Computer certification: CompTIA Books
John Wiley & Sons Inc CompTIA A Complete Certification Kit
Book Synopsis
£52.50
Cengage Learning, Inc Linux+ and LPIC-1 Guide to Linux Certification
Book SynopsisEckert's LINUX+ and LPIC-1 GUIDE TO LINUX CERTIFICATION, 6th EDITION, empowers you with the knowledge and skills you need to succeed on CompTIA's Linux��+ (XKO-005) certification exam and the Linux Professional Institute LPIC-1 (101-500 and 102-500) certification exams, as well as in your information technology career. The book covers the latest Linux�� distributions, as well as virtualization, containerization, cloud orchestration and enterprise storage. Comprehensive coverage also addresses key job-related services and cloud technologies, including firewalls, FTP, NFS, Samba, Apache, DNS, DHCP, NTP, Postfix, PostgreSQL, SSH, VNC, RDP, Docker and Kubernetes. Appendices allow you to apply your Linux knowledge to macOS�� and FreeBSD��. Hands-on projects give you practice using the latest Fedora��� and Ubuntu�� Linux�� distributions and can be performed on either a Windows�� PC (Intel�� or ARM��) or macOS�� PC (Intel�� or Apple�� Silicon).Table of Contents1. Introduction to Linux��. 2. Linux�� Installation and Usage. 3. Exploring Linux�� Filesystems. 4. Linux�� Filesystem Management. 5. Linux�� Filesystem Administration. 6. Linux�� Server Deployment. 7. Working with the Shell. 8. System Initialization, X Windows, and Localization. 9. Managing Linux�� Processes. 10. Common Administrative Tasks. 11. Compression, System Backup, and Software Installation. 12. Network Configuration. 13. Configuring Network Services and Cloud Technologies. 14. Security, Troubleshooting, and Performance. Appendix A: Certification. Appendix B: Finding Linux Resources on the Internet. Appendix C: Applying Your Linux�� Knowledge to macOS��. Appendix D: Applying Your Linux�� Knowledge to FreeBSD��.
£72.99
Pearson Education CompTIA Security SY0701 Cert Guide
Book SynopsisLewis Heuermann, CISSP, PMP, is a Navy submarine veteran and seasoned cybersecurity consultant who combines his extensive practical experience with deep academic insight to make cybersecurity accessible to all learners. His diverse background includes roles in systems and network engineering, network defense analysis, and cyber risk management. As a professor, he has developed and taught courses in cybersecurity and data analytics, utilizing tools like Python, SQL, Power BI, and Tableau. Lewis also holds several key IT certifications.
£35.99
John Wiley & Sons Inc CompTIA A Complete Deluxe Study Guide with Online
Book SynopsisThe ultimate resource for successful certification and IT skillset enhancement The newly revised and updated Fifth Edition of the CompTIA A+ Complete Deluxe Study Guide with Online Labs: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 is the ultimate test preparation tool for anyone hoping to succeed on the highly sought-after A+ certification exams. This comprehensive set of study aids covers every exam objective and competency tested by the Core 1 and Core 2 exams. You'll find coverage of mobile devices, networking, hardware, virtualization and cloud computing, hardware and network troubleshooting, operating systems, security, software trouble shooting, and operational procedures. The book also includes: Practical examples and real-world insights drawn from the experiences of actual computer technicians6 months of access to 28 online A+ Core 2 Exam 220-1102 Practice Lab modulesAccess to the Sybex online test bank, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a searchable glossary of key terms Perfect for anyone preparing for the popular A+ certification exams, CompTIA A+ Complete Deluxe Study Guide with Online Labs: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 is also an invaluable resource for anyone seeking to improve their computer technician skillset and better their performance on the job.Table of ContentsIntroduction xxvii Assessment Test lxxxii Part I 220-1101 1 Chapter 1 Motherboards, Processors, and Memory 3 Understanding Motherboards 7 Understanding Processors 42 Understanding Memory 49 Understanding Cooling Systems 63 Summary 71 Exam Essentials 71 Review Questions 73 Performance-Based Question 1 77 Performance-Based Question 2 78 Chapter 2 Expansion Cards, Storage Devices, and Power Supplies 79 Installing and Configuring Expansion Cards 81 Understanding Storage Devices 89 Understanding Power Supplies 118 Summary 131 Exam Essentials 131 Review Questions 133 Performance-Based Question 137 Chapter 3 Peripherals, Cables, and Connectors 139 Understanding Cables and Connectors 140 Understanding Cables and Connectors 160 Summary 184 Exam Essentials 185 Review Questions 186 Performance-Based Question 190 Chapter 4 Printers and Multifunction Devices 191 Understanding Print Technologies and Imaging Processes 193 Summary 262 Exam Essentials 262 Review Questions 264 Performance-Based Question 268 Chapter 5 Networking Fundamentals 269 Understanding Networking Principles 271 Identifying Common Network Hardware 295 Summary 324 Exam Essentials 324 Review Questions 327 Performance-Based Question 331 Chapter 6 Introduction to TCP/IP 333 Understanding TCP/IP 335 Understanding Virtual Networks 368 Virtual Local Area Networks 368 Virtual Private Networks 370 Summary 372 Exam Essentials 372 Review Questions 374 Performance-Based Question 378 Chapter 7 Wireless and SOHO Networks 379 Understanding Wireless Networking Technologies 381 Installing and Configuring SOHO Networks 402 Summary 449 Exam Essentials 449 Review Questions 451 Performance-Based Question 455 Chapter 8 Network Services, Virtualization, and Cloud Computing 457 Understanding Network Services 459 Understanding Virtualization and Cloud Computing 487 Summary 515 Exam Essentials 516 Review Questions 518 Performance-Based Question 522 Chapter 9 Laptop and Mobile Device Hardware 523 Working with Laptop and Mobile Device Hardware 526 Summary 584 Exam Essentials 585 Review Questions 586 Performance-Based Question 590 Chapter 10 Mobile Connectivity and Application Support 591 Understanding Mobile Connectivity 593 Summary 668 Exam Essentials 668 Review Questions 670 Performance-Based Question 674 Chapter 11 Troubleshooting Methodology and Resolving Core Hardware Problems 675 Using the Troubleshooting Best Practice Methodology 678 Troubleshooting Motherboards, CPUs, RAM, and Power Problems 690 Summary 708 Exam Essentials 709 Review Questions 711 Performance-Based Question 715 Chapter 12 Hardware and Network Troubleshooting 717 Troubleshooting Storage Drives and RAID Arrays 721 Troubleshooting Video, Projector, and Display Issues 731 Troubleshooting Common Mobile Device Issues 737 Troubleshooting Printer Problems 751 Troubleshooting Networking Problems 779 Summary 806 Exam Essentials 806 Review Questions 809 Performance-Based Question 813 Part II 220-1102 815 Chapter 13 Operating System Basics 817 Understanding Operating Systems 819 Understanding Applications 830 Introduction to Windows 10 836 Preparing for the Exam 871 Summary 872 Exam Essentials 872 Review Questions 874 Performance-Based Question 878 Chapter 14 Windows Configuration 879 Interacting with Operating Systems 882 The Windows Registry 960 Disk Management 962 Summary 970 Exam Essentials 970 Review Questions 972 Performance-Based Question 976 Chapter 15 Windows Administration 977 Installing and Upgrading Windows 980 Command-Line Tools 1013 Networking in Windows 1030 Summary 1050 Exam Essentials 1050 Review Questions 1052 Performance-Based Question 1056 Chapter 16 Working with macOS and Linux 1057 macOS and Linux 1060 Applications on macOS 1061 Managing Applications 1064 Creating Shortcuts 1065 Tools 1071 System Preferences 1073 Features 1082 Basic Linux Commands 1087 Linux and Windows 1106 Summary 1108 Exam Essentials 1109 Review Questions 1110 Performance-Based Question 1114 Chapter 17 Security Concepts 1115 Physical Security Concepts 1121 Physical Security for Staff 1128 Key Fobs 1129 Smartcards and RFID Badges 1129 Logical Security 1132 Malware 1143 Mitigating Software Threats 1151 Social Engineering Attacks, Threats, and Vulnerabilities 1159 Common Security Threats 1163 Exploits and Vulnerabilities 1170 Security Best Practices 1172 Data Encryption 1172 Setting Strong Passwords 1173 Requiring Passwords 1174 Password Expiration 1175 End-User Best Practices 1176 Account Management 1177 Disable AutoRun 1181 Destruction and Disposal Methods 1183 Recycling or Repurposing Best Practices 1183 Physical Destruction 1185 Summary 1187 Exam Essentials 1187 Review Questions 1190 Performance-Based Question 1194 Chapter 18 Securing Operating Systems 1195 Working with Windows OS Security Settings 1199 Users and Groups 1199 Web Browser Security 1228 Securing a SOHO Network (Wireless) 1239 Securing a SOHO Network (Wired) 1247 Mobile Device Security 1253 Summary 1263 Exam Essentials 1264 Review Questions 1265 Performance-Based Question 1269 Chapter 19 Troubleshooting Operating Systems and Security 1271 Troubleshooting Common Microsoft Windows OS Problems 1275 Troubleshooting Security Issues 1309 Symptoms 1315 Best Practices for Malware Removal 1318 Troubleshooting Mobile OS Issues 1325 Troubleshooting Mobile Security Issues 1335 Summary 1341 Exam Essentials 1342 Review Questions 1343 Performance-Based Question 1346 Chapter 20 Scripting and Remote Access 1347 Scripting 1349 Remote Access 1375 Summary 1387 Exam Essentials 1388 Review Questions 1389 Performance-Based Question 1392 Chapter 21 Safety and Environmental Concerns 1393 Understanding Safety Procedures 1395 Understanding Environmental Controls 1417 Understanding Policies, Licensing, and Privacy 1433 Summary 1446 Exam Essentials 1446 Review Questions 1448 Performance-Based Question 1452 Chapter 22 Documentation and Professionalism 1453 Documentation and Support 1457 Change Management Best Practices 1476 Disaster Prevention and Recovery 1482 Demonstrating