Home > Computing and Information Technology > Computer certification > CompTIA Security+ Certification Bundle, Third Edition (Exam SY0-501)
19%
CompTIA Security+ Certification Bundle, Third Edition (Exam SY0-501)

CompTIA Security+ Certification Bundle, Third Edition (Exam SY0-501)

          
5
4
3
2
1

Out of Stock


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Notify me when this book is in stock
Add to Wishlist

About the Book

This fully updated, money-saving collection covers every objective on the CompTIA Security+ exam SY0-501 and contains bonus content This up-to-date test preparation bundle covers every objective on the latest version of the CompTIA Security+ exam. Designed to be the ultimate self-study resource, the bundle includes the current editions of CompTIA Security+ Certification Study Guide and CompTIA Security+ Certification Practice Exams and exclusive electronic content—all at a discount of 12% off of the suggested retail price. CompTIA Security+ Certification Bundle, Third Edition, provides examinees with a wide variety of exam-focused preparation resources. Bonus content includes a quick review guide, a security audit checklist, and a URL reference list. Electronic content from the two books features author-led video training, lab simulations, and customizable test engine software that contains four complete practice exams. • 12% cheaper than purchasing the books individually, and features content unavailable elsewhere • Includes a 10% off exam voucher coupon, a $37 value • CompTIA Approved Quality Content (CAQC)—provides complete coverage of every objective on exam SY0-501

