Home > Computing and Information Technology > Computer certification > CompTIA Security+ SY0-601 Exam Cram Premium Edition and Practice Test
CompTIA Security+ SY0-601 Exam Cram Premium Edition and Practice Test

CompTIA Security+ SY0-601 Exam Cram Premium Edition and Practice Test

          
5
4
3
2
1

Out of Stock


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Notify me when this book is in stock
Add to Wishlist

About the Book

CompTIA Security+ SY0-601 Exam Cram Premium Edition and Practice Test The exciting new CompTIA Security+ SY0-601 Exam Cram Premium Edition and Practice Test is a digital-only certification preparation product combining an eBook with enhanced Pearson IT Certification Practice Test. The Premium Edition eBook and Practice Test contains the following items: The CompTIA Security+ SY0-601 Exam Cram Premium Edition Practice Test, including four full practice exams and enhanced practice test features PDF, EPUB, and Mobi/Kindle formats of the CompTIA Security+ SY0-601 Exam Cram from Pearson IT Certification, which are accessible via your PC, tablet, and smartphone About the Premium Edition Practice Test This Premium Edition contains an enhanced version of the Pearson Test Prep practice test software with four full practice exams. This integrated learning package Allows you to focus on individual topic areas or take complete, timed exams Includes direct links from each question to detailed tutorials to help you understand the concepts behind the questions Provides unique sets of exam-realistic practice questions Tracks your performance and provides feedback on a module-by-module basis, laying out a complete assessment of your knowledge to help you focus your study where it is needed most Pearson Test Prep online system requirements Browsers: Chrome version 73 and above; Safari version 12 and above; Microsoft Edge 44 and above. Devices: Desktop and laptop computers, tablets running on Android v8.0 and iOS v13, smartphones with a minimum screen size of 4.7". Internet access required. Pearson Test Prep offline system requirements Windows 10, Windows 8.1; Microsoft .NET Framework 4.5 Client; Pentium-class 1 GHz processor (or equivalent); 512 MB RAM; 650 MB disk space plus 50 MB for each downloaded practice exam; access to the Internet to register and download exam databases About the Premium Edition eBook CompTIA Security+ SY0-601 Exam Cram, Sixth Edition, is the perfect study guide to help you pass the newly updated version of the CompTIA Security+ exam. It provides coverage and practice questions for every exam topic. Extensive prep tools include quizzes, Exam Alerts, and our essential last-minute review Cram Sheet. The powerful Pearson Test Prep practice software provides real-time practice and feedback with two complete exams. Covers the critical information you'll need to know to score higher on your Security+ SY0-601 exam! Assess the different types of threats, attacks, and vulnerabilities organizations face Understand security concepts across traditional, cloud, mobile, and IoT environments Explain and implement security controls across multiple environments Identify, analyze, and respond to operational needs and security incidents Understand and explain the relevance of concepts related to governance, risk, and compliance