Professionalism 1494 Summary 1508 Exam Essentials 1508 Review Questions 1510 Performance-Based Question 1514 Appendix A Answers to the Review Questions 1515 Chapter 1: Motherboards, Processors, and Memory 1516 Chapter 2: Expansion Cards, Storage Devices, and Power Supplies 1518 Chapter 3: Peripherals, Cables, and Connectors 1520 Chapter 4: Printers and Multifunction Devices 1521 Chapter 5: Networking Fundamentals 1523 Chapter 6: Introduction to TCP/IP 1525 Chapter 7: Wireless and SOHO Networks 1527 Chapter 8: Network Services, Virtualization, and Cloud Computing 1529 Chapter 9: Laptop and Mobile Device Hardware 1531 Chapter 10: Mobile Connectivity and Application Support 1533 Chapter 11: Troubleshooting Methodology and Resolving Core Hardware Problems 1535 Chapter 12: Hardware and Network Troubleshooting 1537 Chapter 13: Operating System Basics 1539 Chapter 14: Windows Configuration 1540 Chapter 15: Windows Administration 1543 Chapter 16: Working with macOS and Linux 1545 Chapter 17: Security Concepts 1547 Chapter 18: Securing Operating Systems 1549 Chapter 19: Troubleshooting Operating Systems and Security 1551 Chapter 20: Scripting and Remote Access 1554 Chapter 21: Safety and Environmental Concerns 1556 Chapter 22: Documentation and Professionalism 1558 Appendix B Answers to Performance-Based Questions 1561 Chapter 1: Motherboards, Processors, and Memory 1562 Chapter 2: Expansion Cards, Storage Devices, and Power Supplies 1563 Chapter 3: Peripherals, Cables, and Connectors 1563 Chapter 4: Printers and Multifunction Devices 1564 Chapter 5: Networking Fundamentals 1565 Chapter 6: Introduction to TCP/IP 1566 Chapter 7: Wireless and SOHO Networks 1566 Chapter 8: Network Services, Virtualization, and Cloud Computing 1567 Chapter 9: Laptop and Mobile Device Hardware 1568 Chapter 10: Mobile Connectivity and Application Support 1568 Chapter 11: Troubleshooting Methodology and Resolving Core Hardware Problems 1569 Chapter 12: Hardware and Network Troubleshooting 1569 Chapter 13: Operating System Basics 1570 Chapter 14: Windows Configuration 1570 Chapter 15: Windows Administration 1571 Chapter 16: Working with macOS and Linux 1575 Chapter 17: Security Concepts 1577 Chapter 18: Securing Operating Systems 1577 Chapter 19: Troubleshooting Operating Systems and Security 1578 Chapter 20: Scripting and Remote Access 1578 Chapter 21: Safety and Environmental Concerns 1579 Chapter 22: Documentation and Professionalism 1579 Index 1581 Table of Exercises Exercise 2.1 Removing an Internal Storage Device 115 Exercise 2.2 Installing an Internal Storage Device 116 Exercise 2.3 Removing a Power Supply 130 Exercise 3.1 Changing the Refresh Rate in Windows 10 143 Exercise 3.2 Changing the Settings for Multiple Monitors 148 Exercise 4.1 Identifying the Parts of an Inkjet Printer 203 Exercise 4.2 Installing a USB Printer in Windows 10 239 Exercise 4.3 Installing a TCP/IP Printer in Windows 10 242 Exercise 4.4 Determining if Bonjour Is Installed in Windows 244 Exercise 4.5 Scanning a Document to Google Drive 250 Exercise 4.6 Using an Inkjet Cleaning Solution 255 Exercise 4.7 Installing Memory into a Laser Printer 258 Exercise 5.1 Pricing Network Cables 313 Exercise 7.1 The Cost of Networking 422 Exercise 7.2 Installing an Internal NIC in Windows 10 422 Exercise 8.1 Configuring Windows 10 to Use a Proxy Server 477 Exercise 8.2 Using Google’s Cloud Services 497 Exercise 8.3 Enabling Hyper-V in Windows 10 503 Exercise 8.4 Installing VirtualBox and Lubuntu on Windows 10 508 Exercise 9.1 Removing Speakers from a Laptop 536 Exercise 9.2 Removing the Display Assembly 544 Exercise 9.3 Removing the Display Panel 546 Exercise 9.4 Removing the Motherboard from a Laptop 549 Exercise 9.5 Replacing Laptop Memory 553 Exercise 9.6 Removing an M.2 SSD from a Laptop 557 Exercise 9.7 Removing a Laptop Keyboard 560 Exercise 9.8 Disabling a Touchpad in Windows 10 563 Exercise 9.9 Removing an Internal Laptop Battery 568 Exercise 9.10 Removing the System Fan 572 Exercise 9.11 Removing the CPU Heat Sink 573 Exercise 9.12 Removing the Wireless NIC 574 Exercise 9.13 Removing the CMOS Battery 575 Exercise 9.14 Flashing the System BIOS 576 Exercise 10.1 Connecting an iPhone to a Wi-Fi Network 609 Exercise 10.2 Connecting an Android Phone to a Wi-Fi Network 611 Exercise 10.3 Disabling Cellular Use for Data Networking on an iPhone 614 Exercise 10.4 Disabling Cellular Use for Data Networking in Android OS 616 xxvi Table of Exercises Exercise 10.5 Setting Up a VPN in Android 619 Exercise 10.6 Pairing an Android Device with a Windows Laptop 623 Exercise 10.7 Pairing an iPhone with a Vehicle’s Sound System 632 Exercise 10.8 Configuring Location Services in iOS 638 Exercise 10.9 Email Account Configuration on an iPhone 645 Exercise 10.10 Email Account Configuration in Android 648 Exercise 10.11 Enabling ActiveSync in iOS 658 Exercise 11.1 Troubleshooting Practice 707 Exercise 12.1 Using a S.M.A.R.T Software Utility in Windows 729 Exercise 12.2 Stopping and Restarting the Print Spooler in Windows 10 775 Exercise 12.3 Renewing an IP Address in Windows 10 787 Exercise 12.4 Renewing an IP Address from the Command Line 789 Exercise 12.5 Using the net share Command in Windows 795 Exercise 13.1 Changing a Screen Saver in Windows 854 Exercise 13.2 Auto-Hiding the Taskbar 856 Exercise 13.3 Starting a Program from the Run Window 859 Exercise 14.1 Working with Task Manager 887 Exercise 14.2 Working with Performance Monitor 896 Exercise 14.3 Changing the Time Zone 908 Exercise 14.4 Showing Hidden Files and Folders 913 Exercise 15.1 Command-Line Directory Management 1015 Exercise 15.2 Running chkdsk within Windows 1025 Exercise 15.3 Running chkdsk at the Command Line 1026 Exercise 16.1 Installing Applications on macOS 1063 Exercise 16.2 Uninstalling Applications on macOS 1065 Exercise 16.3 Working with Files 1103 Exercise 17.1 Testing Your Antimalware 1153 Exercise 17.2 Testing Social Engineering 1160 Exercise 18.1 Examining a Security Token 1207 Exercise 18.2 Examining File Permissions 1214 Exercise 18.3 Working with File Hashes 1230 Exercise 18.4 Setting the Passcode Lock on an iPhone 1255 Exercise 18.5 Setting the Passcode Lock on an Android Phone 1255 Exercise 19.1 Reviewing Reliability Monitor 1288 Exercise 19.2 Manually Creating a Restore Point in Windows 1304 Exercise 20.1 Creating and Running a Windows Batch Script 1356 Exercise 20.2 Creating Your First PowerShell Script 1360 Exercise 21.1 Finding Trip Hazards 1413 Exercise 21.2 Finding MSDSs 1425 Exercise 22.1 Understanding Punctuality 1501 Exercise 22.2 Surprise Someone 1505
£86.25
Pearson Education CompTIA Network N10009 Cert Guide
Book SynopsisAnthony Sequeira (CCIE No. 15626) began his IT career in 1994 with IBM in Tampa, Florida. He quickly formed his own computer consultancy, Computer Solutions, and then discovered his true passion: teaching and writing about networking technologies. Anthony lectured to massive audiences around the world while working for Mastering Computers. Anthony has never been happier in his career than he is now, as a senior technical instructor for ACI Learning. ACI is a leader in audit, cybersecurity, and IT pro training in self-paced and instructor-led formats.
£40.79
Pearson Education CompTIA Network N10009 Exam Cram
Book SynopsisEmmett Dulaney (CompTIA Network+, Cloud+, Security+, A+, and others) has been the author of several books on certifications and operating systems over the past 25 years. He is a columnist for Certification Magazine and a professor at a small university in Indiana. He is currently the editor of a journal devoted to business education (and the business of education).
£29.99
Pearson Education Complete A Guide to IT Hardware and Software Lab
Book Synopsis The companion Complete A+ Guide to IT Hardware and Software Lab Manual provides students hands-on practice with various computer parts, mobile devices, wired networking, wireless networking, operating systems, and security. The 155 labs are designed in a step-by-step manner that allows students to experiment with various technologies and answer questions along the way to consider the steps being taken. Some labs include challenge areas to further practice the new concepts. The labs ensure students gain the experience and confidence required to succeed in industry. Table of Contents Chapter 1: Introduction to the World of IT Labs Chapter 2: Connectivity Labs Chapter 3: On the Motherboard Labs Chapter 4: Introduction to Configuration Labs Chapter 5: Disassembly and Power Labs Chapter 6: Memory Labs Chapter 7: Storage Devices Labs Chapter 8: Multimedia Devices Labs Chapter 9: Printers Labs Chapter 10: Mobile Devices Labs Chapter 11: Computer Design and Troubleshooting Review Labs Chapter 12: Internet Connectivity, Virtualization, and Cloud Technologies Labs Chapter 13: Networking Labs Chapter 14: Introduction to Operating Systems Labs Chapter 15: Introduction to Scripting Labs Chapter 16: Advanced Windows Labs Chapter 17: macOS and Linux Operating Systems Labs Chapter 18: Computer and Network Security Labs
£45.24
Pearson Education CompTIA Cybersecurity Analyst CySA CS0002 Cert
Book Synopsis
£42.13
Pearson Education CompTIA Cloud CV0003 Exam Cram
Book Synopsis At the impressionable age of 14, William Bo Rothwell crossed paths with a TRS-80 Micro Computer System (affectionately known as a Trash 80). Soon after, the adults responsible for Bo made the mistake of leaving him alone with the TSR-80. He immediately dismantled it and held his first computer class, showing his friends what made this computer thing work. Since that experience, Bo's passion for understanding how computers work and sharing this knowledge with others has resulted in a rewarding career in IT training. His experience includes cloud, Linux, UNIX, IT security, DevOps, and programming languages such as Perl, Python, Tcl, and BASH. He is the founder and lead instructor of One Course Source, an IT training organization.
