Trending Bestseller

CompTIA Security+ SY0-401 Cert Guide, Academic Edition

No reviews yet Write a Review
Digital (on physical carrier)
$75.94
Hurry up! Current stock:
<p style="MARGIN: 0px">This is the eBook version of the print title. Note that the eBook does not provide access to the practice test software that accompanies the print book. Access to the videos and exercises is available through product registration at Pearson IT Certification; or see instructions in back pages of your eBook.</p> <p style="MARGIN: 0px">Learn, prepare, and practice for CompTIA Security+ SY0-401 exam success with this <i>CompTIA Authorized Cert Guide, Academic Edition </i>from Pearson IT Certification, a leader in IT Certification learning and a CompTIA Authorized Platinum Partner. The DVD features three complete practice exams, complete video solutions to 31 hands-on labs, plus 31 interactive flash-based simulations that include drag-and-drop and matching to reinforce the learning.</p> <ul> <li>Master CompTIA’s Security+ SY0-401 exam topics </li> <li>Assess your knowledge with chapter-ending quizzes </li> <li>Reinforce your knowledge of key concepts with chapter review activities </li> <li>Practice with realistic exam questions on the DVD </li> <li>Includes complete video solutions to 31 hands-on labs </li> <li>Plus 31 interactive simulations on key exam topics</li> </ul> <p style="MARGIN: 0px"><i>CompTIA Security+ SY0-401 Authorized Cert Guide, Academic Edition</i> includes video solutions to the hands-on labs, practice tests, and interactive simulations that let the reader learn by doing. Best-selling author and expert instructor David L. Prowse shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.</p> <p style="MARGIN: 0px">The book presents you with an organized test preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Chapter review activities help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your approach to passing the exam.</p> <p style="MARGIN: 0px">The companion Academic Edition DVD contains the powerful Pearson IT Certification Practice Test engine, with three complete practice exams and hundreds of exam-realistic questions. The assessment engine offers you a wealth of customization options and reporting features, laying out a complete assessment of your knowledge to help you focus your study where it is needed most. The Academic Edition DVD also includes complete video solutions to 31 hands-on labs in the book and 31 interactive simulations on key exam topics to reinforce the learning by doing. Learning activities such as test password strength, match the type of Malware with its definition, find the security issues in the network map, and disallow a user access to the network on Saturday and Sunday.</p> <p style="MARGIN: 0px">Interactive Simulations:</p> <ul> <li>2-1: Identifying Malware Types </li> <li>2-2: Securing the BIOS </li> <li>2-4: Filtering E-mails </li> <li>3-3: Stopping Services in the Command Prompt </li> <li>4-1: Securing Web Browsers </li> <li>5-1: Creating a DMZ </li> <li>5-3: Defending against the Web Shell </li> <li>6-1a: Understanding Port Numbers, Part A </li> <li>6-1b: Understanding Port Numbers, Part B </li> <li>6-1c: Understanding Port Numbers, Part C </li> <li>6-2a: Identifying Network Attacks, Part A </li> <li>6-2b: Identifying