Table of Contents:
    Introduction . . . . . . . . . . . . . . . . . . . . . . xxvii Part I: Attacks, Threats, and Vulnerabilities 1 CHAPTER 1: Social Engineering Techniques.. . . . . . . . . . . . . . . . 3     The Social Engineer.. . . . . . . . . . . . . . . . . . 4     Phishing and Related Attacks.. . . . . . . . . . . . . . . 6     Principles of Influence (Reasons for Effectiveness). . . . . . . . 10     What Next?.. . . . . . . . . . . . . . . . . . . . . 14 CHAPTER 2: Attack Basics.. . . . . . . . . . . . . . . . . . . . . . 15     Malware. . . . . . . . . . . . . . . . . . . . . . . 16     Physical Attacks.. . . . . . . . . . . . . . . . . . . . 26     Adversarial Artificial Intelligence (AI).. . . . . . . . . . . . 27     Password Attacks. . . . . . . . . . . . . . . . . . . . 28     Downgrade Attacks.. . . . . . . . . . . . . . . . . . . 31     What Next?.. . . . . . . . . . . . . . . . . . . . . 34 CHAPTER 3: Application Attacks.. . . . . . . . . . . . . . . . . . . . 35     Race Conditions.. . . . . . . . . . . . . . . . . . . . 36     Improper Software Handling.. . . . . . . . . . . . . . . 37     Resource Exhaustion.. . . . . . . . . . . . . . . . . . 37     Overflows.. . . . . . . . . . . . . . . . . . . . . . 38     Code Injections. . . . . . . . . . . . . . . . . . . . 39     Driver Manipulation.. . . . . . . . . . . . . . . . . . 40     Request Forgeries.. . . . . . . . . . . . . . . . . . . 41     Directory Traversal.. . . . . . . . . . . . . . . . . . . 44     Replay Attack.. . . . . . . . . . . . . . . . . . . . . 45     Secure Sockets Layer (SSL) Stripping.. . . . . . . . . . . . 45     Application Programming Interface (API) Attacks.. . . . . . . . 47     Pass-the-Hash Attack. . . . . . . . . . . . . . . . . . 49     What Next?.. . . . . . . . . . . . . . . . . . . . . 52 CHAPTER 4: Network Attacks.. . . . . . . . . . . . . . . . . . . . . 53     Wireless. . . . . . . . . . . . . . . . . . . . . . . 54     On-Path Attack. . . . . . . . . . . . . . . . . . . . 58     Layer 2 Attacks. . . . . . . . . . . . . . . . . . . . 59     Domain Name System (DNS) Attacks.. . . . . . . . . . . . 62     Denial of Service. . . . . . . . . . . . . . . . . . . . 64     Malicious Code and Script Execution.. . . . . . . . . . . . 68     What Next?.. . . . . . . . . . . . . . . . . . . . . 71 CHAPTER 5: Threat Actors, Vectors, and Intelligence Sources. . . . . . . . . . 73     Threat Actor Attributes.. . . . . . . . . . . . . . . . . 74     Threat Actor Types.. . . . . . . . . . . . . . . . . . . 75     Vectors.. . . . . . . . . . . . . . . . . . . . . . . 80     Threat Intelligence and Research Sources.. . . . . . . . . . . 81     What Next?.. . . . . . . . . . . . . . . . . . . . . 87 CHAPTER 6: Vulnerabilities.. . . . . . . . . . . . . . . . . . . . . . 89     Cloud-Based vs. On-Premises. . . . . . . . . . . . . . . 90     Zero-Day. . . . . . . . . . . . . . . . . . . . . . 90     Weak Configurations. . . . . . . . . . . . . . . . . . 91     Third-Party Risks.. . . . . . . . . . . . . . . . . . . 95     Impacts.. . . . . . . . . . . . . . . . . . . . . . . 96     What Next?.. . . . . . . . . . . . . . . . . . . . . 98 CHAPTER 7: Security Assessment Techniques.. . . . . . . . . . . . . . . 99     Vulnerability Scans.. . . . . . . . . . . . . . . . . . . 100     Threat Assessment.. . . . . . . . . . . . . . . . . . . 103     What Next?.. . . . . . . . . . . . . . . . . . . . . 110 CHAPTER 8: Penetration Testing Techniques.. . . . . . . . . . . . . . . . 111     Testing Methodology. . . . . . . . . . . . . . . . . . 112     Team Exercises.. . . . . . . . . . . . . . . . . . . . 118     What Next?.. . . . . . . . . . . . . . . . . . . . . 