£32.94
Pearson Education (US) Networking Essentials
Book SynopsisJeff Beasley is a professor in the Information and Communications Technology program at New Mexico State University, where he teaches computer networking and many related topics. He is coauthor of Modern Electronic Communication, 9th edition, author of Networking, 2nd edition, and coauthor of Networking Essentials, 4th edition, and Practical Guide to Advanced Networking. Piyasat Nilkaew is the director of Telecommunications and Networking at New Mexico State University. He has more than 20 years of experience in network management and consulting. He has extensive expertise in deploying and integrating multi-protocol and multi-vendor data, voice, and video network solutions. He is coauthor of Networking Essentials, 4th edition, and Practical Guide to Advanced Networking.Table of Contents Introduction xxiii CHAPTER 1 Introduction to Computer Networks 2 1-1 Introduction 4 1-2 Network Topologies 6 1-3 The OSI Model 12 1-4 The Ethernet LAN 16 1-5 Home Networking 24 1-6 Assembling an Office LAN 38 1-7 Testing and Troubleshooting a LAN 45 CHAPTER 2 Physical Layer Cabling: Twisted-Pair 62 2-1 Introduction 65 2-2 Structured Cabling 66 2-3 Twisted-Pair Cable 74 2-4 Terminating Twisted-Pair Cables 78 2-5 Cable Testing and Certification 92 2-6 10 Gigabit Ethernet over Copper 97 2-7 Troubleshooting Cabling Systems 102 CHAPTER 3 Physical Layer Cabling: Fiber Optics 124 3-1 Introduction 126 3-2 The Nature of Light 129 3-3 Fiber Attenuation and Dispersion 136 3-4 Optical Components 141 3-5 Optical Networking 147 3-6 Safety 160 3-7 Troubleshooting Fiber Optics: The OTDR 162 CHAPTER 4 Wireless Networking 172 4-1 Introduction 174 4-2 The IEEE 802.11 Wireless LAN Standard 175 4-3 802.11 Wireless Networking 185 4-4 Bluetooth, WiMAX, RFID, and Mobile Communications 197 4-5 Configuring a Point-to-Multipoint Wireless LAN: A Case Study 206 4-6 Troubleshooting Wireless Networks 213 CHAPTER 5 Interconnecting the LANs 228 5-1 Introduction 230 5-2 The Network Bridge 232 5-3 The Network Switch 237 5-4 The Router 249 5-5 The Console Port Connection 254 5-6 Interconnecting LANs with the Router 262 5-7 Interconnecting LANs and WANs 267 CHAPTER 6 TCP/IP 290 6-1 Introduction 292 6-2 The TCP/IP Layers 294 6-3 Number Conversion 306 6-4 IPv4 Addressing 312 6-5 Subnet Masks: Subnetting and Supernetting 317 6-6 Supernetting, CIDR Blocks, and VLSM 328 6-7 IPv6 Addressing 333 CHAPTER 7 Introduction to Router Configuration 354 7-1 Introduction 356 7-2 Router Fundamentals 358 7-3 The Router’s User EXEC Mode (Router>) 366 7-4 The Router’s Privileged EXEC Mode (Router#) 373 7-5 Configuring the Network Interface: Auto-negotiation 383 7-6 Troubleshooting the Router Interface 387 CHAPTER 8 Introduction to Switch Configuration 404 8-1 Introduction 406 8-2 Introduction to VLANs 407 8-3 Introduction to Switch Configuration 410 8-4 Spanning Tree Protocol 422 8-5 Power over Ethernet 425 8-6 Troubleshooting the Switch Interface 429 CHAPTER 9 Routing Protocols 444 9-1 Introduction 446 9-2 Static Routing 447 9-3 Dynamic Routing Protocols 460 9-4 Distance Vector Protocols 463 9-5 Configuring RIP and RIPv2 466 9-6 Link State Protocols 476 9-7 Configuring the Open Shortest Path First (OSPF) Routing Protocol 481 9-8 Advanced Distance Vector Protocol: Configuring Enhanced Interior 9-9 Internet Routing with Border Gateway Protocol (BGP) 496 9-10 IPv6 Routing 499 CHAPTER 10 Managing the Network Infrastructure 524 10-1 Introduction 527 10-2 Domain Name and IP Address Assignment 528 10-3 IP Address Management with DHCP 531 10-4 Scaling a Network with NAT and PAT 537 10-5 Domain Name System (DNS) 539 10-6 Network Management Protocols 546 10-7 Analyzing Network Traffic 552 10-8 Network Analyzer: Wireshark 560 10-9 Analyzing Computer Networks: FTP Data Packets 566 10-10 Troubleshooting IP Networks 568 CHAPTER 11 Network Security 590 11-1 Introduction 592 11-2 Intrusion: How Attackers Gain Control of a Network 594 11-3 Denial-of-Service 606 11-4 Security Software and Hardware 610 11-5 Managing Network Access 623 11-6 Router Security 626 11-7 Switch Security 631 11-8 Wireless Security 637 11-9 Remote Access and VPN Technologies 642 11-10 Physical Security 659 CHAPTER 12 Cloud Computing and Virtualization 676 12-1 Introduction 678 12-2 Virtualization 679 12-3 Cloud Computing 692 12-4 Enterprise Storage 698 CHAPTER 13 Codes and Standards 706 13-1 Introduction 708 13-2 Safety Standards and Codes 708 13-3 Industry Regulatory Compliance 718 13-4 Business Policies, Procedures, and Other Best Practices 723 13-5 Business Continuity and Disaster Recovery 729 Glossary 742 Online Only Elements: Net-Challenge Software Wireshark Captures Network+ quizzes 9780137455928, TOC, 9/28/2021
£57.14
Pearson Education CompTIA PenTest PT0002 Cert Guide
Book SynopsisOmar Santos is an active member of the cybersecurity community who leads several industry-wide initiatives. He is a best-selling author and trainer. Omar is the author of more than 20 books and video courses, as well as numerous whitepapers, articles, and security configuration guidelines and best practices. Omar is a principal engineer of the Cisco Product Security Incident Response Team (PSIRT), Security Research and Operations, where he mentors and leads engineers and incident managers during the investigation and resolution of cybersecurity vulnerabilities. Omar co-leads the DEF CON Red Team Village, is the chair of the OASIS Common Security Advisory Framework (CSAF) technical committee, is the co-chair of the Forum of Incident Response and Security Teams (FIRST) Open Source Security working group, and has been the chair of several initiatives in the Industry Consortium for Advancement of Security on the Internet (ICASI). His active role helps businesses,
£43.60
Pearson Education CompTIA A Practice Questions Exam Cram Core 1
Book SynopsisDavid L. Prowse is the author of more than a dozen computer training books and video products. He has worked in the computer field for over 20 years and loves to share his experience through teaching and writing. He runs the website https://dprocomputer.com, where he gladly answers questions from readers and students.
£21.52
Pearson Education CompTIA A Core 1 2201101 and Core 2 2201102 Cert
Book SynopsisRick McDonald is a professor in the IT Specialist program at the University of Alaska in Fairbanks, Alaska. He holds degrees and certificates from Gonzaga University in Spokane, Washington, and University of Illinois Springfield. After several years in the airline industry, he returned to full-time teaching in North Carolina and then in Ketchikan and Fairbanks, Alaska. Previous publication projects include CCNA Companion Guides and technical editing of various certification textbooks. He is currently teaching A+, CCNA, and AWS certification classes in Fairbanks and on the Web.