Network Attacks, Part B </li> <li>6-2c: Identifying Network Attacks, Part C </li> <li>6-2d: Identifying Network Attacks, Part D </li> <li>7-1: Configuring a Firewall's Ruleset </li> <li>8-4: Planning Network Security </li> <li>9-1: Choosing Physical Security Methods </li> <li>9-2: Selecting the Correct Authentication Technology </li> <li>9-3: Understanding 802.1X </li> <li>10-1: Password Strength </li> <li>10-2: Configuring Logon Hours </li> <li>10-3: Understanding Access Control Models </li> <li>11-1a: Risk Assessment, Part A </li> <li>11-1b: Risk Assessment, Part B </li> <li>11-1c: Vulnerability Management Process </li> <li>12-1: Capturing and Analyzing Packets </li> <li>12-2: Deciphering Log Files </li> <li>13-1: Understanding Symmetric and Asymmetric Algorithms </li> <li>15-1: Configuring RAID </li> <li>16-1a: Identifying Social Engineering Attacks, Part A </li> <li>16-1b: Identifying Social Engineering Attacks, Part B</li> </ul> <p style="MARGIN: 0px">Hands-On Labs Video Solutions:</p> <ul> <li>2-1: Using Free Malware Scanning Programs </li> <li>2-2: Securing the BIOS </li> <li>2-3: Securing Mobile Devices </li> <li>3-1: Discerning and Updating Service Pack Level </li> <li>3-2: Securing a Virtual Machine </li> <li>3-3: Working with Services in Windows and Linux </li> <li>4-1: Securing Web Browsers </li> <li>4-2: Whitelisting and Blacklisting Applications with a Windows Server Policy </li> <li>5-2: Subnetting a Network </li> <li>6-1: Scanning Ports </li> <li>7-2: Configuring Packet Filtering and NAT </li> <li>7-3: Configuring an Inbound Filter </li> <li>8-1: Securing a Wireless Device </li> <li>8-2: Enabling MAC Filtering </li> <li>8-3: Wardriving and the Cure </li> <li>9-3: Understanding 802.1X </li> <li>9-4: Setting Up a Secure VPN </li> <li>10-1: Configuring Complex Passwords </li> <li>10-2: Configuring Password Policies and User Accounts Restrictions </li> <li>10-4: Configuring User and Group Permissions </li> <li>11-2: Mapping and Scanning the Network </li> <li>11-3: Defending Against Password Cracking </li> <li>12-1: Capturing and Analyzing Packets </li> <li>12-2: Deciphering Log Files </li> <li>12-3: Auditing Files </li> <li>13-1: Understanding Symmetric and Asymmetric Algorithms </li> <li>13-2: Disabling the LM Hash </li> <li>14-1: Understanding PKI </li> <li>14-2: Making an SSH Connection </li> <li>15-1: Configuring RAID </li> <li>17-1: Analyzing Test Questions</li> </ul> <p style="MARGIN: 0px">Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this CompTIA authorized study guide helps you master the concepts and techniques that will allow you to succeed on the exam the first time.</p> <p style="MARGIN: 0px">The CompTIA authorized study guide helps you master all the topics on the Security+ exam, including</p> <ul> <li>Core computer system security </li> <li>OS hardening and virtualization </li> <li>Application security </li> <li>Network design elements and threats </li> <li>Perimeter security </li> <li>Network media and devices security </li> <li>Physical security and authentication models </li> <li>Access control </li> <li>Vulnerability and risk assessment </li> <li>Monitoring and auditing </li> <li>Cryptography, including PKI </li> <li>Redundancy and disaster recovery </li> <li>Policies and procedures</li> </ul> <p style="MARGIN: 0px">&nbsp;</p>

