Weakness of Linux and Unix Operating Systems
Internet Security
The Botnet Problem
Intranet Security
Local Area Network Security
Wireless Network Security
Cellular Network Security
RFID Security
Part II: Managing Information Security
Information Security Essentials for IT Managers, Protecting Mission-Critical Systems
Security Management Systems
Information Technology Security Management
Identity Management
Intrusion Prevention and Detection Systems
Computer Forensics
Network Forensics
Firewalls
Penetration Testing
What Is Vulnerability Assessment?
Part III: Encryption Technology
Data Encryption
Satellite Encryption
Public Key Infrastructure
Instant-Messaging Security
Part IV: Privacy and Access Management
NET Privacy
Personal Privacy Policies
Virtual Private Networks
Identity Theft
VoIP Security
Part V: Storage Security
SAN Security
Storage Area Networking Devices Security
Risk Management
Part VI: Physical Security
Physical Security Essentials
Biometrics
Homeland Security
Information Warfare
Part VII: Advanced Security
Security Through Diversity
Reputation Management
Content Filtering
Data Loss Protection
Part VIII: Appendices
Appendix A
Appendix B
Appendix C
Appendix D
Appendix E
Appendix F
Appendix G
Appendix H
Appendix I
Appendix J
Computer Forensics: Investigating Network Intrusions and Cyber Crime
فهرست مطالب کتاب Computer Forensics: Investigating Network Intrusions and Cyber Crime:
PREFACE
CHAPTER 1: Network Forensics and Investigating Logs
CHAPTER 2: Investigating Network Traffic
CHAPTER 3: Investigating Web Attacks
CHAPTER 4: Router Forensics
CHAPTER 5: Investigating DoS Attacks
CHAPTER 6: Investigating Internet Crime
CHAPTER 7: Tracking E-Mails and Investigating E-Mail Crime
CHAPTER 8: Investigating Corporate Espionage
CHAPTER 9: Investigating Trademark and Copyright Infringement
CHAPTER 10: Investigating Sexual Harassment Incidents
CHAPTER 11: Investigating Child Pornography
INDEX