£45.89
Pearson Education Complete A Guide to It Hardware and Software
Book Synopsis
£162.00
Cengage Learning, Inc Comptia Network Guide to Networks LooseLeaf
Book Synopsis
£96.79
O'Reilly Media A Network Security Exams in a Nutshell
Book SynopsisCovers exams which include: A+ Essentials: Required for A+ 2006 certification; EXAM 220-602: For the A+ IT Technician specialization; EXAM 220-603: For the A+ Remote Support Technician specialization; EXAM 220-604: For the A+ IT Depot specialization; EXAM N10-003: For Network+ Certification; and, EXAM SYO-101: For Security+ Certification.Table of ContentsChapter 1 Preface I. A+ Essentials 1. Overview of A+ Essentials Exam Areas of Study for the A+ Essentials Exam 2. A+ Essentials Study Guide Personal Computer Components Laptops and Portable Devices Operating Systems Printers and Scanners Networks Security Safety and Environmental Issues Communications and Professionalism 3. Prep and Practice for the A+ Essentials Exam Preparing for the A+ Essentials Exam Suggested Exercises for the A+ Essentials Exam Highlighters Index Practice Questions for the A+ Essentials Exam II. A+ Exams 220-602, 220-603, and 220-604 4. Overview of the A+ Exams 220-602, 220-603, and 220-604 Areas of Study for A+ Exams 220-602, 220-603, and 220-604 5. Study Guide for A+ Exams 220-602, 220-603, and 220-604 Personal Computer Components Laptops and Portable Devices Operating Systems Printers and Scanners Networks Security 6. Prep and Practice for the A+ Exams 220-602, 220-603, and 220-604 Preparing for the A+ Exams Suggested Exercises for the Exams Highlighters Index Practice Questions for the A+ Exams III. Network+ 7. Overview of the Network+ Exam Areas of Study for the Network+ Exam 8. Network+ Exam Study Guide Media and Topologies Protocols and Standards Network Implementation Network Support 9. Network+ Exam Prep and Practice Preparing for the Network+ Exam Network+ Exam Suggested Exercises Network+ Exam Highlighters Index Network+ Exam Practice Questions IV. Security+ 10. Overview of Security+ Exam Areas of Study for Security+ Exam 11. Security+ Exam Study Guide General Security Concepts Communication Security Infrastructure Security Basics of Cryptography Operational and Organizational Security 12. Security+ Exam Prep and Practice Preparing for the Security+ Exam Security+ Exam Suggested Exercises Security+ Exam Highlighters Index Security+ Exam Practice Questions Index
£32.99
Pearson Education (US) CompTIA Advanced Security Practitioner CASP
Book Synopsis
£33.35
Pearson Education (US) CompTIA Security SY0501 uCertify Labs Student
Book Synopsis
£120.00
John Wiley & Sons Inc CASP CompTIA Advanced Security Practitioner Study
Book SynopsisTable of ContentsIntroduction xxvii Assessment Test lxi Chapter 1 Cryptographic Tools and Techniques 1 Chapter 2 Comprehensive Security Solutions 47 Chapter 3 Securing Virtualized, Distributed, and Shared Computing 97 Chapter 4 Host Security 143 Chapter 5 Application Security and Penetration Testing 195 Chapter 6 Risk Management 265 Chapter 7 Policies, Procedures, and Incident Response 313 Chapter 8 Security Research and Analysis 357 Chapter 9 Enterprise Security Integration 413 Chapter 10 Security Controls for Communication and Collaboration 459 Appendix A Answers to Review Questions 519 Appendix B CASP+ Lab Manual 533 Index 591
£38.00
John Wiley & Sons Inc CompTIA IT Fundamentals ITF Study Guide
Book SynopsisNOTE:The name of the exam has changed from IT Fundamentals to IT Fundamentals+ (ITF+). However, the FC0-U61 exam objectives are exactly the same. After the book was printed withIT Fundamentalsin the title, CompTIA changed the name toIT Fundamentals+ (ITF+). We have corrected the title toIT Fundamentals+ (ITF+) in subsequent book printings, but earlier printings that were sold may still showIT Fundamentalsin the title. Please rest assured that the book content is 100% the same.The ultimate study guide for the essential entry-level IT cert! The CompTIA IT Fundamentals Study Guide: Exam FC0-U61, Second Edition is your ideal companion for comprehensive exam preparation. Covering 100 percent of the latest exam objectives, this book contains everything you need to know to pass with flying colorsthe first time! Clear, concise language breaks down fundamental IT concepts to help you truly grasp important concepts, and practical examples Table of ContentsIntroduction xxi Assessment Test xxxi Chapter 1 Core Hardware Components 1 Introducing Internal Components 3 Exploring Motherboards, Processors, and Memory 4 Motherboards 4 Processors 22 Memory 27 Exploring Storage and Expansion Devices 33 Hard Drives 33 Optical Drives 42 Video Cards 43 Sound Cards 45 Network Cards 46 Modems 47 Exploring Power and Cooling 48 Power Supplies 48 Cooling Systems 52 Summary 55 Exam Essentials 56 Chapter 1 Written Lab 56 Review Questions 59 Chapter 2 Peripherals and Connectors 63 Understanding Common Peripherals, Interfaces, and Connectors 65 Audio and Video Devices 66 External Storage and Communications Connectors 80 Input and Output Devices 92 Understanding Installation Basics 109 Reviewing Connector Types 113 Summary 114 Exam Essentials 115 Chapter 2 Lab 116 Review Questions 117 Chapter 3 Computing Devices and the Internet of Things 121 Exploring Common Computing Devices 123 Servers and Workstations 123 Laptops 125 Tablets and Smartphones 132 Gaming Consoles 155 Understanding the Internet of Things 158 A Brief History of the Internet of Things 158 Consumer Uses 159 Commercial Uses 162 Potential Issues 165 Summary 167 Exam Essentials 167 Chapter 3 Lab 168 Review Questions 169 Chapter 4 Operating Systems 173 Operating System Fundamentals 175 A Brief History of Operating Systems 176 Basic Functions of Operating Systems 180 Types of Operating Systems 185 Managing an Operating System 207 Managing Features and Interfaces 208 Managing Folder and File Structures 229 Summary 241 Exam Essentials 241 Chapter 4 Lab 242 Review Questions 247 Chapter 5 Software Applications 251 Understanding Application Architecture and Installation 254 Application Design Concepts 255 Software Management Best Practices 260 Exploring Common Application Types 276 File Extensions 277 Productivity Software 280 Collaboration Software 285 Business Software 289 Utility Software 293 Web Browsers 304 Summary 318 Exam Essentials 319 Chapter 5 Lab 320 Review Questions 321 Chapter 6 Software Development 325 Exploring Programming Languages 327 Assembly Language 328 Compiled Languages 333 Interpreted Languages 335 Query Languages 339 Understanding Programming Concepts and Techniques 340 Programming Logic 341 Organizing Code 343 Summary 347 Exam Essentials 348 Chapter 6 Lab 349 Review Questions 350 Chapter 7 Database Fundamentals 355 Understanding Databases 357 Exploring Database Concepts and Structures 358 Working with Databases 367 Summary 380 Exam Essentials 380 Chapter 7 Lab 381 Review Questions 384 Chapter 8 Networking Concepts and Technologies 389 Exploring Connection Types and Features 391 Choosing External Network Connections 392 Choosing Internal Network Connections 403 Understanding Network Connectivity Essentials 411 Common Networking Devices 411 Networking Protocol Basics 415 TCP/IP Essentials 416 Network Storage Options 424 Setting Up a Wireless Network 428 Basic Configuration 428 Wireless Router Security 438 Additional Wireless Router Services 440 Summary 445 Exam Essentials 445 Chapter 8 Lab 446 Part 1: Setting Up Your Wireless Router 446 Part 2: Testing Your Neighbors 446 Review Questions 447 Chapter 9 Security Concepts and Threats 451 Understanding Hackers and Motives 454 Understanding Security Threats 457 Confidentiality Concerns 458 Integrity Concerns 463 Availability Concerns 465 Software-Based Security Threats 468 Understanding Access Control 476 Authentication 476 Authorization 479 Accounting 480 Nonrepudiation 482 Summary 482 Exam Essentials 483 Chapter 9 Lab 484 Review Questions 485 Chapter 10 Security Best Practices 489 Understanding Security Best Practices 491 Device Hardening 491 Managing Users 515 Using Data Encryption 520 Summary 527 Exam Essentials 528 Chapter 10 Lab 529 Review Questions 530 Chapter 11 Business Continuity and Computer Support 535 Understanding Business Continuity 537 Fault Tolerance 537 Disaster Recovery 551 Exploring Computer Support Concepts 552 Understanding Troubleshooting Theory 552 Troubleshooting Examples 563 Summary 581 Exam Essentials 582 Chapter 11 Lab 583 Review Questions 584 Appendix A Answers to Written Labs 589 Chapter 1: Core Hardware Components 590 Chapter 2: Peripherals and Connectors 590 Chapter 3: Computing Devices and the Internet of Things 591 Chapter 4: Operating Systems 592 Chapter 5: Software Applications 592 Chapter 6: Software Development 592 Chapter 7: Database Fundamentals 593 Chapter 8: Networking Concepts and Technologies 593 Chapter 9: Security Concepts and Threats 594 Chapter 10: Security Best Practices 594 Chapter 11: Business Continuity and Computer Support 594 Appendix B Answers to Review Questions 597 Chapter 1: Core Hardware Components 598 Chapter 2: Peripherals and Connectors 599 Chapter 3: Computing Devices and the Internet of Things 600 Chapter 4: Operating Systems 601 Chapter 5: Software Applications 602 Chapter 6: Software Development 604 Chapter 7: Database Fundamentals 605 Chapter 8: Networking Concepts and Technologies 606 Chapter 9: Security Concepts and Threats 607 Chapter 10: Security Best Practices 609 Chapter 11: Business Continuity and Computer Support 610 Index 613 Table of Exercises Exercise 1.1 Converting Between Decimal and Other Numbering Systems. . . . . . . . . 26 Exercise 1.2 Assessing Your Computer’s RAM and Virtual Memory. . . . . . . . . . . . . . . 29 Exercise 1.3 Determining the Type of Installed RAM. . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 Exercise 1.4 Examining Hard Drives in Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 Exercise 2.1 Adjusting a Desktop Monitor. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 Exercise 2.2 Changing the Settings for Multiple Monitors . . . . . . . . . . . . . . . . . . . . . . . 78 Exercise 2.3 Changing Your Keyboard Layout in Windows 10 . . . . . . . . . . . . . . . . . . . . 95 Exercise 2.4 Disabling a Touchpad in Windows 10. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 Exercise 2.5 Configuring a Mouse . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 Exercise 2.6 Installing an IP Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 Exercise 3.1 Changing Security Settings on IOS 11 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 Exercise 4.1 Creating a User Account in Windows 7 . . . . . . . . . . . . . . . . . . . . . . . . . . . 211 Exercise 4.2 Creating a User Account in Windows 10 . . . . . . . . . . . . . . . . . . . . . . . . . . 213 Exercise 4.3 Changing Windows User Account Control . . . . . . . . . . . . . . . . . . . . . . . . 215 Exercise 4.4 Creating a Task with Task Scheduler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220 Exercise 4.5 Managing Virtual Memory in Windows 10 . . . . . . . . . . . . . . . . . . . . . . . . 227 Exercise 4.6 Managing Storage Space in Windows 10 . . . . . . . . . . . . . . . . . . . . . . . . . 232 Exercise 4.7 Manipulating Files in Windows 10 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239 Exercise 4.8 Creating a Shortcut in Windows 10 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240 Exercise 5.1 Installing and Uninstalling Operating System Features . . . . . . . . . . . . . 264 Exercise 5.2 Installing 7-Zip. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266 Exercise 5.3 Installing Free Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266 Exercise 5.4 Configuring Windows Update. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272 Exercise 5.5 Using 7-Zip to Create an Archive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300 Exercise 5.6 Downloading and Installing Adobe Acrobat Reader . . . . . . . . . . . . . . . . 