with an
Acco share
you get a discount on Acco-titles, office supplies and selected titles.
Content
Learn, prepare, and practice for CompTIA Security+ SY0-701 exam success with this Cert Guide from Pearson IT Certification, a leader in IT Certification learning.CompTIA Security+ SY0-701 Cert Guide from Pearson IT Certification helps you prepare to succeed on the CompTIA Security+ SY0-701 exam by directly addressing the exam's objectives as stated by CompTIA. Leading instructor and cybersecurity professional Lewis Heuermann shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills.This complete study package includesComplete coverage of the exam objectives and a test-preparation routine designed to help you pass the examsDo I Know This Already? quizzes, which allow you to decide how much time you need to spend on each sectionChapter-ending Key Topic tables, which help you drill on key concepts you must know thoroughlyThe powerful Pearson Test Prep Practice Test software, complete with hundreds of well-reviewed, exam-realistic questions, customization options, and detailed performance reportsAn online, interactive Flash Cards application to help you drill on Key Terms by chapterA final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategiesStudy plan suggestions and templates to help you organize and optimize your study timeWell regarded for its level of detail, study plans, assessment features, and challenging review questions and exercises, this study guide helps you master the concepts and techniques that ensure your exam success.This study guide helps you master all the topics on the CompTIA Security+ SY0-701 exam, deepening your knowledge ofGeneral Security Concepts: Security controls, security concepts, change management process, cryptographic solutionsThreats, Vulnerabilities, and Mitigations: Threat actors and motivations, attack surfaces, types of vulnerabilities, indicators of malicious activity, mitigation techniquesSecurity Architecture: Security implications of architecture models, secure enterprise infrastructure, protect data, resilience and recovery in security architectureSecurity Operations: Security techniques to computing resources, security implications, vulnerability management, monitoring concepts, enterprise capabilities to enhance security, access management, automation related to secure operations, incident response activitiesSecurity Program Management and Oversight: Security governance, risk management, third-party risk assessment and management, security compliance, audits and assessments, security awareness practices
Your email address has been noted. We will inform you when this item is available again.
Book condition
An important factor of a second-hand book is the condition of the book. The buyer may not be surprised. Always mention damages or defects. We use a system with 3 stars:
The book is acceptable: you have used it to study and made notes and markings – but everything is still readable. The cover and pages are in good condition.
The book still looks good: there are a few notes in it and you marked it. There are hardly any signs of use on the cover and pages
The book is (almost) new: you have not written or marked in it. There are no signs of use on the cover and pages
You need a code for this download
Your code is incorrect.
Log in
Not registered yet?
Create an account to buy or link an Acco share and buy your books and supplies at reduced rates.