- DHCP Snooping: Basic Concepts and Configuration
-
By
Mason Harris
- Feb 9, 2016
- Mason Harris, CCIE #5916 and co-author of CCNA Security 210-260 Complete Video Course, provides a streamlined introduction to DHCP snooping, a barrier to denial-of-service and man-in-the-middle attacks on organizational networks.
|
- Dynamic Multipoint Virtual Private Network (DMVPN)
-
By
Steven Chimes, Joseph Muniz, James Risler
- Jan 23, 2022
Dynamic Multipoint Virtual Private Network (DMVPN) enables different branch locations to communicate in a direct and secure manner using either a public or a private network. In this sample chapter from CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide, you will explore DMVPN core concepts, risks, design considerations, and more.
|
- Exam Profile: Cisco 200-301 CCNA
-
By
Wendell Odom
- Aug 8, 2019
- This article provides an exam profile for the Cisco 200-301 CCNA exam. It describes question forms, trouble spots, hints for exam preparation, and recommendations for additional study resources. Find out here what you can expect to see on the exam, and how you can better prepare for it.
|
- Exam Profile: CompTIA A+ 220-901 & 220-902
-
By
David L. Prowse
- Jun 15, 2016
- This article profiles the CompTIA A+ exams (220-901 & 220-902), which test competency in comprehensive vendor-neutral PC hardware and peripherals, mobile device hardware, networking and troubleshooting hardware and network connectivity issues, installing and configuring operating systems including Windows, iOS, Android, Apple OS X and Linux, security, cloud computing fundamentals, operational procedures and communication skills. It describes question forms, trouble spots, hints for exam preparation, and recommendations for additional study resources.
|
- Exam Profile: CompTIA A+ Core 1 (220-1001) & CompTIA A+ Core 2 (220-1002)
-
By
David L. Prowse
- Feb 26, 2019
- This article profiles the CompTIA A+ Core 1 (220-1001) and CompTIA A+ Core 2 (220-1002), which test competency in comprehensive vendor-neutral mobile devices, networking technology, hardware, virtualization and cloud computing, network troubleshooting, installing and configuring operating systems, expanded security, software troubleshooting, and operational procedures. The CompTIA A+ Core series focuses on expanded content on growing parts of the IT support role including an expansion of baseline security topics and a different approach to defining competency in operational procedures.
|
- Exam Profile: CompTIA Linux+ (LX0-103 and LX0-104) and LPIC-1 (101-400 and 102-400)
-
By
Sean Walberg
- Nov 4, 2015
- Sean Walberg, co-author of CompTIA Linux+ / LPIC-1 Cert Guide, provides important details you need to know to prepare for taking the Linux exams: CompTIA Linux+ (powered by LPI) LX0-103 and LX0-104, or the LPIC-1 101-400 and 102-400 exams.
|
- Exam Profile: CompTIA's New Security+ SY0-401 Exam
-
By
Diane Barrett
- Aug 4, 2014
- This article describes the new CompTIA Security+ SY0-401 exam, including the objectives, preparation hints, and study resources.
|
- Exploiting Local Host and Physical Security Vulnerabilities
-
By
Omar Santos, Ron Taylor
- Aug 24, 2019
In this sample chapter from CompTIA PenTest+ PT0-001 Cert Guide, you will learn how to take advantage of insecure services and protocol configurations during a penetration testing engagement.
|
- File and directory permissions
-
By
William "Bo" Rothwell
- Oct 3, 2019
In this sample chapter from CompTIA Linux+ Portable Command Guide: All the commands for the CompTIA XK0-004 exam in one compact, portable resource, 2nd Edition, explore security commands and, given a scenario, apply or acquire the appropriate user and/or group permissions and ownership.
|
- Footprinting, Reconnaissance, and Scanning
-
By
Michael Gregg, Omar Santos
- Mar 10, 2022
In this sample chapter from CEH Certified Ethical Hacker Cert Guide, 4th Edition, you will review a number of ways individuals can attempt to passively gain information about an organization and interactive scanning techniques.
|
- Hacking AI Systems
-
By
Omar Santos, Petar Radanliev
- Apr 17, 2024
|
- Highly Available and Fault-Tolerant Architectures
-
By
Mark Wilkins
- Aug 17, 2021
In this sample chapter from AWS Certified Solutions Architect - Associate (SAA-C02) Cert Guide, you will explore topics related to exam Domain 1: Design Resilient Architectures, including Disaster Recovery and Business Continuity, Automating AWS Architecture, and Elastic Beanstalk.
|
- Impact of AI in Other Emerging Technologies
-
By
Omar Santos, Hazim Dahir, Samer Salam
- Apr 17, 2024
|
- Implementing Scalability and Elasticity
-
By
Rick Crisci, William Rothwell, Marko Sluga
- Oct 17, 2022
In this chapter from AWS Certified SysOps Administrator - Associate (SOA-C02) Exam Cram, you will examine scaling, request offloading, and loose coupling as strategies that can enable an application to meet demand while maintaining cost-effectiveness.
|
- Industrial Espionage in Cyberspace
-
By
William Chuck Easttom
- Jun 26, 2023
In this sample chapter from Computer Security Fundamentals, 5th Edition look into the hidden world of industrial espionage and its dangers. From trade secrets to cyber attacks, corporations face a rising threat. Explore real-world cases and learn how to safeguard your organization.
|
- Information Security Principles of Success
-
By
Jim Breithaupt, Mark S. Merkow
- Jul 4, 2014
- This chapter introduces these key information security principles and concepts, showing how the best security specialists combine their practical knowledge of computers and networks with general theories about security, technology, and human nature.
|
- Installing and Configuring Windows Server 2012 R2
-
By
Don Poulton, David Camardella
- Sep 30, 2014
- This chapter from MCSA 70-410 Cert Guide R2: Installing and Configuring Windows Server 2012 focuses on installing Windows Server 2012 R2 in its basic configurations and introduces you to basic server configuration actions that you should be familiar with before you undertake any advanced actions.
|
- Introduction to Computer Security
-
By
Chuck Easttom
- Nov 15, 2019
In this sample chapter from Computer Security Fundamentals, 4th Edition, you will learn how to identify the top threats to a network: security breaches, denial of service attacks, and malware.
|
- Introduction to Help Desk Support Roles
-
By
Darril Gibson
- Nov 19, 2014
- This chapter from Effective Help Desk Specialist Skills introduces the support center, help desk professionals, users, and incidents (or problems) in four major sections: Understanding the Support Center,
The Role of the Help Desk Professional, Understanding Users, and Typical Incident Process.
|
- Introduction to the World of IT
-
By
Christopher Lee, Cheryl A. Schmidt
- Oct 25, 2022
Many IT roles require detailed knowledge of PC hardware and software. In this sample chapter from Complete A+ Guide to IT Hardware and Software: CompTIA A+ Exams 220-1101 & 220-1102, 9th Edition, you will explore what skills a computer technician needs to perform well on the job, plus exam preparation tips for the CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102).
|