304 Exercise 5.7 Managing Cookies and Cache in Microsoft Edge . . . . . . . . . . . . . . . . . . . 311 Exercise 5.8 Configuring the Edge Pop-Up Blocker . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314 Exercise 6.1 Converting Between Decimal and Other Numbering Systems. . . . . . . . 330 Exercise 6.2 Creating “Hello, world!” in HTML . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336 Exercise 7.1 Creating a Database and Tables in Microsoft Access 2016 . . . . . . . . . . . 372 Exercise 7.2 Importing Data from Excel to Access. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374 Exercise 8.1 Pricing Internet Connectivity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403 Exercise 8.2 The Cost of Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 408 Exercise 8.3 Finding Your IP Configuration Information in Windows 10 . . . . . . . . . . . 422 Exercise 9.1 Testing Social Engineering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461 Exercise 10.1 Securing a Windows 10 PC from Unauthorized Local Use . . . . . . . . . . . 495 Exercise 10.2 Starting and Stopping Services in Windows 10. . . . . . . . . . . . . . . . . . . . 505 Exercise 10.3 Configuring SmartScreen in Microsoft Edge . . . . . . . . . . . . . . . . . . . . . . 512 Exercise 10.4 Encrypting Local Folders in Windows 10. . . . . . . . . . . . . . . . . . . . . . . . . . 522 Exercise 10.5 Backing Up a Windows Security Certificate . . . . . . . . . . . . . . . . . . . . . . . 524 Exercise 11.1 Setting Up a Backup in Windows 10. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 548 Exercise 11.2 Booting into Safe Mode in Windows 10. . . . . . . . . . . . . . . . . . . . . . . . . . . 566 Exercise 11.3 Using System Restore in Windows 10 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 567 Exercise 11.4 Using the System Configuration Utility in Windows 10. . . . . . . . . . . . . . 570 Exercise 11.5 Creating a Desktop Shortcut for MSCONFIG. . . . . . . . . . . . . . . . . . . . . . . 571 Exercise 11.6 Running an Application in Compatibility Mode . . . . . . . . . . . . . . . . . . . . 574 Exercise 11.7 Checking TCP/IP Connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 578
£34.00
John Wiley & Sons Inc CompTIA Security Review Guide
Book SynopsisLearn the ins and outs of the IT security field and efficiently prepare for the CompTIA Security+ Exam SY0-601 with one easy-to-follow resource CompTIA Security+ Review Guide: Exam SY0-601, Fifth Edition helps you to efficiently review for the leading IT security certificationCompTIA Security+ SY0-601. Accomplished author and security expert James Michael Stewart covers each domain in a straightforward and practical way, ensuring that you grasp and understand the objectives as quickly as possible. Whether you're refreshing your knowledge or doing a last-minute review right before taking the exam, this guide includes access to a companion online test bank that offers hundreds of practice questions, flashcards, and glossary terms. Covering all five domains tested by Exam SY0-601, this guide reviews: Attacks, Threats, and Vulnerabilities Architecture and Design Implementation Operations and Incident Response Table of ContentsIntroduction xix Chapter 1 Threats, Attacks, and Vulnerabilities 1 1.1 Compare and contrast different types of social engineering techniques 5 1.2 Given a scenario, analyze potential indicators to determine the type of attack 20 1.3 Given a scenario, analyze potential indicators associated with application attacks 37 1.4 Given a scenario, analyze potential indicators associated with network attacks 57 1.5 Explain different threat actors, vectors, and intelligence sources 80 1.6 Explain the security concerns associated with various types of vulnerabilities 91 1.7 Summarize the techniques used in security assessments 99 1.8 Explain the techniques used in penetration testing 109 Review Questions 118 Chapter 2 Architecture and Design 123 2.1 Explain the importance of security concepts in an enterprise environment 128 2.2 Summarize virtualization and cloud computing concepts 139 2.3 Summarize secure application development, deployment, and automation concepts 152 2.4 Summarize authentication and authorization design concepts 167 2.5 Given a scenario, implement cybersecurity resilience 183 2.6 Explain the security implications of embedded and specialized systems 196 2.7 Explain the importance of physical security controls 208 2.8 Summarize the basics of cryptographic concepts 220 Review Questions 240 Chapter 3 Implementation 245 3.1 Given a scenario, implement secure protocols 248 3.2 Given a scenario, implement host or application security solutions 262 3.3 Given a scenario, implement secure network designs 280 3.4 Given a scenario, install and configure wireless security settings 304 3.5 Given a scenario, implement secure mobile solutions 315 3.6 Given a scenario, apply cybersecurity solutions to the cloud 330 3.7 Given a scenario, implement identity and account management controls 336 3.8 Given a scenario, implement authentication and authorization solutions 344 3.9 Given a scenario, implement public key infrastructure 355 Review Questions 370 Chapter 4 Operations and Incident Response 375 4.1 Given a scenario, use the appropriate tool to assess organizational security 377 4.2 Summarize the importance of policies, processes, and procedures for incident response 398 4.3 Given an incident, utilize appropriate data sources to support an investigation 409 4.4 Given an incident, apply mitigation techniques or controls to secure an environment 418 4.5 Explain the key aspects of digital forensics 422 Review Questions 435 Chapter 5 Governance, Risk, and Compliance 441 5.1 Compare and contrast various types of controls 443 5.2 Explain the importance of applicable regulations, standards, or frameworks that impact organizational security posture 446 5.3 Explain the importance of policies to organizational security 456 5.4 Summarize risk management processes and concepts 469 5.5 Explain privacy and sensitive data concepts in relation to security 486 Review Questions 494 Appendix Answers to Review Questions 499 Chapter 1: Threats, Attacks, and Vulnerabilities 500 Chapter 2: Architecture and Design 505 Chapter 3: Implementation 508 Chapter 4: Operations and Incident Response 511 Chapter 5: Governance, Risk, and Compliance 514 Index 519
£22.50
John Wiley & Sons Inc CompTIA A Complete Review Guide
Book SynopsisA comprehensive and efficient way to prepare for the A+ exam and succeed as a computer technician The newly revised Fifth Edition of the CompTIA A+ Complete Review Guide: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 delivers essential and accessible exam prep material for the sought-after A+ certification. It offers full coverage of all of the A+ exam objectives covered on the latest Core 1 and Core 2 exams, ensuring you''ll have the knowledge and skills you need to succeed on the test and in the real world. This book covers mobile devices, networking, hardware, virtualization and cloud computing, hardware and network troubleshooting, operating systems, security, software troubleshooting, and operational procedures. Its comprehensive discussions of all exam competencies will prepare you for your first role as a computer technician and let you hit the ground running. The book also offers: Accessible and easy-to-follow organization perfect for quick revieTable of ContentsIntroduction xxiii Part I CompTIA A+ Core 1 Exam 220- 1101 1 Chapter 1 Mobile Devices 3 1.1 Given a scenario, install and configure laptop hardware and components 5 Hardware/device replacement 5 Physical privacy and security components 9 Exam essentials 10 1.2 Compare and contrast the display components of mobile devices 10 Types 11 Mobile display components 13 Exam essentials 14 1.3 Given a scenario, set up and configure accessories and ports of mobile devices 14 Connection methods 15 Accessories 20 Exam essentials 26 1.4 Given a scenario, configure basic mobile- device network connectivity and application support 26 Wireless/cellular data network (enable/disable) 27 Bluetooth 29 Location services 32 Mobile device management (MDM)/mobile application management (MAM) 32 Mobile device synchronization 36 Exam essentials 40 Review Questions 41 Chapter 2 Networking 45 2.1 Compare and contrast Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports, protocols, and their purposes 50 Ports and protocols 50 TCP vs. UDP 53 Exam essentials 54 2.2 Compare and contrast common networking hardware 54 Routers 55 Switches 55 Access points 55 Patch panel 56 Firewall 56 Power over Ethernet (PoE) 56 Hub 58 Cable modem 58 Digital subscriber line (DSL) 58 Optical network terminal (ONT) 59 Network interface card (NIC) 59 Software- defined networking (SDN) 60 Exam essentials 61 2.3 Compare and contrast protocols for wireless networking 61 Frequencies 61 Channels 62 Bluetooth 63 802.11 63 Long- range fixed wireless 64 NFC 65 Radio- frequency identification (RFID) 65 Exam essentials 65 2.4 Summarize services provided by networked hosts 66 Server roles 66 Internet appliances 68 Legacy/embedded systems 69 Internet of Things (IoT) devices 70 Exam essentials 70 2.5 Given a scenario, install and configure basic wired/wireless small office/home office (SOHO) networks 71 Internet Protocol (IP) addressing 71 Exam essentials 79 2.6 Compare and contrast common network configuration concepts 79 DNS 79 DHCP 81 Virtual LAN (VLAN) 82 Virtual private network (VPN) 83 Exam essentials 83 2.7 Compare and contrast Internet connection types, network types, and their features 84 Internet connection types 84 Network types 85 Exam essentials 87 2.8 Given a scenario, use networking tools 87 Crimper 87 Cable stripper 87 WiFi analyzer 87 Toner probe 88 Punchdown tool 88 Cable tester 88 Loopback plug 89 Network tap 89 Exam essentials 89 Review Questions 90 Chapter 3 Hardware 95 3.1 Explain basic cable types and their connectors, features, and purposes 102 Network cables 102 Peripheral cables 107 Video cables 108 Hard drive cables 111 Adapters 117 Connector types 119 Exam essentials 124 3.2 Given a scenario, install the appropriate RAM 124 RAM types 124 Single- channel/Dual- channel 127 Triple Channel 127 Quad- channel 128 Exam essentials 128 3.3 Given a scenario, select and install storage devices 129 Hard drives 129 SSDs 131 Drive configurations 132 Removable storage 134 Exam essentials 139 3.4 Given a scenario, install and configure motherboards, central processing units (CPUs), and add- on cards 139 Motherboard form factor 139 Motherboard connector types 142 Motherboard compatibility 148 Basic Input/Output System (BIOS)/Unified Extensible Firmware Interface (UEFI) settings 153 Encryption 155 CPU architecture 155 Expansion cards 156 Cooling 159 Exam essentials 160 3.5 Given a scenario, install or replace the appropriate power supply 160 Input 115V vs. 220V 161 Output 3.3V vs. 5V vs. 12V 161 20- pin to 24- pin motherboard adapter 161 Redundant power supply 162 Modular power supply 162 Wattage rating 162 Exam essentials 163 3.6 Given a scenario, deploy and configure multifunction devices/printers and settings 163 Properly unboxing a device – setup location considerations 163 Use appropriate drivers for a given OS 164 Device connectivity 164 Public/shared devices 165 Configuration settings 167 Security 168 Network scan services 169 Automatic document feeder (ADF)/flatbed scanner 169 Exam essentials 170 3.7 Given a scenario, install and replace printer consumables 170 Laser 170 Inkjet 181 Thermal 184 Impact 186 Exam essentials 188 Review Questions 190 Chapter 4 Virtualization and Cloud Computing 197 4.1 Summarize cloud computing concepts 199 Common cloud models 199 Cloud characteristics 200 Desktop virtualization 201 Exam essentials 201 4.2 Summarize aspects of client- side virtualization 202 Purpose of virtual machines 202 Exam essentials 205 Review Questions 206 Chapter 5 Hardware