Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
CompTIA Security+ SY0-701 Certification Guide - Third Edition

You're reading from  CompTIA Security+ SY0-701 Certification Guide - Third Edition

Product type Book
Published in Jan 2024
Publisher Packt
ISBN-13 9781835461532
Pages 622 pages
Edition 3rd Edition
Languages
Author (1):
Ian Neil Ian Neil
Profile icon Ian Neil

Table of Contents (38) Chapters

Preface 1. Domain 1: General Security Concepts
2. Chapter 1: Compare and contrast various types of security controls 3. Chapter 2: Summarize fundamental security concepts 4. Chapter 3: Explain the importance of change management processes and the impact to security 5. Chapter 4: Explain the importance of using appropriate cryptographic solutions 6. Domain 2: Threats, Vulnerabilities, and Mitigations
7. Chapter 5: Compare and contrast common threat actors and motivations 8. Chapter 6: Explain common threat vectors and attack surfaces 9. Chapter 7: Explain various types of vulnerabilities 10. Chapter 8: Given a scenario, analyze indicators of malicious activity 11. Chapter 9: Explain the purpose of mitigation techniques used to secure the enterprise 12. Domain 3: Security Architecture
13. Chapter 10: Compare and contrast security implications of different architecture models 14. Chapter 11: Given a scenario, apply security principles to secure enterprise infrastructure 15. Chapter 12: Compare and contrast concepts and strategies to protect data 16. Chapter 13: Explain the importance of resilience and recovery in security architecture 17. Domain 4: Security Operations
18. Chapter 14: Given a scenario, apply common security techniques to computing resources 19. Chapter 15: Explain the security implications of proper hardware, software, and data asset management 20. Chapter 16: Explain various activities associated with vulnerability management 21. Chapter 17: Explain security alerting and monitoring concepts and tools 22. Chapter 18: Given a scenario, modify enterprise capabilities to enhance security 23. Chapter 19: Given a scenario, implement and maintain identity and access management 24. Chapter 20: Explain the importance of automation and orchestration related to secure operations 25. Chapter 21: Explain appropriate incident response activities 26. Chapter 22: Given a scenario, use data sources to support an investigation 27. Domain 5: Security Program Management and Oversight
28. Chapter 23: Summarize elements of effective security governance 29. Chapter 24: Explain elements of the risk management process 30. Chapter 25: Explain the processes associated with third-party risk assessment and management 31. Chapter 26: Summarize elements of effective security compliance 32. Chapter 27: Explain types and purposes of audits and assessments 33. Chapter 28: Given a scenario, implement security awareness practices 34. Chapter 29: Accessing the online practice resources 35. Solutions 36. Other Books You May Enjoy 37. Coupon Code for CompTIA Security+ Exam Vouchers

Policies

While guidelines are top-level suggestions that are designed to meet a certain goal, policies create a rigid prescriptive framework of what needs to be done to ensure guidelines are met. Policies set the rules and procedures that define how different aspects of operations, from resource utilization to data security and business continuity, are managed. Some of the most common data and security policies are the following:

  • Acceptable Use Policy (AUP): An AUP sets the ground rules for how employees and stakeholders can utilize an organization’s resources. It outlines acceptable and unacceptable behaviors, such as appropriate use of email, internet access, and social media, while emphasizing the importance of responsible and ethical use.
  • Information security policies: Information security policies are policies that define the procedures and controls that protect sensitive information from unauthorized access, data breaches, and cyber threats. They encompass...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}