Table of Contents:
Section I: “How to Access the Bonus Content” Section II: CompTIA Security+ Certification Study Guide, Third Edition (Exam SY0-501) Cover Title Page Copyright Page Dedication About the Author Contents at a Glance Contents Preface Acknowledgments Introduction Exam Readiness Checklist 1 Networking Basics and Terminology Understanding Network Devices and Cabling Looking at Network Devices Understanding Network Cabling Exercise 1-1: Reviewing Networking Components Understanding TCP/IP Reviewing IP Addressing Exercise 1-2: Understanding Valid Addresses Understanding TCP/IP Protocols Exercise 1-3: Viewing Protocol Information with Network Monitor Understanding Application Layer Protocols Understanding IPv6 Exercise 1-4: Identifying Protocols in TCP/IP Network Security Best Practices Device Usage Cable and Protocol Usage Certification Summary ✓ Two-Minute Drill Q&A Self Test Self Test Answers 2 Introduction to Security Terminology Goals of Information Security Confidentiality Integrity Availability Accountability Exercise 2-1: CIA Scenarios Understanding Authentication and Authorization Identification and Authentication Authorization Understanding Security Principles and Terminology Types of Security Least Privilege, Separation of Duties, and Rotation of Duties Concept of Need to Know Layered Security and Diversity of Defense Due Care and Due Diligence Vulnerability and Exploit Threat Actors Looking at Security Roles System Owner and Data Owner System Administrator User Privileged User Executive User Data Roles Security Officer Exercise 2-2: Security Terminology Certification Summary ✓ Two-Minute Drill Q&A Self Test Self Test Answers 3 Security Policies and Standards Introduction to Security Policies Structure of a Policy Identifying Types of Policies Understanding Regulations and Standards General Security Policies Policies Affecting Users Policies Affecting Personnel Management Policies Affecting Administrators Exercise 3-1: Reviewing a Security Policy Policies Affecting Management Other Popular Policies Human Resources Policies Hiring Policy Termination Policy Mandatory Vacations Security-Related HR Policies Exercise 3-2: Creating a Security Policy User Education and Awareness General Training and Role-Based Training User Habits New Threats and Security Trends Use of Social Networks and P2P Programs Training Metrics and Follow-Up Exercise 3-3: Designing a Training Program Certification Summary ✓ Two-Minute Drill Q&A Self Test Self Test Answers 4 Types of Attacks Understanding Social Engineering Social Engineering Overview Popular Social Engineering Attacks Reasons for Effectiveness Preventing Social Engineering Attacks Identifying Network Attacks Popular Network Attacks Exercise 4-1: DNS Poisoning After Exploit Using Kali Linux Exercise 4-2: Performing a Port Scan Other Network Attacks Preventing Network Attacks Looking at Password Attacks Types of Password Attacks Exercise 4-3: Password Cracking with LC4 Birthday Attacks, Rainbow Tables, and Known-Plaintext Attacks Online vs. Offline Attacks Other Password Attack Terms Preventing Password Attacks Understanding Application Attacks Popular Application Attacks Exercise 4-4: SQL Injection Attacks Exercise 4-5: Exploiting an IIS Web Server with Folder Traversal Other Application Attacks Preventing Application Attacks Certification Summary ✓ Two-Minute Drill Q&A Self Test Self Test Answers 5 System Security Threats Identifying Physical Threats Snooping Theft and Loss of Assets Human Error Sabotage Looking at Malicious Software Privilege Escalation Viruses Exercise 5-1: Looking at the NetBus Trojan Virus Other Malicious Software Protecting Against Malicious Software Threats Against Hardware BIOS Settings USB Devices Smart Phones and Tablets Exercise 5-2: Exploiting a Bluetooth Device Removable Storage Network Attached Storage PBX Certification Summary ✓ Two-Minute Drill Q&A Self Test Self Test Answers 6 Mitigating Security Threats Understanding Operating System Hardening Uninstall Unnecessary Software Disable Unnecessary Services Exercise 6-1: Disabling the Remote Desktop Services Service Protect Management Interfaces and Applications Disable Unnecessary Accounts Patch System Password Protection System Hardening Procedures Network Security Hardening Exercise 6-2: Hardening a Network Switch Tools for System Hardening Exercise 6-3: Creating a Security Template Security Posture and Reporting Establishing Application Security Secure Coding Concepts Secure Coding Techniques Application Hardening Server Hardening Best Practices All Servers HTTP Servers DNS Servers Exercise 6-4: Limiting DNS Zone Transfers DHCP Servers SMTP Servers and FTP Servers Mitigate Risks in Static Environments Common Security Issues and Device Output Troubleshooting Common Security Issues Analyzing and Interpreting Output from Security Technologies Exercise 6-5: Removable Media Control Frameworks and Security Guides Certification Summary ✓ Two-Minute Drill Q&A Self Test Self Test Answers 7 Implementing System Security Implementing Host-Based Firewalls and HIDS Host-Based Firewalls Exercise 7-1: Configuring TCP Wrappers in Linux Host-Based IDS and Host-Based IPS Protecting Against Malware Patch Management Using Antivirus and Anti-spam Software Spyware and Adware Phish Filters and Pop-up Blockers Exercise 7-2: Manually Testing a Web Site for Phishing Practicing Good Habits Device Security and Data Security