and Network Troubleshooting 209 5.1 Given a scenario, apply the best practice methodology to resolve problems 213 Always consider corporate policies, procedures, and impacts before implementing changes 213 1. Identify the problem 214 2. Establish a theory of probable cause (question the obvious) 214 3. Test the theory to determine cause 215 4. Establish a plan of action to resolve the problem and implement the solution 215 5. Verify full system functionality and, if applicable, implement preventive measures 216 6. Document the findings, actions, and outcomes 216 Exam essentials 216 5.2 Given a scenario, troubleshoot problems related to motherboards, RAM, CPU, and power 216 Common symptoms 217 Exam essentials 224 5.3 Given a scenario, troubleshoot and diagnose problems with storage drives and RAID arrays 225 Common symptoms 225 Exam essentials 228 5.4 Given a scenario, troubleshoot video, projector, and display issues 229 Common symptoms 229 Exam essentials 232 5.5 Given a scenario, troubleshoot common issues with mobile devices 232 Common symptoms 233 Exam essentials 237 5.6 Given a scenario, troubleshoot and resolve printer issues 238 Common symptoms 238 Exam essentials 244 5.7 Given a scenario, troubleshoot problems with wired and wireless networks 244 Common symptoms 244 Exam essentials 247 Review Questions 248 Part II CompTIA A+ Core 2 Exam 220- 1102 251 Chapter 6 Operating Systems 253 1.1 Identify basic features of Microsoft Windows editions 263 Windows 10 editions 263 Windows 11 264 Feature differences 264 Upgrade paths 266 Exam essentials 267 1.2 Given a scenario, use the appropriate Microsoft command- line tool 268 Navigation 268 Command- line tools 271 Exam essentials 290 1.3 Given a scenario, use features and tools of the Microsoft Windows 10 operating system (OS) 290 Task Manager 291 Microsoft Management Console (MMC) snap- in 296 Additional tools 312 Exam essentials 320 1.4 Given a scenario, use the appropriate Microsoft Windows 10 Control Panel utility 320 Internet Options 320 Devices and Printers 327 Programs and Features 329 Network and Sharing Center 331 System 331 Windows Defender Firewall 335 Mail 335 Sound 336 User Accounts 337 Device Manager 339 Indexing Options 340 Administrative Tools 340 File Explorer Options 342 Power Options 346 Ease of Access 348 Exam essentials 349 1.5 Given a scenario, use the appropriate Windows settings 349 Time and Language 350 Update and Security 351 Personalization 352 Apps 355 Privacy 356 System 357 Devices 357 Network and Internet 359 Gaming 361 Accounts 362 Exam essentials 362 1.6 Given a scenario, configure Microsoft Windows networking features on a client/desktop 364 Workgroup vs. domain setup 364 Local OS firewall settings 368 Client network configuration 369 Establish network connections 370 Proxy settings 371 Exam essentials 373 1.7 Given a scenario, apply application installation and configuration concepts 374 System requirements for applications 374 OS requirements for applications 375 Distribution methods 376 Other considerations for new applications 377 Exam essentials 378 1.8 Explain common OS types and their purposes 378 Workstation OSs 378 Cell phone/tablet OSs 379 Various filesystem types 380 Vendor life- cycle limitations 381 Compatibility concerns between OSs 381 Exam essentials 382 1.9 Given a scenario, perform OS installations and upgrades in a diverse OS environment 382 Boot methods 382 Types of installations 384 Partitioning 388 Drive format 389 Upgrade considerations 390 Feature updates 390 Exam essentials 391 1.10 Identify common features and tools of the macOS/desktop OS 391 Installation and uninstallation of applications 391 Apple ID and corporate restrictions 392 Best practices 393 System Preferences 394 Features 398 Disk Utility 401 FileVault 402 Terminal 402 Force Quit 403 Exam essentials 404 1.11 Identify common features and tools of the Linux client/desktop OS 404 Common commands 404 Best practices 411 Tools 414 Exam essentials 415 Review Questions 416 Chapter 7 Security 419 2.1 Summarize various security measures and their purposes 427 Physical security 427 Physical security for staff 432 Logical security 435 Mobile device management (MDM) 436 Active Directory 437 Exam essentials 439 2.2 Compare and contrast wireless security protocols and authentication methods 439 Protocols and encryption 439 Authentication 441 Exam essentials 442 2.3 Given a scenario, detect, remove, and prevent malware using the appropriate tools and methods 443 Malware 443 Tools and methods 449 Exam essentials 452 2.4 Explain common social- engineering attacks, threats, and vulnerabilities 452 Social engineering 452 Threats 455 Vulnerabilities 458 Exam essentials 459 2.5 Given a scenario, manage and configure basic security settings in the Microsoft Windows OS 459 Defender Antivirus 459 Firewall 461 Users and Groups 462 Login OS Options 463 NTFS vs. share permissions 464 Shared files and folders 467 Run as administrator vs. standard user 468 BitLocker 470 BitLocker To Go 470 Encrypting File System (EFS) 470 Exam essentials 471 2.6 Given a scenario, configure a workstation to meet best practices for security 471 Data- at- rest encryption 472 Password best practices 472 End- user best practices 473 Account management 474 Change default administrator’s user account/password 475 Disable AutoRun 475 Disable Autoplay 476 Exam essentials 476 2.7 Explain common methods for securing mobile and embedded devices 476 Screen locks 477 Remote wipes 478 Locator applications 478 OS updates 478 Device encryption 479 Remote backup applications 479 Failed login attempts restrictions 479 Antivirus/anti- malware 479 Firewalls 480 Policies and procedures 480 Internet of Things (IoT) 480 Exam essentials 480 2.8 Given a scenario, use common data destruction and disposal methods 481 Physical destruction 481 Recycling or repurposing best practices 482 Outsourcing concepts 484 Exam essentials 484 2.9 Given a scenario, configure appropriate security settings on small office/home office (SOHO) wireless and wired networks 485 Home router settings 485 Wireless specific 488 Firewall settings 491 Exam essentials 491 2.10 Given a scenario, install and configure browsers and relevant security settings 492 Browser download/installation 492 Extensions and plug- ins 492 Password managers 493 Secure connections/sites – valid certificates 493 Settings 493 Exam essentials 496 Review Questions 497 Chapter 8 Software Troubleshooting 501 3.1 Given a scenario, troubleshoot common Windows OS problems 505 Common symptoms 505 Common troubleshooting steps 510 Exam essentials 514 3.2 Given a scenario, troubleshoot common personal computer (PC) security issues 514 Common symptoms 514 Browser- related symptoms 517 Exam essentials 518 3.3 Given a scenario, use best practice procedures for malware removal 518 1. Investigate and verify malware symptoms 518 2. Quarantine infected systems 519 3. Disable System Restore in Windows 519 4. Remediate infected systems 519 5. Schedule scans and run updates 519 6. Enable System Restore and create a restore point in Windows 520 7. Educate the end user 520 Exam essentials 520 3.4 Given a scenario, troubleshoot common mobile OS and application issues 520 Common symptoms 521 Exam essentials 524 3.5 Given a scenario, troubleshoot common mobile OS and application security issues 524 Security concerns 524 Common symptoms 526 Exam essentials 527 Review Questions 528 Chapter 9 Operational Procedures 531 4.1 Given a scenario, implement best practices associated with documentation and support systems information management 538 Ticketing systems 538 Asset management 540 Types of documents 542 Knowledge base/articles 545 Exam essentials 545 4.2 Explain basic change- management best practices 545 Documented business processes 546 Change management 546 Exam essentials 548 4.3 Given a scenario, implement workstation backup and recovery methods 548 Backup and recovery 548 Backup testing 550 Backup rotation schemes 550 Exam essentials 551 4.4 Given a scenario, use common safety procedures 552 Electrostatic discharge (ESD) straps 552 ESD mats 553 Equipment grounding 554 Proper power handling 555 Proper component handling and storage 555 Antistatic bags 555 Compliance with government regulations 555 Personal safety 555 Exam essentials 557 4.5 Summarize environmental impacts and local environmental controls 557 Material safety data sheet (MSDS)/documentation for handling and disposal 557 Temperature, humidity- level awareness, and proper ventilation 559 Power surges, brownouts, and blackouts 562 Exam essentials 564 4.6 Explain the importance of prohibited content/activity and privacy, licensing, and policy concepts 565 Incident response 565 Licensing/digital rights management (DRM)/end- user license agreement (EULA) 567 Regulated data 568 Exam essentials 569 4.7 Given a scenario, use proper communication techniques and professionalism 569 Professional appearance and attire 570 Use proper language and avoid jargon, acronyms, and slang, when applicable 570 Maintain a positive attitude/project confidence 571 Actively listen, take notes, and avoid interrupting the customer 571 Be culturally sensitive 571 Be on time (if late, contact the customer) 572 Avoid distractions 572 Dealing with difficult customers or situations 573 Set and meet expectations/time line and communicate status with the customer 574 Deal appropriately with customers’ confidential and private materials 575 Exam essentials 576 4.8 Identify the basics of scripting 576 Script file types 576 Use cases for scripting 577 Other considerations when using scripts 578 Exam essentials 579 4.9 Given a scenario, use remote access technologies 579 Methods/tools 579 Security considerations of each access method 582 Exam essentials 582 Review Questions 583 Appendix Answers to the Review Questions 587 Chapter 1: Mobile Devices 588 Chapter 2: Networking 589 Chapter 3: Hardware 591 Chapter 4: Virtualization and Cloud Computing 595 Chapter 5: Hardware and Network Troubleshooting 596 Chapter 6: Operating Systems 598 Chapter 7: Security 599 Chapter 8: Software Troubleshooting 602 Chapter 9: Operational Procedures 603 Index 607
£21.25
Cengage Learning, Inc Linux and LPIC1 Guide to Linux Certification
Book SynopsisEckert's LINUX+ and LPIC-1 GUIDE TO LINUX CERTIFICATION, 5th Edition, empowers you with the knowledge and skills you need to succeed on CompTIA's Linux+ (XKO-004) certification exam and the Linux Professional Institute LPIC-1 (101-500 and 102-500) certification exams, as well as in your network administration career. The book covers the latest Linux distributions, virtualization, containerization and storage technologies. Comprehensive coverage also addresses key job-related networking and security services, including FTP, NFS, Samba, Apache, DNS, DHCP, NTP, Squid, Postfix, SSH, VNC, Spice, RDP, GPG, PostgreSQL and iptables/firewalld. Hands-on projects give you practice using both modern Linux distributions (Fedora 28 and Ubuntu Server 18.04) and industry's legacy Linux distributions. And with MindTap's live virtual machine labs, you can explore various solutions in a safe, sandbox environment using real Cisco hardware and virtualized Linux operating systems.Table of Contents1. Introduction to Linux��. 2. Linux�� Installation and Usage. 3. Exploring Linux�� Filesystems. 4. Linux�� Filesystem Management. 5. Linux�� Filesystem Administration. 6. Linux�� Server Deployment and Virtualization. 7. Working with the BASH Shell. 8. System Initialization and X Windows. 9. Managing Linux�� Processes. 10. Common Administrative Tasks. 11. Compression, System Backup and Software Installation. 12. Network Configuration. 13. Configuring Network Services. 14. Support, Performance, Security and Cloud Services. Appendix A: Certification. Appendix B: GNU Public License. Appendix C: Finding Linux Resources on the Internet. Appendix D: Supporting macOS. Appendix E: Configuring the Windows Subsystem for Linux.
