Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
CompTIA Security+ SY0-701 Certification Guide - Third Edition

You're reading from  CompTIA Security+ SY0-701 Certification Guide - Third Edition

Product type Book
Published in Jan 2024
Publisher Packt
ISBN-13 9781835461532
Pages 622 pages
Edition 3rd Edition
Languages
Author (1):
Ian Neil Ian Neil
Profile icon Ian Neil

Table of Contents (38) Chapters

Preface 1. Domain 1: General Security Concepts
2. Chapter 1: Compare and contrast various types of security controls 3. Chapter 2: Summarize fundamental security concepts 4. Chapter 3: Explain the importance of change management processes and the impact to security 5. Chapter 4: Explain the importance of using appropriate cryptographic solutions 6. Domain 2: Threats, Vulnerabilities, and Mitigations
7. Chapter 5: Compare and contrast common threat actors and motivations 8. Chapter 6: Explain common threat vectors and attack surfaces 9. Chapter 7: Explain various types of vulnerabilities 10. Chapter 8: Given a scenario, analyze indicators of malicious activity 11. Chapter 9: Explain the purpose of mitigation techniques used to secure the enterprise 12. Domain 3: Security Architecture
13. Chapter 10: Compare and contrast security implications of different architecture models 14. Chapter 11: Given a scenario, apply security principles to secure enterprise infrastructure 15. Chapter 12: Compare and contrast concepts and strategies to protect data 16. Chapter 13: Explain the importance of resilience and recovery in security architecture 17. Domain 4: Security Operations
18. Chapter 14: Given a scenario, apply common security techniques to computing resources 19. Chapter 15: Explain the security implications of proper hardware, software, and data asset management 20. Chapter 16: Explain various activities associated with vulnerability management 21. Chapter 17: Explain security alerting and monitoring concepts and tools 22. Chapter 18: Given a scenario, modify enterprise capabilities to enhance security 23. Chapter 19: Given a scenario, implement and maintain identity and access management 24. Chapter 20: Explain the importance of automation and orchestration related to secure operations 25. Chapter 21: Explain appropriate incident response activities 26. Chapter 22: Given a scenario, use data sources to support an investigation 27. Domain 5: Security Program Management and Oversight
28. Chapter 23: Summarize elements of effective security governance 29. Chapter 24: Explain elements of the risk management process 30. Chapter 25: Explain the processes associated with third-party risk assessment and management 31. Chapter 26: Summarize elements of effective security compliance 32. Chapter 27: Explain types and purposes of audits and assessments 33. Chapter 28: Given a scenario, implement security awareness practices 34. Chapter 29: Accessing the online practice resources 35. Solutions 36. Other Books You May Enjoy 37. Coupon Code for CompTIA Security+ Exam Vouchers

Mobile Solutions

In today’s interconnected world, mobile devices have become ubiquitous as they play a pivotal role in both personal and professional spheres. With the increasing reliance on mobile solutions, the need for robust security measures to protect sensitive data and resources has never been greater. The following sections will explore common security techniques that can be applied to mobile solutions, beginning with mobile device management.

Mobile Device Management

A Mobile Device Management (MDM) solution provides centralized control and maintenance of mobile devices to ensure strict adherence to the security protocols established by an organization and empowers IT administrators to oversee, configure, and safeguard mobile devices from a remote location.

Among its primary responsibilities, MDM is set up by the IT staff to enforce security guidelines such as encryption, password prerequisites, and application whitelisting. These measures guarantee that all...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €14.99/month. Cancel anytime}