CompTIA PenTest+ Study Guide (Exam PT0-001)

فهرست مطالب:

Introduction

Assessment Test

Chapter 1 Penetration Testing

Chapter 2 Planning and Scoping Penetration Tests

Chapter 3 Information Gathering

Chapter 4 Vulnerability Scanning

Chapter 5 Analyzing Vulnerability Scans

Chapter 6 Exploit and Pivot

Chapter 7 Exploiting Network Vulnerabilities

Chapter 8 Exploiting Physical and Social Vulnerabilities

Chapter 9 Exploiting Application Vulnerabilities

Chapter 10 Exploiting Host Vulnerabilities

Chapter 11 Scripting for Penetration Testing

Chapter 12 Reporting and Communication

Appendix Answers to Review Questions

Index

CompTIA PenTest+ Study Guide Exam PT0-001

فهرست مطالب

Introduction

Assessment Test

Chapter 1: Penetration Testing

Chapter 2: Planning and Scoping Penetration Tests

Chapter 3: Information Gathering

Chapter 4: Vulnerability Scanning

Chapter 5: Analyzing Vulnerability Scans

Chapter 6: Exploit and Pivot

Chapter 7: Exploiting Network Vulnerabilities

Chapter 8: Exploiting Physical and Social Vulnerabilities

Chapter 9: Exploiting Application Vulnerabilities

Chapter 10: Exploiting Host Vulnerabilities

Chapter 11: Scripting for Penetration Testing

Chapter 12: Reporting and Communication

Appendix: Answers to Review Questions

Index

CompTIA Security+ All-in-One Exam Guide (Exam SY0-501)

فهرست مطالب:

Part I Threats, Attacks, and Vulnerabilities

Part II Technologies and Tools

Part III Architecture and Design

Part IV Identity and Access Management

Part V Risk Management

Part VI Cryptography and Public Key Infrastructure

Part VII Appendixes and Glossary

Appendix A OSI Model and Internet Protocols

Appendix B About the Download

CompTIA Security+ Practice Tests Exam SY0-701 – Third Edition

فهرست مطالب کتاب CompTIA Security+ Practice Tests Exam SY0-701 – Third Edition:

Introduction

Chapter 1 Domain 1.0: General Security Concepts

Chapter 2 Domain 2.0: Threats, Vulnerabilities, and Mitigations

Chapter 3 Domain 3.0: Security Architecture

Chapter 4 Domain 4.0: Security Operations

Chapter 5 Domain 5.0: Security Program Management and Oversight

Appendix Answers to Review Questions

Index

CompTIA Security+ Review Guide SY0-501

فهرست مطالب:

Introduction

Chapter 1: Threats, Attacks, and Vulnerabilities

Chapter 2: Technologies and Tools

Chapter 3: Architecture and Design

Chapter 4: Identity and Access Management

Chapter 5: Risk Management

Chapter 6: Cryptography and PKI

Appendix: Answers to Review Questions

Index

CompTIA Security+ Study Guide Exam SY0‑701

فهرست مطالب:

Table of Contents

Title Page

Copyright

Dedication

Acknowledgments

About the Authors

About the Technical Editor

About the Technical Proofreader

Introduction

Chapter 1: Today’s Security Professional

Chapter 2: Cybersecurity Threat Landscape

Chapter 3: Malicious Code

Chapter 4: Social Engineering and Password Attacks

Chapter 5: Security Assessment and Testing

Chapter 6: Application Security

Chapter 7: Cryptography and the PKI

Chapter 8: Identity and Access Management

Chapter 9: Resilience and Physical Security

Chapter 10: Cloud and Virtualization Security

Chapter 11: Endpoint Security

Chapter 12: Network Security

Chapter 13: Wireless and Mobile Security

Chapter 14: Monitoring and Incident Response

Chapter 15: Digital Forensics

Chapter 16: Security Governance and Compliance

Chapter 17: Risk Management and Privacy

Index

WILEY END USER LICENSE AGREEMENT

CompTIA Security+ Study Guide: Exam SY0-610

فهرست مطالب:

Section 1: Security Aims and Objectives

Section 2: Monitoring the Security Infrastructure

Section 3: Protecting the Security Environment

Section 4: Mock Tests

CompTIA Security+ SY0-701 Digestible Exam Study Guide 2024

فهرست مطالب کتاب CompTIA Security+ SY0-701:

Introduction

General Security Concepts

Threats, Vulnerabilities, and Mitigations

Security Architecture

Security Operations

Security Program Management and Oversight

END

CompTIA Tech+ Study Guide Exam FC0-U71

فهرست مطالب کتاب CompTIA Tech+ Study Guide:

Introduction

Assessment Test

Chapter 1 Core Hardware Component

Chapter 2 Peripherals and Connectors

Chapter 3 Computing Devices and the Internet of Things

Chapter 4 Operating Systems

Chapter 5 Software Applications

Chapter 6 Software Development

Chapter 7 Database Fundamentals

Chapter 8 Networking Concepts and Technologies

Chapter 9 Cloud Computing and Artificial Intelligence

Chapter 10 Security Concepts and Threats

Chapter 11 Security Best Practices

Chapter 12 Data Continuity and Computer Support

Appendix A Answers to Written Labs

Appendix B Answers to Review Questions

Index

Computer and Information Security Handbook

فهرست مطالب کتاب Computer and Information Security Handbook:

Part I: Overview of System and Network Security – A Comprehensive Introduction

Building a Secure Organization

A Cryptography Primer

Preventing System Intrusions

Guarding Against Network Intrusions

Unix and Linux Security

Eliminating the Security Weakness of Linux and Unix Operating Systems

Internet Security

The Botnet Problem

Intranet Security

Local Area Network Security

Wireless Network Security

Cellular Network Security

RFID Security

Part II: Managing Information Security

Information Security Essentials for IT Managers, Protecting Mission-Critical Systems

Security Management Systems

Information Technology Security Management

Identity Management

Intrusion Prevention and Detection Systems

Computer Forensics

Network Forensics

Firewalls

Penetration Testing

What Is Vulnerability Assessment?

Part III: Encryption Technology

Data Encryption

Satellite Encryption

Public Key Infrastructure

Instant-Messaging Security

Part IV: Privacy and Access Management

NET Privacy

Personal Privacy Policies

Virtual Private Networks

Identity Theft

VoIP Security

Part V: Storage Security

SAN Security

Storage Area Networking Devices Security

Risk Management

Part VI: Physical Security

Physical Security Essentials

Biometrics

Homeland Security

Information Warfare

Part VII: Advanced Security

Security Through Diversity

Reputation Management

Content Filtering

Data Loss Protection

Part VIII: Appendices

Appendix A

Appendix B

Appendix C

Appendix D

Appendix E

Appendix F

Appendix G

Appendix H

Appendix I

Appendix J

Computer Forensics: Investigating Network Intrusions and Cyber Crime

فهرست مطالب کتاب Computer Forensics: Investigating Network Intrusions and Cyber Crime:

PREFACE

CHAPTER 1: Network Forensics and Investigating Logs

CHAPTER 2: Investigating Network Traffic

CHAPTER 3: Investigating Web Attacks

CHAPTER 4: Router Forensics

CHAPTER 5: Investigating DoS Attacks

CHAPTER 6: Investigating Internet Crime

CHAPTER 7: Tracking E-Mails and Investigating E-Mail Crime

CHAPTER 8: Investigating Corporate Espionage

CHAPTER 9: Investigating Trademark and Copyright Infringement

CHAPTER 10: Investigating Sexual Harassment Incidents

CHAPTER 11: Investigating Child Pornography

INDEX