CompTIA DataSys+Study Guide: Exam DS0-001

فهرست مطالب:

Introduction

Assessment Test

Chapter 1 Today’s Data Systems Professional

Chapter 2 Database Fundamentals

Chapter 3 SQL and Scripting

Chapter 4 Database Deployment

Chapter 5 Database Management and Maintenance

Chapter 6 Governance, Security, and Compliance

Chapter 7 Database Security

Chapter 8 Business Continuity

Appendix Answers to Review Questions

Index

CompTIA Network+ N10-008 Cert Guide

فهرست مطالب:

Introduction

Part I: Networking Fundamentals

Part II: Network Implementations

Part III: Network Operations

Part IV: Network Security

Part V: Network Troubleshooting

Part VI: Final Preparation

APPENDIX A: Answers to Review Questions

APPENDIX B: CompTIA Network+ (N10-008) Cert Guide Exam

CompTIA Network+ N10-008 Exam Cram

فهرست مطالب:

Introduction

CHAPTER 1 Network Technologies, Topologies, and Types

CHAPTER 2 Models, Ports, Protocols, and Network Services

CHAPTER 3 Addressing, Routing, and Switching

CHAPTER 4 Network Implementations

CHAPTER 5 Cabling Solutions and Issues

CHAPTER 6 Wireless Solutions and Issues

CHAPTER 7 Cloud Computing Concepts and Options

CHAPTER 8 Network Operations

CHAPTER 9 Network Security

CHAPTER 10 Network Troubleshooting

Glossary

Index

CompTIA Network+ Study Guide (Exam N10-007) – Fourth Edition

فهرست مطالب:

Introduction

Assessment Test

Chapter 1 Introduction to Networks

Chapter 2 The Open Systems Interconnection Specifications

Chapter 3 Networking Topologies, Connectors, and Wiring Standards

Chapter 4 The Current Ethernet Specifications

Chapter 5 Networking Devices

Chapter 6 Introduction to the Internet Protocol

Chapter 7 IP Addressing

Chapter 8 IP Subnetting, Troubleshooting IP, and

Introduction to NAT

Chapter 9 Introduction to IP Routing

Chapter 10 Routing Protocols

Chapter 11 Switching and Virtual LANs

Chapter 12 Wireless Networking

Chapter 13 Authentication and Access Control

Chapter 14 Network Threats and Mitigation

Chapter 15 Physical Security and Risk

Chapter 16 Wide Area Networks

Chapter 17 Troubleshooting Tools

Chapter 18 Software and Hardware Tools

Chapter 19 Network Troubleshooting

Chapter 20 Management, Monitoring, and Optimization

Appendix A Answers to Written Labs

Appendix B Answers to Review Questions

Appendix C Subnetting Class A

Index

CompTIA PenTest+ Certification For Dummies

فهرست مطالب:

Introduction

Part 1: Planning and Information Gathering

Part 2: Attacks and Exploits

Part 3: Post-Exploitation and Reporting

Part 4: Appendixes

Index

CompTIA PenTest+ Student Guide (Exam PT0-002)

فهرست مطالب:

Lesson 1: Scoping Organizational/Customer Requirements

Lesson 2: Defining the Rules of Engagement

Lesson 3: Footprinting and Gathering Intelligence

Lesson 4: Evaluating Human and Physical Vulnerabilities

Lesson 5: Preparing the Vulnerability Scan

Lesson 6: Scanning Logical Vulnerabilities

Lesson 7: Analyzing Scanning Results

Lesson 8: Avoiding Detection and Covering Tracks

Lesson 9: Exploiting the LAN and Cloud

Lesson 10: Testing Wireless Networks

Lesson 11: Targeting Mobile Devices

Lesson 12: Attacking Specialized Systems

Lesson 13: Web Application-Based Attacks

Lesson 14: Performing System Hacking

Lesson 15: Scripting and Software Development

Lesson 16: Leveraging the Attack: Pivot and Penetrate

Lesson 17: Communicating During the PenTesting Process

Lesson 18: Summarizing Report Components

Lesson 19: Recommending Remediation

Lesson 20: Performing Post-Report Delivery Activities

Appendix A: Mapping Course Content to CompTIA Certification+ (PT0-002)

