Register your product to gain access to bonus material or receive a coupon.
Learn, prepare, and practice for CompTIA Security+ SY0-601 exam success with this CompTIA approved Cert Guide from Pearson IT Certification, a leader in IT certification learning and a CompTIA Authorized Platinum Partner.
Part I Threats, Attacks and Vulnerabilities
Chapter 1 Comparing and contrasting different types of social engineering techniques Chapter 2 Analyzing potential indicators to determine the type of attack Chapter 3 Analyzing potential indicators associated with application attacks Chapter 4 Analyzing potential indicators associated with network attacks Chapter 5 Understanding different threat actors, vectors, and intelligence sources Chapter 6 Understanding the security concerns associated with various types of vulnerabilities Chapter 7 Summarizing the techniques used in security assessments Chapter 8 Understanding the techniques used in penetration testing Part II Architecture and Design
Chapter 9 Understanding the importance of security concepts in an enterprise environment Chapter 10 Summarizing virtualization and cloud computing concepts Chapter 11 Summarizing secure application development, deployment, and automation concepts Chapter 12 Summarizing authentication and authorization design concepts Chapter 13 Implementing cybersecurity resilience Chapter 14 Understanding the security implications of embedded and specialized systems Chapter 15 Understanding the importance of physical security controls Chapter 16 Summarizing the basics of cryptographic concepts Part III Implementation
Chapter 17 Implementing secure protocols
Chapter 18 Implementing host or application security solutions Chapter 19 Implementing secure network designs Chapter 20 Installing and configuring wireless security settings Chapter 21 Implementing secure mobile solutions Chapter 22 Applying cybersecurity solutions to the cloud Chapter 23 Implementing identity and account management controls Chapter 24 Implementing authentication and authorization solutions Chapter 25 Implementing public key infrastructure Part IV Operations and Incident Response
Chapter 26 Using the appropriate tool to assess organizational security Chapter 27 Summarizing the importance of policies, processes, and procedures for incident response Chapter 28 Using appropriate data sources to support an investigation Chapter 29 Applying mitigation techniques or controls to secure an environment Chapter 30 Understanding the key aspects of digital forensics Part V: Governance, Risk, and Compliance
Chapter 31 Comparing and contrasting various types of controls Chapter 32 Understanding the importance of applicable regulations, standards, or frameworks that impact organizational security posture Chapter 33 Understanding the importance of policies to organizational security Chapter 34 Summarizing risk management processes and concepts Chapter 35 Understanding privacy and sensitive data concepts in relation to security Chapter 36 Final Preparation