Articles

1431 Items

Sort by Date | Title

Understanding Asset Security
By Michael Gregg
Aug 10, 2021

In this sample chapter from CISSP Exam Cram, 5th Edition, you will explore basic building blocks of any good security program.

Policy-Based Decryption (Lesson 6 transcript from Upgrading to Red Hat Enterprise Linux (RHEL) 8 LiveLessons)
By Sander van Vugt
May 20, 2021
In Lesson 6, Sander van Vugt explains policy-based decryption. Read the transcript.
Security Assessment Techniques
By Martin M. Weiss
Feb 25, 2021

A number of tools and techniques are available to help organizations conduct security assessments. In this sample chapter from CompTIA Security+ SY0-601 Exam Cram, you will learn how a security information and event management (SIEM) system can help identify internal and external threats, monitor activity, conduct compliance reporting, and more.

Mobile App Investigations
By Darren R. Hayes
Oct 1, 2020

In this sample chapter from A Practical Guide to Digital Forensics Investigations, 2nd Edition, you will explore the importance of mobile apps in investigations, learn how to perform a static and dynamic analysis, analyze SQLite databases, and more.

Physical Interfaces and Cabling Types
By Anthony J. Sequeira
Aug 19, 2020

In this sample chapter from CCNA 200-301 Exam Cram, 6th Edition, you will review essential terms and components of the Network Fundamentals section of the CCNA 200-301 exam, including ethernet, copper media, unshielded twisted pair (UTP), fiber media, Cat 5e, Cat 6, Auto MDI-X, and PoE.

Storing Data in AWS
By Marko Sluga
Jun 10, 2020

In this sample chapter from AWS Certified Developer - Associate (DVA-C01) Cert Guide, you will review content related to development with AWS Services and refactoring exam domains.

Managing and Understanding the Boot Procedure
By Sander van Vugt
Mar 5, 2020

In this sample chapter from Red Hat RHCSA 8 Cert Guide: EX200, explore how the boot procedure on Red Hat Enterprise Linux is organized, including how to use Systemd targets to boot your Linux system into a specific state and how to apply changes to the GRUB 2 boot loader.

SELinux and AppArmor
By Ross Brunson, William "Bo" Rothwell
Jan 10, 2020

In this sample chapter from CompTIA Linux+ XK0-004 Cert Guide, you will review available technologies that enable an administrator to add another layer of protection on top of regular file and directory permissions.

Security and Compliance
By Anthony J. Sequeira
Dec 29, 2019

In this sample chapter from AWS Certified SysOps Administrator - Associate (SOA-C01) Cert Guide, take a deep dive into the Shared Responsibility Model, security best practices, and available access controls to help secure cloud-based solutions.

Introduction to Computer Security
By Chuck Easttom
Nov 15, 2019

In this sample chapter from Computer Security Fundamentals, 4th Edition, you will learn how to identify the top threats to a network: security breaches, denial of service attacks, and malware.

Security
By Rick McDonald
Nov 1, 2019

In this sample chapter from CompTIA A+ Core 1 (220-1001) and Core 2 (220-1002) Cert Guide, 5th Edition, you will review exam objectives related to security, including physical security measures, logical security concepts, wireless security protocols and authentication, social engineering threats and vulnerabilities, best practices to secure a workstation, and more.

220-1001 Practice Exam A
By David L. Prowse
Oct 30, 2019

Test your knowledge with a free set of test questions from CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002).

File and directory permissions
By William "Bo" Rothwell
Oct 3, 2019

In this sample chapter from CompTIA Linux+ Portable Command Guide: All the commands for the CompTIA XK0-004 exam in one compact, portable resource, 2nd Edition, explore security commands and, given a scenario, apply or acquire the appropriate user and/or group permissions and ownership.

Smartphones, Tablets, and Other Mobile Devices, Part 1
By David L. Prowse
Sep 1, 2019

In this sample chapter from CompTIA A+ Core 1 (220-1001) and Core 2 (220-1002) Exam Cram, learn how to compare and contrast characteristics of various types of mobile devices, and how to connect and configure accessories.

Compare and Contrast Fundamental Data Types and Their Characteristics
By Luke Leighton
Aug 25, 2019

In this sample chapter from CompTIA IT Fundamentals+ FC0-U61 Cert Guide, you will learn how to compare and contrast fundamental data types and their characteristics: char, strings, numbers (integers and floats), and Boolean.

Exploiting Local Host and Physical Security Vulnerabilities
By Omar Santos, Ron Taylor
Aug 24, 2019

In this sample chapter from CompTIA PenTest+ PT0-001 Cert Guide, you will learn how to take advantage of insecure services and protocol configurations during a penetration testing engagement.

Exam Profile: Cisco 200-301 CCNA
By Wendell Odom
Aug 8, 2019
This article provides an exam profile for the Cisco 200-301 CCNA exam. It describes question forms, trouble spots, hints for exam preparation, and recommendations for additional study resources. Find out here what you can expect to see on the exam, and how you can better prepare for it.
Exam Profile: CompTIA A+ Core 1 (220-1001) & CompTIA A+ Core 2 (220-1002)
By David L. Prowse
Feb 26, 2019
This article profiles the CompTIA A+ Core 1 (220-1001) and CompTIA A+ Core 2 (220-1002), which test competency in comprehensive vendor-neutral mobile devices, networking technology, hardware, virtualization and cloud computing, network troubleshooting, installing and configuring operating systems, expanded security, software troubleshooting, and operational procedures. The CompTIA A+ Core series focuses on expanded content on growing parts of the IT support role including an expansion of baseline security topics and a different approach to defining competency in operational procedures.
Security Assessment and Testing
By Robin Abernathy, Troy McMillan
Jan 10, 2019

In this sample chapter form CISSP Cert Guide, 3rd Edition, you will review assessment and testing strategies, security control testing, collection of security process data, analysis and reporting of test outputs, and internal, external, and third-party audits.

Physical and Environmental Security
By Omar Santos
Jan 9, 2019

In this sample chapter from Developing Cybersecurity Programs and Policies, 3rd Edition, you will explore design, obstacles, monitoring, and response as they relate to secure areas, equipment security, and environmental controls.

<< < Prev Page 1 2 3 4 5 Next >