Articles

101 Items

Sort by Date | Title

Prepare for CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) test day
By Dave Prowse
Dec 17, 2022

This sample chapter from CompTIA A+ Practice Questions Exam Cram Core 1 (220-1101) and Core 2 (220-1102) shares tools and information to help you be successful when preparing for test day.

Ranking Certifications (2016 Edition)
By Ed Tittel, Mary Kyle
Apr 25, 2016
Employers look for and seek out certified IT professionals, but generally prefer candidates who possess both college degrees and specific certification credentials. Aspiring or active IT professionals can benefit from an informed evaluation of certifications in terms of the time commitment, cost, and other factors involved in earning such a credential vis-a-vis the ultimate financial or career advancement that such an investment can return. In this article, Ed Tittel and Mary Kyle look at one method for rating and ranking IT certifications.
Remote Site Telephony and Branch Redundancy Options
By William Alexander Hannah, Akhil Behl
Mar 5, 2016
Hannah and Behl introduce and explain the various options for deploying remote site telephony solutions.
Risk Management
By Robert Shimonski, Martin M. Weiss
Aug 5, 2024

This chapter covers the following official Security+ exam objective: 5.2 Explain elements of the risk management process. You will learn the steps of the process, from risk identification and assessment, to risk management strategies and risk reporting.

Routing Technologies and Bandwidth Management
By Anthony J. Sequeira
Oct 28, 2021

In this sample chapter from CompTIA Network+ N10-008 Cert Guide, you will explore a variety of approaches for performing routing, including dynamic routing, static routing, and default routing. The chapter also breaks down the various categories of routing protocols and provides specific examples of each.

Securing the Enterprise Architecture by Implementing Data Security Techniques
By Troy McMillan
Sep 24, 2022

This sample chapter from CompTIA Advanced Security Practitioner (CASP+) CAS-004 Cert Guide covers CAS-004 Objective 1.4: Given a scenario, implement data security techniques for securing enterprise architecture.

Security
By Rick McDonald
Nov 1, 2019

In this sample chapter from CompTIA A+ Core 1 (220-1001) and Core 2 (220-1002) Cert Guide, 5th Edition, you will review exam objectives related to security, including physical security measures, logical security concepts, wireless security protocols and authentication, social engineering threats and vulnerabilities, best practices to secure a workstation, and more.

Security and Compliance
By Anthony J. Sequeira
Dec 29, 2019

In this sample chapter from AWS Certified SysOps Administrator - Associate (SOA-C01) Cert Guide, take a deep dive into the Shared Responsibility Model, security best practices, and available access controls to help secure cloud-based solutions.

Security Assessment and Testing
By Robin Abernathy, Troy McMillan
Jan 10, 2019

In this sample chapter from CISSP Cert Guide, 3rd Edition, you will review assessment and testing strategies, security control testing, collection of security process data, analysis and reporting of test outputs, and internal, external, and third-party audits.

Security Assessment Techniques
By Martin M. Weiss
Feb 25, 2021

A number of tools and techniques are available to help organizations conduct security assessments. In this sample chapter from CompTIA Security+ SY0-601 Exam Cram, you will learn how a security information and event management (SIEM) system can help identify internal and external threats, monitor activity, conduct compliance reporting, and more.

Security Concepts
By Joseph Mlodzianowski, Nick Kelly, Eddie Mendonca
Apr 17, 2024

In this sample chapter, you will learn fundamental concepts of common threats against on-premises and cloud environments, and the impact of moving to the cloud has on your security threat model. You will also learn about data breaches, insecure APIs, DoS and DDoS, and VPN types. This chapter covers SCOR 350-701 exam objectives.

SELinux and AppArmor
By Ross Brunson, William "Bo" Rothwell
Jan 10, 2020

In this sample chapter from CompTIA Linux+ XK0-004 Cert Guide, you will review available technologies that enable an administrator to add another layer of protection on top of regular file and directory permissions.

Starting a Project and Integration
By Gregory M. Horine, Asad E. Haque
Jul 3, 2023

In this sample chapter from Project Management Professional (PMP)® Cert Guide, you will learn the key processes, tools, and artifacts for starting a project and integration management, from starting a project to monitoring it.

Storage, Part 1
By John A. Davis, Steve Baca, Owen Thomas
May 30, 2016
Learn how to set up and use NFS, iSCSI, FC, and FCoE protocols.
Storing Data in AWS
By Marko Sluga
Jun 10, 2020

In this sample chapter from AWS Certified Developer - Associate (DVA-C01) Cert Guide, you will review content related to development with AWS Services and refactoring exam domains.

Summarizing the Techniques Used in Security Assessments
By Joseph Mlodzianowski, Omar Santos, Ron Taylor
Oct 19, 2021

In this sample chapter from CompTIA Security+ SY0-601 Cert Guide, 5th Edition, you will learn how the threat-hunting process leverages threat intelligence.

The Basic Uses of TCP/IP Route Maps
By Jeff Doyle, Jennifer Carroll
Dec 9, 2005
Route maps are similar to access lists; they both have criteria for matching the details of certain packets and an action of permitting or denying those packets. This chapter explains the basics of Route Maps. Included are sample exercises to help you practice administration and use of Route Maps.
The OSI Reference Model
By Anthony Sequeira
Apr 6, 2018

In this sample chapter from CompTIA Network+ N10-007 Cert Guide, explore the seven layers of the Open Systems Interconnection (OSI) reference model.

The Risk Management Plan (RMP)
By Carl Pritchard
Jul 3, 2023

In this sample chapter from Risk Management Professional (PMI-RMP)® Cert Guide, you will learn the structure and elements of a risk management plan, as well as the project manager's (or risk manager's) roles in developing the RMP.

Threats to Security
By Mari Galloway, Amena Jamali
Aug 5, 2024

In this chapter, we will look at the various types of threats to security and why it’s essential to understand them, common threat types and mitigations, advanced techniques used by threat actors, and ways to discover and mitigate vulnerabilities. Coverage includes DDoS, IDS, and IPS, based on Certified in Cybersecurity exam objective 4.2.

<< < Prev Page 2 3 4 5 6 Next >