£72.19
John Wiley & Sons Inc CompTIA CySA Practice Tests
Book SynopsisThe best way to prep for the CS0-003 CySA+ certification exam and hone your practical cybersecurity skillset In the newly updated 3rd edition of the CompTIA CySA+ Practice Tests: Exam CS0-003, veteran information security experts and educators Mike Chapple and David Seidl deliver an effective and efficient collection of study resources for the challenging CompTIA Cybersecurity Analyst+ (CySA+) certification exam. In the book, you'll find 1000 practice questions, complete with answers and explanations, covering every domain tested by Exam CS0-003. You'll hone your skills in security operations, vulnerability management, incident response and management, and reporting and communication, improving your ability to detect and respond to malicious activity on the job and dramatically increasingly your chances of success on the CySA+ exam. You'll also get: Techniques for threat hunting and the collection of threat intelligenceStrategies for effective incident response processes and activities, ensuring you're able to react appropriately to cybersecurity incidents at workComplimentary access to Sybex's superior online test bank, including all the practice questions you need to review and test your knowledge before you walk into the exam room Perfect for anyone studying for the CompTIA CySA+ CS0-003 certification exam, CompTIA CySA+ Practice Tests: Exam CS0-003, Third Edition, will also benefit IT security practitioners looking to test and improve their skillset.Table of ContentsIntroduction xvii Chapter 1 Domain 1.0: Security Operations 1 Chapter 2 Domain 2.0: Vulnerability Management 67 Chapter 3 Domain 3.0: Incident Response and Management 167 Chapter 4 Reporting and Communication 207 Chapter 5 Practice Test 1 227 Chapter 6 Practice Test 2 253 Appendix Answers and Explanations 281 Chapter 1: Domain 1.0: Security Operations 282 Chapter 2: Domain 2.0: Vulnerability Management 309 Chapter 3: Domain 3.0: Incident Response and Management 345 Chapter 4: Reporting and Communication 361 Chapter 5: Practice Test 1 371 Chapter 6: Practice Test 2 380 Index 391
£26.24
John Wiley & Sons Inc CompTIA CySA Certification Kit
Book Synopsis
£48.75
John Wiley & Sons Inc CompTIA Security Practice Tests
Book SynopsisPrepare for the Security+ certification exam confidently and quickly CompTIA Security+ Practice Tests: Exam SY0-701, Third Edition, prepares you for the newly updated CompTIA Security+ exam. You''ll focus on challenging areas and get ready to ace the exam and earn your Security+ certification. This essential collection of practice tests contains study questions covering every single objective domain included on the SY0-701. Comprehensive coverage of every essential exam topic guarantees that you''ll know what to expect on exam day, minimize test anxiety, and maximize your chances of success. You''ll find 1000 practice questions on topics like general security concepts, threats, vulnerabilities, mitigations, security architecture, security operations, and security program oversight. You''ll also find: Complimentary access to the Sybex test bank and interactive learning environment Clear and accurate answers, complete with explanationsTable of ContentsIntroduction xi Chapter 1 Domain 1.0: General Security Concepts 1 Chapter 2 Domain 2.0: Threats, Vulnerabilities, and Mitigations 29 Chapter 3 Domain 3.0: Security Architecture 69 Chapter 4 Domain 4.0: Security Operations 115 Chapter 5 Domain 5.0: Security Program Management and Oversight 169 Appendix Answers to Review Questions 217 Chapter 1: Domain 1.0: General Security Concepts 218 Chapter 2: Domain 2.0: Threats, Vulnerabilities, and Mitigations 233 Chapter 3: Domain 3.0: Security Architecture 255 Chapter 4: Domain 4.0: Security Operations 283 Chapter 5: Domain 5.0: Security Program Management and Oversight 309 Index 337
£26.24
John Wiley & Sons Inc CompTIA Security Study Guide with over 500
Book SynopsisTable of ContentsIntroduction xxxi Chapter 1 Today’s Security Professional 1 Cybersecurity Objectives 2 Data Breach Risks 3 The DAD Triad 4 Breach Impact 5 Implementing Security Controls 7 Gap Analysis 7 Security Control Categories 8 Security Control Types 9 Data Protection 10 Data Encryption 11 Data Loss Prevention 11 Data Minimization 12 Access Restrictions 13 Segmentation and Isolation 13 Summary 13 Exam Essentials 14 Review Questions 16 Chapter 2 Cybersecurity Threat Landscape 21 Exploring Cybersecurity Threats 23 Classifying Cybersecurity Threats 23 Threat Actors 25 Attacker Motivations 31 Threat Vectors and Attack Surfaces 32 Threat Data and Intelligence 35 Open Source Intelligence 35 Proprietary and Closed- Source Intelligence 38 Assessing Threat Intelligence 39 Threat Indicator Management and Exchange 40 Information Sharing Organizations 41 Conducting Your Own Research 42 Summary 42 Exam Essentials 43 Review Questions 45 Chapter 3 Malicious Code 49 Malware 50 Ransomware 51 Trojans 52 Worms 54 Spyware 55 Bloatware 56 Viruses 57 Keyloggers 59 Logic Bombs 60 Rootkits 60 Summary 62 Exam Essentials 62 Review Questions 64 Chapter 4 Social Engineering and Password Attacks 69 Social Engineering and Human Vectors 70 Social Engineering Techniques 71 Password Attacks 76 Summary 78 Exam Essentials 78 Review Questions 80 Chapter 5 Security Assessment and Testing 85 Vulnerability Management 87 Identifying Scan Targets 87 Determining Scan Frequency 89 Configuring Vulnerability Scans 91 Scanner Maintenance 95 Vulnerability Scanning Tools 98 Reviewing and Interpreting Scan Reports 101 Confirmation of Scan Results 111 Vulnerability Classification 112 Patch Management 112 Legacy Platforms 113 Weak Configurations 115 Error Messages 115 Insecure Protocols 116 Weak Encryption 117 Penetration Testing 118 Adopting the Hacker Mindset 119 Reasons for Penetration Testing 120 Benefits of Penetration Testing 120 Penetration Test Types 121 Rules of Engagement 123 Reconnaissance 125 Running the Test 125 Cleaning Up 126 Audits and Assessments 126 Security Tests 127 Security Assessments 128 Security Audits 129 Vulnerability Life Cycle 131 Vulnerability Identification 131 Vulnerability Analysis 132 Vulnerability Response and Remediation 132 Validation of Remediation 132 Reporting 133 Summary 133 Exam Essentials 134 Review Questions 136 Chapter 6 Application Security 141 Software Assurance Best Practices 143 The Software Development Life Cycle 143 Software Development Phases 144 DevSecOps and DevOps 146 Designing and Coding for Security 147 Secure Coding Practices 148 API Security 149 Software Security Testing 149 Analyzing and Testing Code 150 Injection Vulnerabilities 151 SQL Injection Attacks 151 Code Injection Attacks 155 Command Injection Attacks 155 Exploiting Authentication Vulnerabilities 156 Password Authentication 156 Session Attacks 157 Exploiting Authorization Vulnerabilities 160 Insecure Direct Object References 161 Directory Traversal 161 File Inclusion 163 Privilege Escalation 163 Exploiting Web Application Vulnerabilities 164 Cross- Site Scripting (XSS) 164 Request Forgery 167 Application Security Controls 168 Input Validation 168 Web Application Firewalls 170 Parameterized Queries 170 Sandboxing 171 Code Security 171 Secure Coding Practices 173 Source Code Comments 174 Error Handling 174 Hard- Coded Credentials 175 Package Monitoring 175 Memory Management 176 Race Conditions 177 Unprotected APIs 178 Automation and Orchestration 178 Use Cases of Automation and Scripting 179 Benefits of Automation and Scripting 179 Other Considerations 180 Summary 181 Exam Essentials 181 Review Questions 183 Chapter 7 Cryptography and the PKI 189 An Overview of Cryptography 190 Historical Cryptography 191 Goals of Cryptography 196 Confidentiality 197 Integrity 199 Authentication 200 Non-repudiation 200 Cryptographic Concepts 200 Cryptographic Keys 201 Ciphers 202 Modern Cryptography 202 Cryptographic Secrecy 202 Symmetric Key Algorithms 204 Asymmetric Key Algorithms 205 Hashing Algorithms 208 Symmetric Cryptography 208 Data Encryption Standard 208 Advanced Encryption Standard 209 Symmetric Key Management 209 Asymmetric Cryptography 211 RSA 212 Elliptic Curve 213 Hash