Hardware Security Mobile Devices Data Security Exercise 7-3: Configuring Permissions in Windows 8 Application Security and BYOD Concerns Secure System Design Secure Staging Deployment Understanding Virtualization and Cloud Computing Virtualization and Security Cloud Computing Overview Cloud Computing Considerations Resiliency and Automation Certification Summary ✓ Two-Minute Drill Q&A Self Test Self Test Answers 8 Securing the Network Infrastructure Understanding Firewalls Firewalls Using IPTables as a Firewall Exercise 8-1: Configuring IPTables in Linux Using Firewall Features on a Home Router NAT and Ad Hoc Networking Proxy Servers Routers and ACLs Other Security Devices and Technologies Using Intrusion Detection Systems IDS Overview Exercise 8-2: Using Snort: A Network-Based IDS Honeypots and Honeynets Protocol Analyzers Network Design and Administration Principles Subnetting and VLANs Network Switches Network Address Translation (NAT) Network Access Control (NAC) Data Loss Prevention (DLP) Mail Gateway Network Communication Encryption Network Administration Principles Security Device Placement Securing Devices Certification Summary ✓ Two-Minute Drill Q&A Self Test Self Test Answers 9 Wireless Networking and Security Understanding Wireless Networking Standards Channels Antenna Types Authentication and Encryption Securing a Wireless Network Security Best Practices Vulnerabilities with Wireless Networks Exercise 9-1: Cracking WEP with Kali Linux Perform a Site Survey Configuring a Wireless Network Configuring the Access Point Configuring the Client Other Wireless Technologies Infrared Bluetooth Near Field Communication RFID Certification Summary ✓ Two-Minute Drill Q&A Self Test Self Test Answers 10 Authentication Identifying Authentication Models Authentication Terminology Authentication Factors Single Sign-on Authentication Protocols Windows Authentication Protocols Remote Access Authentication Authentication Services Implementing Authentication User Accounts Tokens Looking at Biometrics Certificate-Based Authentication Claims-Based Authentication/Federation Services Certification Summary ✓ Two-Minute Drill Q&A Self Test Self Test Answers 11 Access Control Introducing Access Control Types of Security Controls Implicit Deny Review of Security Principles/General Concepts Access Control Models Discretionary Access Control Mandatory Access Control Role-Based Access Control Exercise 11-1: Assigning a User the sysadmin Role Rule-Based Access Control Group-Based Access Control Attribute-Based Access Control Implementing Access Control User Account Types Using Security Groups Exercise 11-2: Configuring Security Groups and Assigning Permissions Rights and Privileges Exercise 11-3: Modifying User Rights on a Windows System File System Security and Printer Security Access Control Lists (ACLs) Group Policies Exercise 11-4: Configuring Password Policies via Group Policies Database Security Exercise 11-5: Encrypting Sensitive Information in the Database Account Restrictions Account Policy Enforcement Monitoring Account Access Certification Summary ✓ Two-Minute Drill Q&A Self Test Self Test Answers 12 Introduction to Cryptography Introduction to Cryptography Services Understanding Cryptography Algorithms and Keys Exercise 12-1: Encrypting Data with the Caesar Cipher Other Cryptography Terms Symmetric Encryption Symmetric Encryption Concepts Symmetric Encryption Algorithms Exercise 12-2: Encrypting Data with the AES Algorithm Asymmetric Encryption Asymmetric Encryption Concepts Asymmetric Encryption Algorithms Quantum Cryptography In-Band vs. Out-of-Band Key Exchange Understanding Hashing Hashing Concepts Hashing Algorithms Exercise 12-3: Generating Hashes to Verify Integrity Identifying Encryption Uses Common Use Cases Encrypting Data Encrypting Communication Understanding Steganography Certification Summary ✓ Two-Minute Drill Q&A Self Test Self Test Answers 13 Managing a Public Key Infrastructure Introduction to Public Key Infrastructure Understanding PKI Terminology Certificate Authority and Registration Authority Repository Managing a Public Key Infrastructure Certificate Life Cycle Certificate Revocation Lists and OCSP Other PKI Terms Implementing a Public Key Infrastructure How SSL/TLS Works How Digital Signatures Work Creating a PKI Exercise 13-1: Installing a Certificate Authority Exercise 13-2: SSL-Enabling a Web Site Managing a PKI Certification Summary ✓ Two-Minute Drill Q&A Self Test Self Test Answers 14 Physical Security Choosing a Business Location Facility Concerns Lighting and Windows Doors, Windows, and Walls Safety Concerns Physical Access Controls Exercise 14-1: Erasing the Administrator Password with a Live DVD Fencing and Guards Hardware Locks/Lock Types Access Systems Other Security Controls Physical Access Lists and Logs Video Surveillance Implementing Environmental Controls Understanding HVAC Shielding Fire Suppression Certification Summary ✓ Two-Minute Drill Q&A Self Test Self Test Answers 15 Risk Analysis Introduction to Risk Analysis Risk Analysis Overview Risk Analysis Process Risk with Cloud Computing and Third Parties Types of Risk Analysis Qualitative Exercise 15-1: Performing a Qualitative Risk Analysis Quantitative Exercise 15-2: Performing a Quantitative Risk Analysis Risk Mitigation Strategies Exercise 15-3: Identifying Mitigation Techniques Certification Summary ✓ Two-Minute Drill Q&A Self Test Self Test