This product hasn't received any reviews yet. Be the first to review this product!

$75.94
Hurry up! Current stock:

CompTIA Security+ SY0-401 Cert Guide, Academic Edition

$75.94

Description

<p style="MARGIN: 0px">This is the eBook version of the print title. Note that the eBook does not provide access to the practice test software that accompanies the print book. Access to the videos and exercises is available through product registration at Pearson IT Certification; or see instructions in back pages of your eBook.</p> <p style="MARGIN: 0px">Learn, prepare, and practice for CompTIA Security+ SY0-401 exam success with this <i>CompTIA Authorized Cert Guide, Academic Edition </i>from Pearson IT Certification, a leader in IT Certification learning and a CompTIA Authorized Platinum Partner. The DVD features three complete practice exams, complete video solutions to 31 hands-on labs, plus 31 interactive flash-based simulations that include drag-and-drop and matching to reinforce the learning.</p> <ul> <li>Master CompTIA’s Security+ SY0-401 exam topics </li> <li>Assess your knowledge with chapter-ending quizzes </li> <li>Reinforce your knowledge of key concepts with chapter review activities </li> <li>Practice with realistic exam questions on the DVD </li> <li>Includes complete video solutions to 31 hands-on labs </li> <li>Plus 31 interactive simulations on key exam topics</li> </ul> <p style="MARGIN: 0px"><i>CompTIA Security+ SY0-401 Authorized Cert Guide, Academic Edition</i> includes video solutions to the hands-on labs, practice tests, and interactive simulations that let the reader learn by doing. Best-selling author and expert instructor David L. Prowse shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.</p> <p style="MARGIN: 0px">The book presents you with an organized test preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Chapter review activities help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your approach to passing the exam.</p> <p style="MARGIN: 0px">The companion Academic Edition DVD contains the powerful Pearson IT Certification Practice Test engine, with three complete practice exams and hundreds of exam-realistic questions. The assessment engine offers you a wealth of customization options and reporting features, laying out a complete assessment of your knowledge to help you focus your study where it is needed most. The Academic Edition DVD also includes complete video solutions to 31 hands-on labs in the book and 31 interactive simulations on key exam topics to reinforce the learning by doing. Learning activities such as test password strength, match the type of Malware with its definition, find the security issues in the network map, and disallow a user access to the network on Saturday and Sunday.</p> <p style="MARGIN: 0px">Interactive Simulations:</p> <ul> <li>2-1: Identifying Malware Types </li> <li>2-2: Securing the BIOS </li> <li>2-4: Filtering E-mails </li> <li>3-3: Stopping Services in the Command Prompt </li> <li>4-1: Securing Web Browsers </li> <li>5-1: Creating a DMZ </li> <li>5-3: Defending against the Web Shell </li> <li>6-1a: Understanding Port Numbers, Part A </li> <li>6-1b: Understanding Port Numbers, Part B </li> <li>6-1c: Understanding Port Numbers, Part C </li> <li>6-2a: Identifying Network Attacks, Part A </li> <li>6-2b: Identifying Network Attacks, Part B </li> <li>6-2c: Identifying Network Attacks, Part C </li> <li>6-2d: Identifying Network Attacks, Part D </li> <li>7-1: Configuring a Firewall's Ruleset </li> <li>8-4: Planning Network Security </li> <li>9-1: Choosing Physical Security Methods </li> <li>9-2: Selecting the Correct Authentication Technology </li> <li>9-3: Understanding 802.1X </li> <li>10-1: Password Strength </li> <li>10-2: Configuring Logon Hours </li> <li>10-3: Understanding Access Control Models </li> <li>11-1a: Risk Assessment, Part A </li> <li>11-1b: Risk Assessment, Part B </li> <li>11-1c: Vulnerability Management Process </li> <li>12-1: Capturing and Analyzing Packets </li> <li>12-2: Deciphering Log Files </li> <li>13-1: Understanding Symmetric and Asymmetric Algorithms </li> <li>15-1: Configuring RAID </li> <li>16-1a: Identifying Social Engineering Attacks, Part A </li> <li>16-1b: Identifying Social Engineering Attacks, Part B</li> </ul> <p style="MARGIN: 0px">Hands-On Labs Video Solutions:</p> <ul> <li>2-1: Using Free Malware Scanning Programs </li> <li>2-2: Securing the BIOS </li> <li>2-3: Securing Mobile Devices </li> <li>3-1: Discerning and Updating Service Pack Level </li> <li>3-2: Securing a Virtual Machine </li> <li>3-3: Working with Services in Windows and Linux </li> <li>4-1: Securing Web Browsers </li> <li>4-2: Whitelisting and Blacklisting Applications with a Windows Server Policy </li> <li>5-2: Subnetting a Network </li> <li>6-1: Scanning Ports </li> <li>7-2: Configuring Packet Filtering and NAT </li> <li>7-3: Configuring an Inbound Filter </li> <li>8-1: Securing a Wireless Device </li> <li>8-2: Enabling MAC Filtering </li> <li>8-3: Wardriving and the Cure </li> <li>9-3: Understanding 802.1X </li> <li>9-4: Setting Up a Secure VPN </li> <li>10-1: Configuring Complex Passwords </li> <li>10-2: Configuring Password Policies and User Accounts Restrictions </li> <li>10-4: Configuring User and Group Permissions </li> <li>11-2: Mapping and Scanning the Network </li> <li>11-3: Defending Against Password Cracking </li> <li>12-1: Capturing and Analyzing Packets </li> <li>12-2: Deciphering Log Files </li> <li>12-3: Auditing Files </li> <li>13-1: Understanding Symmetric and Asymmetric Algorithms </li> <li>13-2: Disabling the LM Hash </li> <li>14-1: Understanding PKI </li> <li>14-2: Making an SSH Connection </li> <li>15-1: Configuring RAID </li> <li>17-1: Analyzing Test Questions</li> </ul> <p style="MARGIN: 0px">Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this CompTIA authorized study guide helps you master the concepts and techniques that will allow you to succeed on the exam the first time.</p> <p style="MARGIN: 0px">The CompTIA authorized study guide helps you master all the topics on the Security+ exam, including</p> <ul> <li>Core computer system security </li> <li>OS hardening and virtualization </li> <li>Application security </li> <li>Network design elements and threats </li> <li>Perimeter security </li> <li>Network media and devices security </li> <li>Physical security and authentication models </li> <li>Access control </li> <li>Vulnerability and risk assessment </li> <li>Monitoring and auditing </li> <li>Cryptography, including PKI </li> <li>Redundancy and disaster recovery </li> <li>Policies and procedures</li> </ul> <p style="MARGIN: 0px">&nbsp;</p>

Customers Also Viewed

BookLoop is your trusted local Australian destination for books, games, toys, puzzles, tarot cards, stationery, and thoughtful gifts, offering a huge range of carefully curated products for curious minds of all ages. As a proudly Australian-owned bookstore, we are passionate about connecting our community with inspiring reads, creative play, and unique finds that bring joy, spark imagination, and support lifelong learning. Whether you're shopping for bestselling fiction, children’s picture books, educational resources, or non-fiction titles that encourage mental health, mindfulness, and personal growth, our ever-expanding book collection has something for everyone—including titles from local Australian authors that celebrate homegrown talent and storytelling. But we’re more than just a bookstore—our diverse range includes engaging puzzles for solo or family fun, educational and screen-free toys designed to develop skills and creativity, and family-friendly board games that bring people together. If you're looking for something with a little extra meaning, our beautifully illustrated tarot cards and oracle decks are perfect for beginners and seasoned readers alike, with options chosen for their artistry, symbolism, and accessibility. We also carry a range of gifts and stationery, from handcrafted journals and high-quality pens to bookmarks, greeting cards, candles, and calming tools, making it easy to find the perfect present for birthdays, celebrations, or simply because. Every product on our shelves is selected with care, quality, and purpose, making BookLoop a one-stop shop for thoughtful, meaningful shopping that supports creativity and wellbeing. We believe in the value of small business and community connection, which is why we’re committed to sourcing products that reflect our values and offering the kind of friendly, personalised service that big retailers can’t match. When you shop with us, you’re not only choosing beautifully curated items—you’re supporting a local Australian business that genuinely cares. We ship Australia-wide with a flat rate to keep things simple and affordable, and every order is carefully packed and quickly dispatched by our small, dedicated team. Our online shopping experience is safe, easy, and user-friendly, making it convenient to explore our wide range of books, gifts, and games from the comfort of home. We’ve seen a growing demand for titles and toys that support mental health, especially in children and teens, and we’re proud to stock a growing number of books on ADHD, emotional regulation, positive thinking, and self-esteem, as well as calming puzzles and sensory-friendly gifts that are both fun and supportive. Whether you're looking to inspire a young reader, encourage imaginative play, find your next favourite novel, or gift someone something truly special, BookLoop has you covered. Thank you for choosing to shop local and support a business that believes in the power of stories, creativity, and connection—explore our full collection today and experience the difference of thoughtful, heart-led retail with BookLoop.