Articles

1421 Items

Sort by Date | Title

Data Security and Compliance Controls in Cloud Environments
By William Rothwell
Feb 10, 2022

In this sample chapter from CompTIA Cloud+ CV0-003 Exam Cram, you will learn how to apply data security and compliance controls in cloud environments.

Cloud, Mobile, and IoT Security
By Omar Santos
Jan 28, 2022

In this chapter from CompTIA PenTest+ PT0-002 Cert Guide, 2nd Edition, you will learn about different attacks against cloud, mobile, and IoT implementations.

Denial of Service and Session Hijacking
By William Easttom
Jan 23, 2022

In this sample chapter from Certified Ethical Hacker (CEH) Exam Cram, you will explore types of protocol attacks, common tools used for denial of service (DoS) attacks, and countermeasures.

Dynamic Multipoint Virtual Private Network (DMVPN)
By Steven Chimes, Joseph Muniz, James Risler
Jan 23, 2022

Dynamic Multipoint Virtual Private Network (DMVPN) enables different branch locations to communicate in a direct and secure manner using either a public or a private network. In this sample chapter from CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide, you will explore DMVPN core concepts, risks, design considerations, and more.

Clusters and High Availability
By Steve Baca, John A. Davis, Owen Thomas
Jan 8, 2022

In this sample chapter from VCP-DCV for vSphere 7.x (Exam 2V0-21.20) Official Cert Guide, 4th Edition, you will explore cluster concepts, the Distributed Resources Scheduler (DRS), vSphere High Availability (HA), and other resource management and availability features.

Managing and Understanding the Boot Procedure
By Sander van Vugt
Nov 18, 2021

In this sample chapter from Red Hat RHCSA 8 Cert Guide: EX200, 2nd Edition, you will learn about Systemd targets and how the boot procedure on Red Hat Enterprise Linux is organized.

Routing Technologies and Bandwidth Management
By Anthony J. Sequeira
Oct 28, 2021

In this sample chapter from CompTIA Network+ N10-008 Cert Guide, you will explore a variety of approaches for performing routing, including dynamic routing, static routing, and default routing. The chapter also breaks down the various categories of routing protocols and provides specific examples of each.

Summarizing the Techniques Used in Security Assessments
By Joseph Mlodzianowski, Omar Santos, Ron Taylor
Oct 19, 2021

In this sample chapter from CompTIA Security+ SY0-601 Cert Guide, 5th Edition, you will learn how the threat-hunting process leverages threat intelligence.

Network Implementations
By Emmett Dulaney
Oct 12, 2021

In this sample chapter from CompTIA Network+ N10-008 Exam Cram, 7th Edition, you will learn how to compare and contrast various devices, their features, and their appropriate placement on the network.

Highly Available and Fault-Tolerant Architectures
By Mark Wilkins
Aug 17, 2021

In this sample chapter from AWS Certified Solutions Architect - Associate (SAA-C02) Cert Guide, you will explore topics related to exam Domain 1: Design Resilient Architectures, including Disaster Recovery and Business Continuity, Automating AWS Architecture, and Elastic Beanstalk.

Understanding Asset Security
By Michael Gregg
Aug 10, 2021

In this sample chapter from CISSP Exam Cram, 5th Edition, you will explore basic building blocks of any good security program.

Policy-Based Decryption (Lesson 6 transcript from Upgrading to Red Hat Enterprise Linux (RHEL) 8 LiveLessons)
By Sander van Vugt
May 20, 2021
In Lesson 6, Sander van Vugt explains policy-based decryption. Read the transcript.
Security Assessment Techniques
By Martin M. Weiss
Feb 25, 2021

A number of tools and techniques are available to help organizations conduct security assessments. In this sample chapter from CompTIA Security+ SY0-601 Exam Cram, you will learn how a security information and event management (SIEM) system can help identify internal and external threats, monitor activity, conduct compliance reporting, and more.

Mobile App Investigations
By Darren R. Hayes
Oct 1, 2020

In this sample chapter from A Practical Guide to Digital Forensics Investigations, 2nd Edition, you will explore the importance of mobile apps in investigations, learn how to perform a static and dynamic analysis, analyze SQLite databases, and more.

Physical Interfaces and Cabling Types
By Anthony J. Sequeira
Aug 19, 2020

In this sample chapter from CCNA 200-301 Exam Cram, 6th Edition, you will review essential terms and components of the Network Fundamentals section of the CCNA 200-301 exam, including ethernet, copper media, unshielded twisted pair (UTP), fiber media, Cat 5e, Cat 6, Auto MDI-X, and PoE.

Storing Data in AWS
By Marko Sluga
Jun 10, 2020

In this sample chapter from AWS Certified Developer - Associate (DVA-C01) Cert Guide, you will review content related to development with AWS Services and refactoring exam domains.

Managing and Understanding the Boot Procedure
By Sander van Vugt
Mar 5, 2020

In this sample chapter from Red Hat RHCSA 8 Cert Guide: EX200, explore how the boot procedure on Red Hat Enterprise Linux is organized, including how to use Systemd targets to boot your Linux system into a specific state and how to apply changes to the GRUB 2 boot loader.

SELinux and AppArmor
By Ross Brunson, William "Bo" Rothwell
Jan 10, 2020

In this sample chapter from CompTIA Linux+ XK0-004 Cert Guide, you will review available technologies that enable an administrator to add another layer of protection on top of regular file and directory permissions.

Security and Compliance
By Anthony J. Sequeira
Dec 29, 2019

In this sample chapter from AWS Certified SysOps Administrator - Associate (SOA-C01) Cert Guide, take a deep dive into the Shared Responsibility Model, security best practices, and available access controls to help secure cloud-based solutions.

Introduction to Computer Security
By Chuck Easttom
Nov 15, 2019

In this sample chapter from Computer Security Fundamentals, 4th Edition, you will learn how to identify the top threats to a network: security breaches, denial of service attacks, and malware.

< Prev Page 1 2 3 4 5 Next >