Solutions

Glossary

Index

CompTIA PenTest+ Study Guide (Exam PT0-001)

فهرست مطالب:

Introduction

Assessment Test

Chapter 1 Penetration Testing

Chapter 2 Planning and Scoping Penetration Tests

Chapter 3 Information Gathering

Chapter 4 Vulnerability Scanning

Chapter 5 Analyzing Vulnerability Scans

Chapter 6 Exploit and Pivot

Chapter 7 Exploiting Network Vulnerabilities

Chapter 8 Exploiting Physical and Social Vulnerabilities

Chapter 9 Exploiting Application Vulnerabilities

Chapter 10 Exploiting Host Vulnerabilities

Chapter 11 Scripting for Penetration Testing

Chapter 12 Reporting and Communication

Appendix Answers to Review Questions

Index

CompTIA PenTest+ Study Guide Exam PT0-001

فهرست مطالب

Introduction

Assessment Test

Chapter 1: Penetration Testing

Chapter 2: Planning and Scoping Penetration Tests

Chapter 3: Information Gathering

Chapter 4: Vulnerability Scanning

Chapter 5: Analyzing Vulnerability Scans

Chapter 6: Exploit and Pivot

Chapter 7: Exploiting Network Vulnerabilities

Chapter 8: Exploiting Physical and Social Vulnerabilities

Chapter 9: Exploiting Application Vulnerabilities

Chapter 10: Exploiting Host Vulnerabilities

Chapter 11: Scripting for Penetration Testing

Chapter 12: Reporting and Communication

Appendix: Answers to Review Questions

Index

CompTIA Security+ All-in-One Exam Guide (Exam SY0-501)

فهرست مطالب:

Part I Threats, Attacks, and Vulnerabilities

Part II Technologies and Tools

Part III Architecture and Design

Part IV Identity and Access Management

Part V Risk Management

Part VI Cryptography and Public Key Infrastructure

Part VII Appendixes and Glossary

Appendix A OSI Model and Internet Protocols

Appendix B About the Download

CompTIA Security+ Review Guide SY0-501

فهرست مطالب:

Introduction

Chapter 1: Threats, Attacks, and Vulnerabilities

Chapter 2: Technologies and Tools

Chapter 3: Architecture and Design

Chapter 4: Identity and Access Management

Chapter 5: Risk Management

Chapter 6: Cryptography and PKI

Appendix: Answers to Review Questions

Index

CompTIA Security+ Study Guide Exam SY0‑701

فهرست مطالب:

Table of Contents

Title Page

Copyright

Dedication

Acknowledgments

About the Authors

About the Technical Editor

About the Technical Proofreader

Introduction

Chapter 1: Today’s Security Professional

Chapter 2: Cybersecurity Threat Landscape

Chapter 3: Malicious Code

Chapter 4: Social Engineering and Password Attacks

Chapter 5: Security Assessment and Testing

Chapter 6: Application Security

Chapter 7: Cryptography and the PKI

Chapter 8: Identity and Access Management

Chapter 9: Resilience and Physical Security

Chapter 10: Cloud and Virtualization Security

Chapter 11: Endpoint Security

Chapter 12: Network Security

Chapter 13: Wireless and Mobile Security

Chapter 14: Monitoring and Incident Response

Chapter 15: Digital Forensics

Chapter 16: Security Governance and Compliance

Chapter 17: Risk Management and Privacy

Index

WILEY END USER LICENSE AGREEMENT

CompTIA Security+ Study Guide: Exam SY0-610

فهرست مطالب:

Section 1: Security Aims and Objectives

Section 2: Monitoring the Security Infrastructure

Section 3: Protecting the Security Environment

Section 4: Mock Tests