- Routing Technologies and Bandwidth Management
-
By
Anthony J. Sequeira
- Oct 28, 2021
In this sample chapter from CompTIA Network+ N10-008 Cert Guide, you will explore a variety of approaches for performing routing, including dynamic routing, static routing, and default routing. The chapter also breaks down the various categories of routing protocols and provides specific examples of each.
|
- Securing the Enterprise Architecture by Implementing Data Security Techniques
-
By
Troy McMillan
- Sep 24, 2022
This sample chapter from CompTIA Advanced Security Practitioner (CASP+) CAS-004 Cert Guide covers CAS-004 Objective 1.4: Given a scenario, implement data security techniques for securing enterprise architecture.
|
- Security
-
By
Rick McDonald
- Nov 1, 2019
In this sample chapter from CompTIA A+ Core 1 (220-1001) and Core 2 (220-1002) Cert Guide, 5th Edition, you will review exam objectives related to security, including physical security measures, logical security concepts, wireless security protocols and authentication, social engineering threats and vulnerabilities, best practices to secure a workstation, and more.
|
- Security and Compliance
-
By
Anthony J. Sequeira
- Dec 29, 2019
In this sample chapter from AWS Certified SysOps Administrator - Associate (SOA-C01) Cert Guide, take a deep dive into the Shared Responsibility Model, security best practices, and available access controls to help secure cloud-based solutions.
|
- Security Assessment and Testing
-
By
Robin Abernathy, Troy McMillan
- Jan 10, 2019
In this sample chapter from CISSP Cert Guide, 3rd Edition, you will review assessment and testing strategies, security control testing, collection of security process data, analysis and reporting of test outputs, and internal, external, and third-party audits.
|
- Security Assessment Techniques
-
By
Martin M. Weiss
- Feb 25, 2021
A number of tools and techniques are available to help organizations conduct security assessments. In this sample chapter from CompTIA Security+ SY0-601 Exam Cram, you will learn how a security information and event management (SIEM) system can help identify internal and external threats, monitor activity, conduct compliance reporting, and more.
|
- Security Concepts
-
By
Joseph Mlodzianowski, Nick Kelly, Eddie Mendonca
- Apr 17, 2024
In this sample chapter, you will learn fundamental concepts of common threats against on-premises and cloud environments, and the impact of moving to the cloud has on your security threat model. You will also learn about data breaches, insecure APIs, DoS and DDoS, and VPN types. This chapter covers SCOR 350-701 exam objectives.
|
- SELinux and AppArmor
-
By
Ross Brunson, William "Bo" Rothwell
- Jan 10, 2020
In this sample chapter from CompTIA Linux+ XK0-004 Cert Guide, you will review available technologies that enable an administrator to add another layer of protection on top of regular file and directory permissions.
|
- Starting a Project and Integration
-
By
Gregory M. Horine, Asad E. Haque
- Jul 3, 2023
In this sample chapter from Project Management Professional (PMP)® Cert Guide, you will learn the key processes, tools, and artifacts for starting a project and integration management, from starting a project to monitoring it.
|
- Storage, Part 1
-
By
John A. Davis, Steve Baca, Owen Thomas
- May 30, 2016
- Learn how to set up and use NFS, iSCSI, FC, and FCoE protocols.
|
- Storing Data in AWS
-
By
Marko Sluga
- Jun 10, 2020
In this sample chapter from AWS Certified Developer - Associate (DVA-C01) Cert Guide, you will review content related to development with AWS Services and refactoring exam domains.
|
- Summarizing the Techniques Used in Security Assessments
-
By
Joseph Mlodzianowski, Omar Santos, Ron Taylor
- Oct 19, 2021
In this sample chapter from CompTIA Security+ SY0-601 Cert Guide, 5th Edition, you will learn how the threat-hunting process leverages threat intelligence.
|
- The Basic Uses of TCP/IP Route Maps
-
By
Jeff Doyle, Jennifer Carroll
- Dec 9, 2005
- Route maps are similar to access lists; they both have criteria for matching the details of certain packets and an action of permitting or denying those packets. This chapter explains the basics of Route Maps. Included are sample exercises to help you practice administration and use of Route Maps.
|
- The OSI Reference Model
-
By
Anthony Sequeira
- Apr 6, 2018
In this sample chapter from CompTIA Network+ N10-007 Cert Guide, explore the seven layers of the Open Systems Interconnection (OSI) reference model.
|
- The Risk Management Plan (RMP)
-
By
Carl Pritchard
- Jul 3, 2023
In this sample chapter from Risk Management Professional (PMI-RMP)® Cert Guide, you will learn the structure and elements of a risk management plan, as well as the project manager's (or risk manager's) roles in developing the RMP.
|
- Threats to Security
-
By
Mari Galloway, Amena Jamali
- Aug 5, 2024
In this chapter, we will look at the various types of threats to security and why it’s essential to understand them, common threat types and mitigations, advanced techniques used by threat actors, and ways to discover and mitigate vulnerabilities. Coverage includes DDoS, IDS, and IPS, based on Certified in Cybersecurity exam objective 4.2.
|
- Troubleshooting Methods for Cisco IP Networks
-
By
Amir Ranjbar
- Jan 14, 2015
- This chapter from Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) Foundation Learning Guide: (CCNP TSHOOT 300-135) defines troubleshooting and troubleshooting principles. Next, six different troubleshooting approaches are described. The third section of this chapter presents a troubleshooting example based on each of the six troubleshooting approaches.
|
- Understanding Asset Security
-
By
Michael Gregg
- Aug 10, 2021
In this sample chapter from CISSP Exam Cram, 5th Edition, you will explore basic building blocks of any good security program.
|
- Understanding Change Management's Security Impact
-
By
Lewis Heuermann
- Aug 5, 2024
This chapter examines the critical role of change management processes in fortifying an organization’s cybersecurity posture. Change management minimizes unplanned outages due to unauthorized alterations by helping to manage cybersecurity and operational risks.
|
- Understanding Common Techniques for Data Query Optimization and Testing
-
By
Akhil Behl, Siva G Subramanian
- Jun 26, 2023
In this sample chapter from CompTIA Data+ DA0-001 Exam Cram discover the secrets to maximizing the efficiency of your data queries. Dive into the world of query optimization, execution plans, parametrization, indexing, temporary tables, and subsets of records.
|