- Understanding Asset Security
-
By
Michael Gregg
- Aug 10, 2021
In this sample chapter from CISSP Exam Cram, 5th Edition, you will explore basic building blocks of any good security program.
|
- Policy-Based Decryption (Lesson 6 transcript from Upgrading to Red Hat Enterprise Linux (RHEL) 8 LiveLessons)
-
By
Sander van Vugt
- May 20, 2021
- In Lesson 6, Sander van Vugt explains policy-based decryption. Read the transcript.
|
- Security Assessment Techniques
-
By
Martin M. Weiss
- Feb 25, 2021
A number of tools and techniques are available to help organizations conduct security assessments. In this sample chapter from CompTIA Security+ SY0-601 Exam Cram, you will learn how a security information and event management (SIEM) system can help identify internal and external threats, monitor activity, conduct compliance reporting, and more.
|
- Mobile App Investigations
-
By
Darren R. Hayes
- Oct 1, 2020
In this sample chapter from A Practical Guide to Digital Forensics Investigations, 2nd Edition, you will explore the importance of mobile apps in investigations, learn how to perform a static and dynamic analysis, analyze SQLite databases, and more.
|
- Physical Interfaces and Cabling Types
-
By
Anthony J. Sequeira
- Aug 19, 2020
In this sample chapter from CCNA 200-301 Exam Cram, 6th Edition, you will review essential terms and components of the Network Fundamentals section of the CCNA 200-301 exam, including ethernet, copper media, unshielded twisted pair (UTP), fiber media, Cat 5e, Cat 6, Auto MDI-X, and PoE.
|
- Storing Data in AWS
-
By
Marko Sluga
- Jun 10, 2020
In this sample chapter from AWS Certified Developer - Associate (DVA-C01) Cert Guide, you will review content related to development with AWS Services and refactoring exam domains.
|
- Managing and Understanding the Boot Procedure
-
By
Sander van Vugt
- Mar 5, 2020
In this sample chapter from Red Hat RHCSA 8 Cert Guide: EX200, explore how the boot procedure on Red Hat Enterprise Linux is organized, including how to use Systemd targets to boot your Linux system into a specific state and how to apply changes to the GRUB 2 boot loader.
|
- SELinux and AppArmor
-
By
Ross Brunson, William "Bo" Rothwell
- Jan 10, 2020
In this sample chapter from CompTIA Linux+ XK0-004 Cert Guide, you will review available technologies that enable an administrator to add another layer of protection on top of regular file and directory permissions.
|
- Security and Compliance
-
By
Anthony J. Sequeira
- Dec 29, 2019
In this sample chapter from AWS Certified SysOps Administrator - Associate (SOA-C01) Cert Guide, take a deep dive into the Shared Responsibility Model, security best practices, and available access controls to help secure cloud-based solutions.
|
- Introduction to Computer Security
-
By
Chuck Easttom
- Nov 15, 2019
In this sample chapter from Computer Security Fundamentals, 4th Edition, you will learn how to identify the top threats to a network: security breaches, denial of service attacks, and malware.
|
- Security
-
By
Rick McDonald
- Nov 1, 2019
In this sample chapter from CompTIA A+ Core 1 (220-1001) and Core 2 (220-1002) Cert Guide, 5th Edition, you will review exam objectives related to security, including physical security measures, logical security concepts, wireless security protocols and authentication, social engineering threats and vulnerabilities, best practices to secure a workstation, and more.
|
- 220-1001 Practice Exam A
-
By
David L. Prowse
- Oct 30, 2019
Test your knowledge with a free set of test questions from CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002).
|
- File and directory permissions
-
By
William "Bo" Rothwell
- Oct 3, 2019
In this sample chapter from CompTIA Linux+ Portable Command Guide: All the commands for the CompTIA XK0-004 exam in one compact, portable resource, 2nd Edition, explore security commands and, given a scenario, apply or acquire the appropriate user and/or group permissions and ownership.
|
- Smartphones, Tablets, and Other Mobile Devices, Part 1
-
By
David L. Prowse
- Sep 1, 2019
In this sample chapter from CompTIA A+ Core 1 (220-1001) and Core 2 (220-1002) Exam Cram, learn how to compare and contrast characteristics of various types of mobile devices, and how to connect and configure accessories.
|
- Compare and Contrast Fundamental Data Types and Their Characteristics
-
By
Luke Leighton
- Aug 25, 2019
In this sample chapter from CompTIA IT Fundamentals+ FC0-U61 Cert Guide, you will learn how to compare and contrast fundamental data types and their characteristics: char, strings, numbers (integers and floats), and Boolean.
|
- Exploiting Local Host and Physical Security Vulnerabilities
-
By
Omar Santos, Ron Taylor
- Aug 24, 2019
In this sample chapter from CompTIA PenTest+ PT0-001 Cert Guide, you will learn how to take advantage of insecure services and protocol configurations during a penetration testing engagement.
|
- Exam Profile: Cisco 200-301 CCNA
-
By
Wendell Odom
- Aug 8, 2019
- This article provides an exam profile for the Cisco 200-301 CCNA exam. It describes question forms, trouble spots, hints for exam preparation, and recommendations for additional study resources. Find out here what you can expect to see on the exam, and how you can better prepare for it.
|
- Exam Profile: CompTIA A+ Core 1 (220-1001) & CompTIA A+ Core 2 (220-1002)
-
By
David L. Prowse
- Feb 26, 2019
- This article profiles the CompTIA A+ Core 1 (220-1001) and CompTIA A+ Core 2 (220-1002), which test competency in comprehensive vendor-neutral mobile devices, networking technology, hardware, virtualization and cloud computing, network troubleshooting, installing and configuring operating systems, expanded security, software troubleshooting, and operational procedures. The CompTIA A+ Core series focuses on expanded content on growing parts of the IT support role including an expansion of baseline security topics and a different approach to defining competency in operational procedures.
|
- Security Assessment and Testing
-
By
Robin Abernathy, Troy McMillan
- Jan 10, 2019
In this sample chapter form CISSP Cert Guide, 3rd Edition, you will review assessment and testing strategies, security control testing, collection of security process data, analysis and reporting of test outputs, and internal, external, and third-party audits.
|
- Physical and Environmental Security
-
By
Omar Santos
- Jan 9, 2019
In this sample chapter from Developing Cybersecurity Programs and Policies, 3rd Edition, you will explore design, obstacles, monitoring, and response as they relate to secure areas, equipment security, and environmental controls.
|