Search icon CANCEL
Subscription
0
Cart icon
Cart
Close icon
You have no products in your basket yet
Save more on your purchases!
Savings automatically calculated. No voucher code required
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
$9.99 | ALL EBOOKS & VIDEOS
Save more on purchases! Buy 2 and save 10%, Buy 3 and save 15%, Buy 5 and save 20%
CompTIA Security+ SY0-701 Certification Guide - Third Edition
CompTIA Security+ SY0-701 Certification Guide - Third Edition

CompTIA Security+ SY0-701 Certification Guide: Master cybersecurity fundamentals and pass the SY0-701 exam on your first attempt, Third Edition

By Ian Neil
Book Jan 2024 622 pages 3rd Edition
Print
$44.99 $30.99
Subscription
$15.99 Monthly
Print
$44.99 $30.99
Subscription
$15.99 Monthly

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Buy Now
Table of content icon View table of contents Preview book icon Preview Book

CompTIA Security+ SY0-701 Certification Guide - Third Edition

Domain 1: General Security Concepts

The first domain of the CompTIA Security+ SY0-701 certification focuses on key security concepts and practices. This domain is divided into four chapters, each providing an understanding of different aspects of cybersecurity.

You’ll get an overview of the various types of security controls, such as preventative, deterrent, detective, correcting, compensating, and directive, and the different levels at which security is considered, including technical, managerial, operational, and physical. You’ll also learn about fundamental security concepts, such as the CIA Triad, AAA, Zero Trust, physical security, and different deception technologies.

This section will further discuss the change management process, covering the decision-making processes between stakeholders regarding security concerns that impact business operations and the technical implications of change, documentation, and version control.

Finally, Domain 1 emphasizes the use of cryptographic solutions, such as public keys and encryption and their relevant tools, as well as concepts such as salting, digital signatures, key stretching, blockchains, and certificates.

This section comprises the following chapters:

  • Chapter 1, Compare and contrast various types of security controls
  • Chapter 2, Summarize fundamental security concepts
  • Chapter 3, Explain the importance of change management processes and the impact on security
  • Chapter 4, Explain the importance of using appropriate cryptographic solutions
Left arrow icon Right arrow icon
Download code icon Download Code

Key benefits

  • Gain certified cybersecurity knowledge from Ian Neil, a world-class CompTIA certification trainer
  • Explore up-to-date content meticulously aligned with 701 exam objectives
  • Unlock an exclusive 12% exam discount voucher inside the book
  • Purchase of this book unlocks access to web-based exam prep resources such as mock exams and flashcards

Description

Building on the success of its bestselling predecessor, this third edition of the CompTIA Security+ SY0-701 Certification Guide serves as your one-stop resource for SY0-701 exam preparation. Written by cybersecurity expert Ian Neil, this comprehensive guide helps you unlock the intricacies of cybersecurity and understand the technology behind the SY0-701 certification, ensuring you approach the exam with confidence. By exploring cybersecurity in detail, this book introduces essential principles, controls, and best practices. The chapters are carefully structured to align with the exam objectives of the 701 update, bringing to you the most recent and relevant exam study material. By mastering cybersecurity fundamentals, you’ll acquire the knowledge and skills to identify and mitigate threats, manage vulnerabilities, and safeguard enterprise infrastructure. You’ll be well equipped to apply the principles of security governance and compliance, conduct risk assessments, and excel in audit and assessment tasks. The book also contains mock exams and flashcards to help reinforce your learning and assess your exam-readiness. Whether you aim to excel the CompTIA Security+ SY0-701 exam, advance your career in cybersecurity, or enhance your existing knowledge, this book will transform you into a cybersecurity expert.

What you will learn

Differentiate between various security control types Apply mitigation techniques for enterprise security Evaluate security implications of architecture models Protect data by leveraging strategies and concepts Implement resilience and recovery in security Automate and orchestrate for running secure operations Execute processes for third-party risk assessment and management Conduct various audits and assessments with specific purposes

Product Details

Country selected

Publication date : Jan 19, 2024
Length 622 pages
Edition : 3rd Edition
Language : English
ISBN-13 : 9781835461532
Category :
Concepts :

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Buy Now

Product Details


Publication date : Jan 19, 2024
Length 622 pages
Edition : 3rd Edition
Language : English
ISBN-13 : 9781835461532
Category :
Concepts :

