Mapped to the new CompTIA Security+ SY0-501 Certification Exam, best-selling COMPTIA SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, 6e, thoroughly prepares readers for professional certification and career success. The text covers threats, attacks, and vulnerabilities; technologies and tools for combating attacks, architecture, and design; identity and access management; risk management; and cryptography. It also includes expansive coverage of embedded device security, attacks and defenses, and the latest developments and trends in information security, including new software tools to assess security. New Hands-On Projectsand case activities help readers put what they learn into practice, while end-of-chapter exercises direct them to the Information Security Community Site for additional activities, blogs, videos, and up-to-the-minute news and insight from the field.
Providing the most current coverage available, all content is up to date and mapped to the new CompTIA Security+ SY0-501 exam through highlighted chapter certification icons, a detailed mapping grid, and a quick reference guide.
Popular with instructors and learners alike, this trusted textbook provides comprehensive coverage of essential network and computer security topics, including threats, attacks, and vulnerabilities; technologies and tools for combating attacks, architecture, and design; identity and access management; risk management; cryptography; and much more.
With its practical, user-friendly organization, the text groups chapters by major domains: Security and Its Threats, Cryptography, Network Attacks and Defenses, Device Security, Access and Identity Management, and Risk Management.
Ciampa's clear, engaging writing style makes even difficult concepts and complex processes easier for readers to understand -- making the text an ideal resource for classroom instruction, self-paced learning, or professional reference.
Helping instructors and students maximize course success, numerous special features throughout the text support effective teaching and learning, including review questions; illustrations of security vulnerabilities, attacks, and defenses; case studies highlighting real-world security scenarios; and hands-on projects that enable readers to apply what they have learned to real-life practice.
End-of-chapter exercises direct readers to the Information Security Community Site for up-to-the-minute news and information, additional exercises, blogs, discussion boards, videos, and other useful resources.