Functions 214 Sha 215 md 5 216 Digital Signatures 216 HMAC 217 Public Key Infrastructure 218 Certificates 218 Certificate Authorities 219 Certificate Generation and Destruction 220 Certificate Formats 223 Asymmetric Key Management 224 Cryptographic Attacks 225 Brute Force 225 Frequency Analysis 225 Known Plain Text 226 Chosen Plain Text 226 Related Key Attack 226 Birthday Attack 226 Downgrade Attack 227 Hashing, Salting, and Key Stretching 227 Exploiting Weak Keys 228 Exploiting Human Error 228 Emerging Issues in Cryptography 229 Tor and the Dark Web 229 Blockchain 229 Lightweight Cryptography 230 Homomorphic Encryption 230 Quantum Computing 230 Summary 231 Exam Essentials 231 Review Questions 233 Chapter 8 Identity and Access Management 237 Identity 239 Authentication and Authorization 240 Authentication and Authorization Technologies 241 Authentication Methods 246 Passwords 247 Multifactor Authentication 251 One- Time Passwords 252 Biometrics 254 Accounts 256 Account Types 256 Provisioning and Deprovisioning Accounts 257 Access Control Schemes 259 Filesystem Permissions 260 Summary 262 Exam Essentials 262 Review Questions 264 Chapter 9 Resilience and Physical Security 269 Resilience and Recovery in Security Architectures 271 Architectural Considerations and Security 273 Storage Resiliency 274 Response and Recovery Controls 280 Capacity Planning for Resilience and Recovery 283 Testing Resilience and Recovery Controls and Designs 284 Physical Security Controls 285 Site Security 285 Detecting Physical Attacks 291 Summary 291 Exam Essentials 292 Review Questions 294 Chapter 10 Cloud and Virtualization Security 299 Exploring the Cloud 300 Benefits of the Cloud 301 Cloud Roles 303 Cloud Service Models 303 Cloud Deployment Models 307 Private Cloud 307 Shared Responsibility Model 309 Cloud Standards and Guidelines 312 Virtualization 314 Hypervisors 314 Cloud Infrastructure Components 316 Cloud Compute Resources 316 Cloud Storage Resources 319 Cloud Networking 322 Cloud Security Issues 325 Availability 325 Data Sovereignty 326 Virtualization Security 327 Application Security 327 Governance and Auditing of Third- Party Vendors 328 Hardening Cloud Infrastructure 328 Cloud Access Security Brokers 328 Resource Policies 329 Secrets Management 330 Summary 331 Exam Essentials 331 Review Questions 333 Chapter 11 Endpoint Security 337 Operating System Vulnerabilities 339 Hardware Vulnerabilities 340 Protecting Endpoints 341 Preserving Boot Integrity 342 Endpoint Security Tools 344 Hardening Techniques 350 Hardening 350 Service Hardening 350 Network Hardening 352 Default Passwords 352 Removing Unnecessary Software 353 Operating System Hardening 353 Configuration, Standards, and Schemas 356 Encryption 357 Securing Embedded and Specialized Systems 358 Embedded Systems 358 SCADA and ICS 361 Securing the Internet of Things 362 Communication Considerations 363 Security Constraints of Embedded Systems 364 Asset Management 365 Summary 368 Exam Essentials 369 Review Questions 371 Chapter 12 Network Security 375 Designing Secure Networks 377 Infrastructure Considerations 380 Network Design Concepts 380 Network Segmentation 383 Zero Trust 385 Network Access Control 387 Port Security and Port- Level Protections 388 Virtual Private Networks and Remote Access 390 Network Appliances and Security Tools 392 Deception and Disruption Technology 399 Network Security, Services, and Management 400 Secure Protocols 406 Using Secure Protocols 406 Secure Protocols 407 Network Attacks 410 On- Path Attacks 411 Domain Name System Attacks 412 Credential Replay Attacks 414 Malicious Code 415 Distributed Denial- of- Service Attacks 415 Summary 418 Exam Essentials 419 Review Questions 421 Chapter 13 Wireless and Mobile Security 425 Building Secure Wireless Networks 426 Connection Methods 427 Wireless Network Models 431 Attacks Against Wireless Networks and Devices 432 Designing a Network 435 Controller and Access Point Security 438 Wi- Fi Security Standards 438 Wireless Authentication 440 Managing Secure Mobile Devices 442 Mobile Device Deployment Methods 442 Hardening Mobile Devices 444 Mobile Device Management 444 Summary 448 Exam Essentials 449 Review Questions 450 Chapter 14 Monitoring and Incident Response 455 Incident Response 457 The Incident Response Process 458 Training 462 Threat Hunting 463 Understanding Attacks and Incidents 464 Incident Response Data and Tools 466 Monitoring Computing Resources 466 Security Information and Event Management Systems 466 Alerts and Alarms 469 Log Aggregation, Correlation, and Analysis 470 Rules 471 Benchmarks and Logging 478 Reporting and Archiving 478 Mitigation and Recovery 479 Secure Orchestration, Automation, and Response (SOAR) 479 Containment, Mitigation, and Recovery Techniques 479 Root Cause Analysis 482 Summary 483 Exam Essentials 484 Review Questions 485 Chapter 15 Digital Forensics 489 Digital Forensic Concepts 490 Legal Holds and e- Discovery 491 Conducting Digital Forensics 493 Acquiring Forensic Data 493 Acquisition Tools 497 Validating Forensic Data Integrity 500 Data Recovery 502 Forensic Suites and a Forensic Case Example 503 Reporting 507 Digital Forensics and Intelligence 508 Summary 508 Exam Essentials 509 Review Questions 511 Chapter 16 Security Governance and Compliance 515 Security Governance 518 Corporate Governance 518 Governance, Risk, and Compliance Programs 520 Information Security Governance 520 Types of Governance Structures 521 Understanding Policy Documents 521 Policies 522 Standards 524 Procedures 526 Guidelines 528 Exceptions and Compensating Controls 529 Monitoring and Revision 530 Change Management 531 Change Management Processes and Controls 532 Version Control 534 Documentation 535 Personnel Management 535 Least Privilege 535 Separation of Duties 535 Job Rotation and Mandatory Vacations 536 Clean Desk Space 536 Onboarding and Offboarding 536 Nondisclosure Agreements 537 Social Media 537 Third- Party Risk Management 537 Vendor Selection 537 Vendor Assessment 538 Vendor Agreements 538 Vendor Monitoring 539 Winding Down Vendor Relationships 540 Complying with Laws and Regulations 540 Common Compliance Requirements 541 Compliance Reporting 541 Consequences of Noncompliance 542 Compliance Monitoring 543 Adopting Standard Frameworks 543 NIST Cybersecurity Framework 544 NIST Risk Management Framework 546 ISO Standards 547 Benchmarks and Secure Configuration Guides 549 Security Awareness and Training 550 User Training 551 Ongoing Awareness Efforts 553 Summary 554 Exam Essentials 555 Review Questions 557 Chapter 17 Risk Management and Privacy 561 Analyzing Risk 563 Risk Identification 564 Risk Assessment 565 Risk Analysis 567 Managing Risk 570 Risk Mitigation 571 Risk Avoidance 572 Risk Transference 572 Risk Acceptance 573 Risk Tracking 574 Risk Register 575 Risk Reporting 576 Disaster Recovery Planning 577 Disaster Types 577 Business Impact Analysis 578 Privacy 578 Data Inventory 579 Information Classification 580 Data Roles and Responsibilities 581 Information Life Cycle 583 Privacy Enhancing Technologies 584 Privacy and Data Breach Notification 585 Summary 585 Exam Essentials 585 Review Questions 587 Appendix Answers to Review Questions 591 Chapter 1: Today’s Security Professional 592 Chapter 2: Cybersecurity Threat Landscape 593 Chapter 3: Malicious Code 595 Chapter 4: Social Engineering and Password Attacks 597 Chapter 5: Security Assessment and Testing 600 Chapter 6: Application Security 602 Chapter 7: Cryptography and the PKI 604 Chapter 8: Identity and Access Management 605 Chapter 9: Resilience and Physical Security 607 Chapter 10: Cloud and Virtualization Security 609 Chapter 11: Endpoint Security 611 Chapter 12: Network Security 614 Chapter 13: Wireless and Mobile Security 616 Chapter 14: Monitoring and Incident Response 619 Chapter 15: Digital Forensics 621 Chapter 16: Security Governance and Compliance 623 Chapter 17: Risk Management and Privacy 626 Index 629
£34.00
J. Ross Publishing Achieve Comptia Security Sy0701 Exam Success
Book Synopsis
£41.60
BPB Publications Pythonic AI: A beginner's guide to building AI
Book Synopsis
£29.92
Goodheart-Wilcox Publisher Computer Service and Repair
Book Synopsis
£148.80