120 Part II: Architecture and Design 121 CHAPTER 9: Enterprise Security Concepts.. . . . . . . . . . . . . . . . . 123     Configuration Management.. . . . . . . . . . . . . . . . 124     Data Confidentiality.. . . . . . . . . . . . . . . . . . 126     Deception and Disruption.. . . . . . . . . . . . . . . . 139     What Next?.. . . . . . . . . . . . . . . . . . . . . 143 CHAPTER 10: Virtualization and Cloud Computing.. . . . . . . . . . . . . . 145     Virtualization.. . . . . . . . . . . . . . . . . . . . . 145     On-Premises vs. Off-Premises. . . . . . . . . . . . . . . 154     Cloud Models. . . . . . . . . . . . . . . . . . . . . 155     What Next?.. . . . . . . . . . . . . . . . . . . . . 164 CHAPTER 11: Secure Application Development, Deployment, and Automation.. . . . 165     Application Environment.. . . . . . . . . . . . . . . . . 166     Integrity Measurement.. . . . . . . . . . . . . . . . . 168     Change Management and Version Control.. . . . . . . . . . . 169     Secure Coding Techniques.. . . . . . . . . . . . . . . . 170     Automation and Scripting.. . . . . . . . . . . . . . . . 180     Scalability and Elasticity. . . . . . . . . . . . . . . . . 184     What Next?.. . . . . . . . . . . . . . . . . . . . . 187 CHAPTER 12: Authentication and Authorization Design. . . . . . . . . . . . . 189     Identification and Authentication, Authorization, and     Accounting (AAA).. . . . . . . . . . . . . . . . . . . 189     Multifactor Authentication.. . . . . . . . . . . . . . . . 190     Single Sign-on.. . . . . . . . . . . . . . . . . . . . 192     Authentication Technologies. . . . . . . . . . . . . . . . 195     What Next?.. . . . . . . . . . . . . . . . . . . . . 204 CHAPTER 13: Cybersecurity Resilience.. . . . . . . . . . . . . . . . . . 205     Redundancy.. . . . . . . . . . . . . . . . . . . . . 205     Backups.. . . . . . . . . . . . . . . . . . . . . . . 214     Defense in Depth.. . . . . . . . . . . . . . . . . . . 221     What Next?.. . . . . . . . . . . . . . . . . . . . . 224 CHAPTER 14: Embedded and Specialized Systems. . . . . . . . . . . . . . 225     Embedded Systems.. . . . . . . . . . . . . . . . . . . 225     SCADA and ICS. . . . . . . . . . . . . . . . . . . . 227     Smart Devices and IoT.. . . . . . . . . . . . . . . . . 229     What Next?.. . . . . . . . . . . . . . . . . . . . . 238 CHAPTER 15: Physical Security Controls.. . . . . . . . . . . . . . . . . . 239     Perimeter Security.. . . . . . . . . . . . . . . . . . . 239     Internal Security.. . . . . . . . . . . . . . . . . . . . 243     Equipment Security. . . . . . . . . . . . . . . . . . . 246     Environmental Controls.. . . . . . . . . . . . . . . . . 249     Secure Data Destruction.. . . . . . . . . . . . . . . . . 255     What Next?.. . . . . . . . . . . . . . . . . . . . . 259 CHAPTER 16: Cryptographic Concepts. . . . . . . . . . . . . . . . . . . 261     Cryptosystems.. . . . . . . . . . . . . . . . . . . . 262     Use of Proven Technologies and Implementation.. . . . . . . . 272     Steganography.. . . . . . . . . . . . . . . . . . . . 273     Cryptography Use Cases.. . . . . . . . . . . . . . . . . 274     Cryptography Constraints.. . . . . . . . . . . . . . . . 276     What Next?.. . . . . . . . . . . . . . . . . . . . . 277 Part III: Implementation 279 CHAPTER 17: Secure Protocols.. . . . . . . . . . . . . . . . . . . . . 281     Secure Web Protocols.. . . . . . . . . . . . . . . . . . 282     Secure File Transfer Protocols.. . . . . . . . . . . . . . . 286     Secure Email Protocols.. . . . . . . . . . . . . . . . . 287     Secure Internet Protocols. . . . . . . . . . . . . . . . . 288     Secure Protocol Use Cases.. . . . . . . . . . . . . . . . 