Answers 16 Disaster Recovery and Business Continuity Introduction to Disaster Recovery and Business Continuity Introduction to Business Continuity Understanding Disaster Recovery Backing Up and Restoring Data (Backup Concepts) Security Considerations with Tapes Full, Incremental, and Differential Backups Scheduling Backups Backup Plan Example Exercise 16-1: Backing Up and Restoring Data on a Windows Server Geographic Considerations Implementing Fault Tolerance RAID 0 RAID 1 RAID 5 Understanding High Availability Failover Clustering Network Load Balancing Redundant Hardware Certification Summary ✓ Two-Minute Drill Q&A Self Test Self Test Answers 17 Introduction to Computer Forensics and Incident Response Working with Evidence Types of Evidence Collecting Evidence Collecting Digital Evidence Understanding the Process Where to Find Evidence Tools Used Exercise 17-1: Using ProDiscover Basic for Forensics Analysis Exercise 17-2: Performing Cell Phone Forensics Exercise 17-3: Looking at Exif Metadata Looking at Incident Response Incident Response Team Incident Response Plan Incident Response Process First Responders Damage and Loss Control Certification Summary ✓ Two-Minute Drill Q&A Self Test Self Test Answers 18 Security Assessments and Audits Understanding Types of Assessments Assessment Types Assessment Techniques Performing a Security Assessment Performing a Penetration Test Exercise 18-1: Profiling an Organization Exercise 18-2: Using a Port Scanner Performing a Vulnerability Assessment Exercise 18-3: Performing a Vulnerability Scan with MBSA Certification Summary ✓ Two-Minute Drill Q&A Self Test Self Test Answers 19 Understanding Monitoring and Auditing Introduction to Monitoring Monitoring Tools Useful System Commands SNMP Performance Monitor Protocol Analyzer and Sniffer Exercise 19-1: Monitoring Network Traffic with Network Monitor Security Information and Event Management (SIEM) Implementing Logging and Auditing Understanding Auditing Exercise 19-2: Implementing Auditing in Windows Understanding Logging Exercise 19-3: Configuring Logging in IIS Exercise 19-4: Configuring Windows Firewall Popular Areas to Audit Certification Summary ✓ Two-Minute Drill Q&A Self Test Self Test Answers A About the Download System Requirements Total Tester Premium Practice Exam Software Installing and Running Total Tester Pre-assessment Test McGraw-Hill Professional Media Center Download Performance-Based Question Simulations Video Training from the Author Pre-assessment Exam in Total Tester: Analyzing Your Results Glossary Lab Book, Lab Solutions, and Lab Files Technical Support Total Seminars Technical Support McGraw-Hill Education Content Support Index Section III: CompTIA Security+ Certification Practice Exams, Third Edition (Exam SY0-501) Cover Title Page Copyright Page Dedication About the Authors About the Technical Editor Contents at a Glance Contents Acknowledgments Introduction Exam Readiness Checklist 1 Networking Basics and Terminology Questions Quick Answer Key In-Depth Answers 2 Introduction to Security Terminology Questions Quick Answer Key In-Depth Answers 3 Security Policies and Standards Questions Quick Answer Key In-Depth Answers 4 Types of Attacks Questions Quick Answer Key In-Depth Answers 5 System Security Threats Questions Quick Answer Key In-Depth Answers 6 Mitigating Security Threats Questions Quick Answer Key In-Depth Answers 7 Implementing System Security Questions Quick Answer Key In-Depth Answers 8 Securing the Network Infrastructure Questions Quick Answer Key In-Depth Answers 9 Wireless Networking and Security Questions Quick Answer Key In-Depth Answers 10 Authentication Questions Quick Answer Key In-Depth Answers 11 Access Control Questions Quick Answer Key In-Depth Answers 12 Introduction to Cryptography Questions Quick Answer Key In-Depth Answers 13 Managing a Public Key Infrastructure Questions Quick Answer Key In-Depth Answers 14 Physical Security Questions Quick Answer Key In-Depth Answers 15 Risk Analysis Questions Quick Answer Key In-Depth Answers 16 Disaster Recovery and Business Continuity Questions Quick Answer Key In-Depth Answers 17 Introduction to Computer Forensics and Incident Response Questions Quick Answer Key In-Depth Answers 18 Security Assessments and Audits Questions Quick Answer Key In-Depth Answers 19 Understanding Monitoring and Auditing Questions Quick Answer Key In-Depth Answers A Pre-assessment Exam Questions Quick Answer Key In-Depth Answers B About the CD-ROM System Requirements Installing and Running Total Tester Premium Practice Exam Software Total Tester Premium Practice Exam Software Performance-Based Questions Secured Book PDF Technical Support


Best Sellers


Product Details
  • ISBN-13: 9781260116380
  • Publisher: McGraw-Hill Education
  • Publisher Imprint: McGraw-Hill Education
  • Edition: Revised edition
  • Language: English
  • Spine Width: 61 mm
  • Width: 185 mm
  • ISBN-10: 1260116387
  • Publisher Date: 26 Dec 2017
  • Binding: SA
  • Height: 231 mm
  • Returnable: Y
  • Weight: 2055 gr


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
CompTIA Security+ Certification Bundle, Third Edition (Exam SY0-501)
McGraw-Hill Education -
CompTIA Security+ Certification Bundle, Third Edition (Exam SY0-501)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

CompTIA Security+ Certification Bundle, Third Edition (Exam SY0-501)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA