What this book covers
Chapter 1, Understanding Security Fundamentals, covers some security fundamentals that will be expanded upon in later chapters.
Chapter 2, Implementing Public Key Infrastructure, goes into the different encryption types and teaches how certificates are issued and used.
Chapter 3, Investigating Identity and Access Management, looks at different types of authentication. We will look at the concepts of identity and access management.
Chapter 4, Exploring Virtualization and Cloud Concepts, gets you acquainted with various cloud models and cloud security, looking at their deployment and storage environments.
Chapter 5, Monitoring, Scanning, and Penetration Testing, looks at penetration testing, exercise types, scanning, threat hunting, and SIEM systems.
Chapter 6, Understanding Secure and Insecure Protocols, looks at when to use certain secure protocols.
Chapter 7, Delving into Network and Security Concepts, looks at network components, remote access, and network reconnaissance tools.
Chapter 8, Securing Wireless and Mobile Solutions, looks at wireless solutions and secure mobile solutions.
Chapter 9, Identifying Threats, Attacks, and Vulnerabilities, explores attacks and vulnerabilities, taking each type of attack in turn and identifying its unique characteristics. This chapter is probably the most heavily tested module in the Security+ exam.
Chapter 10, Governance, Risk, and Compliance, looks at risk management and regulations, as well as frameworks.
Chapter 11, Managing Application Security, looks at application development and security.
Chapter 12, Dealing with Incident Response Procedures, covers disaster recovery preparation and recovery methods in practice.
Chapter 13, Mock Exam 1, includes mock questions, along with explanations, which will help assess whether you're ready for the test.
Chapter 14, Mock Exam 2, includes more mock questions, along with explanations, which will help assess whether you're ready for the test.