293     What Next?.. . . . . . . . . . . . . . . . . . . . . 305 CHAPTER 18: Host and Application Security Solutions.. . . . . . . . . . . . . 307     Endpoint Protection.. . . . . . . . . . . . . . . . . . 308     Firewalls and HIPS/HIDS Solutions.. . . . . . . . . . . 308     Anti-Malware and Other Host Protections. . . . . . . . . 310     Application Security.. . . . . . . . . . . . . . . . . . 318     Hardware and Firmware Security.. . . . . . . . . . . . . . 322     Operating System Security.. . . . . . . . . . . . . . . . 330     What Next?.. . . . . . . . . . . . . . . . . . . . . 338 CHAPTER 19: Secure Network Design.. . . . . . . . . . . . . . . . . . . 339     Network Devices and Segmentation.. . . . . . . . . . . . . 340     Security Devices and Boundaries. . . . . . . . . . . . . . 347     What Next?.. . . . . . . . . . . . . . . . . . . . . 369 CHAPTER 20: Wireless Security Settings.. . . . . . . . . . . . . . . . . . 371     Access Methods.. . . . . . . . . . . . . . . . . . . . 372     Wireless Cryptographic Protocols.. . . . . . . . . . . . . . 373     Authentication Protocols.. . . . . . . . . . . . . . . . . 377     Wireless Access Installations. . . . . . . . . . . . . . . . 379     What Next?.. . . . . . . . . . . . . . . . . . . . . 387 CHAPTER 21: Secure Mobile Solutions. . . . . . . . . . . . . . . . . . . 389     Communication Methods. . . . . . . . . . . . . . . . . 389     Mobile Device Management Concepts. . . . . . . . . . . . 393     Enforcement and Monitoring.. . . . . . . . . . . . . . . 405     Deployment Models.. . . . . . . . . . . . . . . . . . 412     What Next?.. . . . . . . . . . . . . . . . . . . . . 420 CHAPTER 22: Cloud Cybersecurity Solutions.. . . . . . . . . . . . . . . . 421     Cloud Workloads.. . . . . . . . . . . . . . . . . . . 422     Third-Party Cloud Security Solutions.. . . . . . . . . . . . 428     What Next?.. . . . . . . . . . . . . . . . . . . . . 431 CHAPTER 23: Identity and Account Management Controls.. . . . . . . . . . . 433     Account Types.. . . . . . . . . . . . . . . . . . . . 433     Account Management.. . . . . . . . . . . . . . . . . . 435     Account Policy Enforcement.. . . . . . . . . . . . . . . 441     What Next?.. . . . . . . . . . . . . . . . . . . . . 448 CHAPTER 24: Authentication and Authorization Solutions.. . . . . . . . . . . . 449     Authentication.. . . . . . . . . . . . . . . . . . . . 450     Access Control.. . . . . . . . . . . . . . . . . . . . 466     What Next?.. . . . . . . . . . . . . . . . . . . . . 472 CHAPTER 25: Public Key Infrastructure.. . . . . . . . . . . . . . . . . . 473     What Next?.. . . . . . . . . . . . . . . . . . . . . 489 Part IV: Operations and Incident Response 491 CHAPTER 26: Organizational Security.. . . . . . . . . . . . . . . . . . . 493     Shell and Script Environments.. . . . . . . . . . . . . . . 494     Network Reconnaissance and Discovery. . . . . . . . . . . . 496     Packet Capture and Replay. . . . . . . . . . . . . . . . 502     Password Crackers.. . . . . . . . . . . . . . . . . . . 504     Forensics and Data Sanitization.. . . . . . . . . . . . . . 505     What Next?.. . . . . . . . . . . . . . . . . . . . . 508 CHAPTER 27: Incident Response.. . . . . . . . . . . . . . . . . . . . . 509     Attack Frameworks.. . . . . . . . . . . . . . . . . . . 509     Incident Response Plan.. . . . . . . . . . . . . . . . . 512     Incident Response Process.. . . . . . . . . . . . . . . . 517     Continuity and Recovery Plans.. . . . . . . . . . . . . . . 522     What Next?.. . . . . . . . . . . . . . . . . . . . . 528 CHAPTER 28: Incident Investigation. . . . . . . . . . . . . . . . . . . . 529     SIEM Dashboards. . . . . . . . . . . . . . . . . . . 530     Logging. . . . . . . . . . . . . . . . . . . . . . . 531     Network Activity. . . . . . . . . . . . . . . . . . . . 536     What Next?.. . . . . . . . . . . . . . . . . . . . . 539 CHAPTER 29: Incident Mitigation.. . . . . . . . . . . . . . . . . . . . . 541     Containment and Eradication.. . . . . . . . . . . . . . . 541     What Next?.. . . . . . . . . . . . . . . . . . . . . 549 CHAPTER 30: Digital Forensics.. . . . . . . . . . . . . . . . . . . . . 551     Data Breach Notifications.. . . . . . . . . . . . . . . . 552     Strategic Intelligence/Counterintelligence Gathering. . . . . . . 554     Track Person-hours.. . . . . . . . . . . . . . . . . . . 555     Order of Volatility. . . . . . . . . . . . . . . . . . . 555     Chain of Custody.. . . . . . . . . . . . . . . . . . . 556     Data Acquisition.. . . . . . . . . . . . . . . . . . . . 559     Capture System Images.. . . . . . . . . . . . . . . 560     Capture Network Traffic and Logs.. . . . . . . . . . . 560     Capture Video and Photographs.. . . . . . . . . . . . 561     Record Time Offset.. . . . . . . . . . . . . . . . 562     Take Hashes. . . . . . . . . . . . . . . . . . . 562     Capture Screenshots.. . . . . . . . . . . . . . . . 563     Collect Witness Interviews. . . . . . . . . . . . . . 563     What Next?.. . . . . . . . . . . . . . . . . . . . . 565 Part V: Governance, Risk, and Compliance 567 CHAPTER 31: Control Types.. . . . . . . . . . . . . . . . . . . . . . 569     Nature of Controls.. . . . . . . . . . . . . . . . . . . 570     Functional Use of Controls.. . . . . . . . . . . . . . . . 570     Compensating Controls.. . . . . . . . . . . . . . . . . 572     What Next?.. . . . . . . . . . . . . . . . . . . . . 574 CHAPTER 32: Regulations, Standards, and Frameworks.. . . . . . . . . . . . 575     Industry-Standard Frameworks and Reference Architectures. . . . . 575     Benchmarks and Secure Configuration Guides.. . . . . . . . . 579     What Next?.. . . . . . . . . . . . . . . . . . . . . 581 CHAPTER 33: Organizational Security Policies.. . . . . . . . . . . . . . . . 583     Policy Framework.. . . . . . . . . . . . . . . . . . . 583     Human Resource Management Policies.. . . . . . . . . . . . 584     Third-Party Risk Management.. . . . . . . . . . . . . . . 592     What Next?.. . . . . . . . . . . . . . . . . . . . . 596 CHAPTER 34: Risk Management.. . . . . . . . . . . . . . . . . . . . . 597     Risk Analysis. . . . . . . . . . . . . . . . . . . . . 598     Risk Assessment.. . . . . . . . . . . . . . . . . . . . 602     Business Impact Analysis.. . . . . . . . . . . . . . . . . 606     What Next?.. . . . . . . . . . . . . . . . . . . . . 612 CHAPTER 35: Sensitive Data and Privacy.. . . . . . . . . . . . . . . . . . 613     Sensitive Data Protection. . . . . . . . . . . . . . . . . 613     Privacy Impact Assessment.. . . . . . . . . . . . . . . . 621     What Next?.. . . . . . . . . . . . . . . . . . . . . 623 Glossary of Essential Terms and Components.. . . . . . . . . . . . 625 9780136798675, TOC, 10/9/2020


Best Sellers


Product Details
  • ISBN-13: 9780136798750
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Pearson It Certification
  • Language: English
  • ISBN-10: 0136798756
  • Publisher Date: 19 Mar 2021
  • Binding: Other printed item
  • No of Pages: 752


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
CompTIA Security+ SY0-601 Exam Cram Premium Edition and Practice Test
Pearson Education (US) -
CompTIA Security+ SY0-601 Exam Cram Premium Edition and Practice Test
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

CompTIA Security+ SY0-601 Exam Cram Premium Edition and Practice Test

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA