- Prepare for CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) test day
-
By
Dave Prowse
- Dec 17, 2022
This sample chapter from CompTIA A+ Practice Questions Exam Cram Core 1 (220-1101) and Core 2 (220-1102) shares tools and information to help you be successful when preparing for test day.
|
- Ranking Certifications (2016 Edition)
-
By
Ed Tittel, Mary Kyle
- Apr 25, 2016
- Employers look for and seek out certified IT professionals, but generally prefer candidates who possess both college degrees and specific certification credentials. Aspiring or active IT professionals can benefit from an informed evaluation of certifications in terms of the time commitment, cost, and other factors involved in earning such a credential vis-a-vis the ultimate financial or career advancement that such an investment can return. In this article, Ed Tittel and Mary Kyle look at one method for rating and ranking IT certifications.
|
- Remote Site Telephony and Branch Redundancy Options
-
By
William Alexander Hannah, Akhil Behl
- Mar 5, 2016
- Hannah and Behl introduce and explain the various options for deploying remote site telephony solutions.
|
- Risk Management
-
By
Robert Shimonski, Martin M. Weiss
- Aug 5, 2024
This chapter covers the following official Security+ exam objective: 5.2 Explain elements of the risk management process. You will learn the steps of the process, from risk identification and assessment, to risk management strategies and risk reporting.
|
- Routing Technologies and Bandwidth Management
-
By
Anthony J. Sequeira
- Oct 28, 2021
In this sample chapter from CompTIA Network+ N10-008 Cert Guide, you will explore a variety of approaches for performing routing, including dynamic routing, static routing, and default routing. The chapter also breaks down the various categories of routing protocols and provides specific examples of each.
|
- Securing the Enterprise Architecture by Implementing Data Security Techniques
-
By
Troy McMillan
- Sep 24, 2022
This sample chapter from CompTIA Advanced Security Practitioner (CASP+) CAS-004 Cert Guide covers CAS-004 Objective 1.4: Given a scenario, implement data security techniques for securing enterprise architecture.
|
- Security
-
By
Rick McDonald
- Nov 1, 2019
In this sample chapter from CompTIA A+ Core 1 (220-1001) and Core 2 (220-1002) Cert Guide, 5th Edition, you will review exam objectives related to security, including physical security measures, logical security concepts, wireless security protocols and authentication, social engineering threats and vulnerabilities, best practices to secure a workstation, and more.
|
- Security and Compliance
-
By
Anthony J. Sequeira
- Dec 29, 2019
In this sample chapter from AWS Certified SysOps Administrator - Associate (SOA-C01) Cert Guide, take a deep dive into the Shared Responsibility Model, security best practices, and available access controls to help secure cloud-based solutions.
|
- Security Assessment and Testing
-
By
Robin Abernathy, Troy McMillan
- Jan 10, 2019
In this sample chapter from CISSP Cert Guide, 3rd Edition, you will review assessment and testing strategies, security control testing, collection of security process data, analysis and reporting of test outputs, and internal, external, and third-party audits.
|
- Security Assessment Techniques
-
By
Martin M. Weiss
- Feb 25, 2021
A number of tools and techniques are available to help organizations conduct security assessments. In this sample chapter from CompTIA Security+ SY0-601 Exam Cram, you will learn how a security information and event management (SIEM) system can help identify internal and external threats, monitor activity, conduct compliance reporting, and more.
|
- Security Concepts
-
By
Joseph Mlodzianowski, Nick Kelly, Eddie Mendonca
- Apr 17, 2024
In this sample chapter, you will learn fundamental concepts of common threats against on-premises and cloud environments, and the impact of moving to the cloud has on your security threat model. You will also learn about data breaches, insecure APIs, DoS and DDoS, and VPN types. This chapter covers SCOR 350-701 exam objectives.
|
- SELinux and AppArmor
-
By
Ross Brunson, William "Bo" Rothwell
- Jan 10, 2020
In this sample chapter from CompTIA Linux+ XK0-004 Cert Guide, you will review available technologies that enable an administrator to add another layer of protection on top of regular file and directory permissions.
|
- Starting a Project and Integration
-
By
Gregory M. Horine, Asad E. Haque
- Jul 3, 2023
In this sample chapter from Project Management Professional (PMP)® Cert Guide, you will learn the key processes, tools, and artifacts for starting a project and integration management, from starting a project to monitoring it.
|
- Storage, Part 1
-
By
John A. Davis, Steve Baca, Owen Thomas
- May 30, 2016
- Learn how to set up and use NFS, iSCSI, FC, and FCoE protocols.
|
- Storing Data in AWS
-
By
Marko Sluga
- Jun 10, 2020
In this sample chapter from AWS Certified Developer - Associate (DVA-C01) Cert Guide, you will review content related to development with AWS Services and refactoring exam domains.
|
- Summarizing the Techniques Used in Security Assessments
-
By
Joseph Mlodzianowski, Omar Santos, Ron Taylor
- Oct 19, 2021
In this sample chapter from CompTIA Security+ SY0-601 Cert Guide, 5th Edition, you will learn how the threat-hunting process leverages threat intelligence.
|
- The Basic Uses of TCP/IP Route Maps
-
By
Jeff Doyle, Jennifer Carroll
- Dec 9, 2005
- Route maps are similar to access lists; they both have criteria for matching the details of certain packets and an action of permitting or denying those packets. This chapter explains the basics of Route Maps. Included are sample exercises to help you practice administration and use of Route Maps.
|
- The OSI Reference Model
-
By
Anthony Sequeira
- Apr 6, 2018
In this sample chapter from CompTIA Network+ N10-007 Cert Guide, explore the seven layers of the Open Systems Interconnection (OSI) reference model.
|
- The Risk Management Plan (RMP)
-
By
Carl Pritchard
- Jul 3, 2023
In this sample chapter from Risk Management Professional (PMI-RMP)® Cert Guide, you will learn the structure and elements of a risk management plan, as well as the project manager's (or risk manager's) roles in developing the RMP.
|
- Threats to Security
-
By
Mari Galloway, Amena Jamali
- Aug 5, 2024
In this chapter, we will look at the various types of threats to security and why it’s essential to understand them, common threat types and mitigations, advanced techniques used by threat actors, and ways to discover and mitigate vulnerabilities. Coverage includes DDoS, IDS, and IPS, based on Certified in Cybersecurity exam objective 4.2.
|