Table of Contents

38 Chapters
Preface Chevron down icon Chevron up icon
1. Domain 1: General Security Concepts Chevron down icon Chevron up icon
2. Chapter 1: Compare and contrast various types of security controls Chevron down icon Chevron up icon
3. Chapter 2: Summarize fundamental security concepts Chevron down icon Chevron up icon
4. Chapter 3: Explain the importance of change management processes and the impact to security Chevron down icon Chevron up icon
5. Chapter 4: Explain the importance of using appropriate cryptographic solutions Chevron down icon Chevron up icon
6. Domain 2: Threats, Vulnerabilities, and Mitigations Chevron down icon Chevron up icon
7. Chapter 5: Compare and contrast common threat actors and motivations Chevron down icon Chevron up icon
8. Chapter 6: Explain common threat vectors and attack surfaces Chevron down icon Chevron up icon
9. Chapter 7: Explain various types of vulnerabilities Chevron down icon Chevron up icon
10. Chapter 8: Given a scenario, analyze indicators of malicious activity Chevron down icon Chevron up icon
11. Chapter 9: Explain the purpose of mitigation techniques used to secure the enterprise Chevron down icon Chevron up icon
12. Domain 3: Security Architecture Chevron down icon Chevron up icon
13. Chapter 10: Compare and contrast security implications of different architecture models Chevron down icon Chevron up icon
14. Chapter 11: Given a scenario, apply security principles to secure enterprise infrastructure Chevron down icon Chevron up icon
15. Chapter 12: Compare and contrast concepts and strategies to protect data Chevron down icon Chevron up icon
16. Chapter 13: Explain the importance of resilience and recovery in security architecture Chevron down icon Chevron up icon
17. Domain 4: Security Operations Chevron down icon Chevron up icon
18. Chapter 14: Given a scenario, apply common security techniques to computing resources Chevron down icon Chevron up icon
19. Chapter 15: Explain the security implications of proper hardware, software, and data asset management Chevron down icon Chevron up icon
20. Chapter 16: Explain various activities associated with vulnerability management Chevron down icon Chevron up icon
21. Chapter 17: Explain security alerting and monitoring concepts and tools Chevron down icon Chevron up icon
22. Chapter 18: Given a scenario, modify enterprise capabilities to enhance security Chevron down icon Chevron up icon
23. Chapter 19: Given a scenario, implement and maintain identity and access management Chevron down icon Chevron up icon
24. Chapter 20: Explain the importance of automation and orchestration related to secure operations Chevron down icon Chevron up icon
25. Chapter 21: Explain appropriate incident response activities Chevron down icon Chevron up icon
26. Chapter 22: Given a scenario, use data sources to support an investigation Chevron down icon Chevron up icon
27. Domain 5: Security Program Management and Oversight Chevron down icon Chevron up icon
28. Chapter 23: Summarize elements of effective security governance Chevron down icon Chevron up icon
29. Chapter 24: Explain elements of the risk management process Chevron down icon Chevron up icon
30. Chapter 25: Explain the processes associated with third-party risk assessment and management Chevron down icon Chevron up icon
31. Chapter 26: Summarize elements of effective security compliance Chevron down icon Chevron up icon
32. Chapter 27: Explain types and purposes of audits and assessments Chevron down icon Chevron up icon
33. Chapter 28: Given a scenario, implement security awareness practices Chevron down icon Chevron up icon
34. Chapter 29: Accessing the online practice resources Chevron down icon Chevron up icon
35. Solutions Chevron down icon Chevron up icon
36. Other Books You May Enjoy Chevron down icon Chevron up icon
37. Coupon Code for CompTIA Security+ Exam Vouchers Chevron down icon Chevron up icon

Customer reviews

Top Reviews
Rating distribution
Empty star icon Empty star icon Empty star icon Empty star icon Empty star icon 0
(0 Ratings)
5 star 0%
4 star 0%
3 star 0%
2 star 0%
1 star 0%
Top Reviews
No reviews found
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

How do I buy and download an eBook? Chevron down icon Chevron up icon

Where there is an eBook version of a title available, you can buy it from the book details for that title. Add either the standalone eBook or the eBook and print book bundle to your shopping cart. Your eBook will show in your cart as a product on its own. After completing checkout and payment in the normal way, you will receive your receipt on the screen containing a link to a personalised PDF download file. This link will remain active for 30 days. You can download backup copies of the file by logging in to your account at any time.

If you already have Adobe reader installed, then clicking on the link will download and open the PDF file directly. If you don't, then save the PDF file on your machine and download the Reader to view it.

Please Note: Packt eBooks are non-returnable and non-refundable.

Packt eBook and Licensing When you buy an eBook from Packt Publishing, completing your purchase means you accept the terms of our licence agreement. Please read the full text of the agreement. In it we have tried to balance the need for the ebook to be usable for you the reader with our needs to protect the rights of us as Publishers and of our authors. In summary, the agreement says:

  • You may make copies of your eBook for your own use onto any machine
  • You may not pass copies of the eBook on to anyone else
How can I make a purchase on your website? Chevron down icon Chevron up icon

If you want to purchase a video course, eBook or Bundle (Print+eBook) please follow below steps:

  1. Register on our website using your email address and the password.
  2. Search for the title by name or ISBN using the search option.
  3. Select the title you want to purchase.
  4. Choose the format you wish to purchase the title in; if you order the Print Book, you get a free eBook copy of the same title. 
  5. Proceed with the checkout process (payment to be made using Credit Card, Debit Cart, or PayPal)
Where can I access support around an eBook? Chevron down icon Chevron up icon
  • If you experience a problem with using or installing Adobe Reader, the contact Adobe directly.
  • To view the errata for the book, see www.packtpub.com/support and view the pages for the title you have.
  • To view your account details or to download a new copy of the book go to www.packtpub.com/account
  • To contact us directly if a problem is not resolved, use www.packtpub.com/contact-us
What eBook formats do Packt support? Chevron down icon Chevron up icon

Our eBooks are currently available in a variety of formats such as PDF and ePubs. In the future, this may well change with trends and development in technology, but please note that our PDFs are not Adobe eBook Reader format, which has greater restrictions on security.

You will need to use Adobe Reader v9 or later in order to read Packt's PDF eBooks.

What are the benefits of eBooks? Chevron down icon Chevron up icon
  • You can get the information you need immediately
  • You can easily take them with you on a laptop
  • You can download them an unlimited number of times
  • You can print them out
  • They are copy-paste enabled
  • They are searchable
  • There is no password protection
  • They are lower price than print
  • They save resources and space
What is an eBook? Chevron down icon Chevron up icon

Packt eBooks are a complete electronic version of the print edition, available in PDF and ePub formats. Every piece of content down to the page numbering is the same. Because we save the costs of printing and shipping the book to you, we are able to offer eBooks at a lower cost than print editions.

When you have purchased an eBook, simply login to your account and click on the link in Your Download Area. We recommend you saving the file to your hard drive before opening it.

For optimal viewing of our eBooks, we recommend you download and install the free Adobe Reader version 9.