Introduction xv
Chapter 1 Threats, Attacks, and Vulnerabilities 1
Chapter 2 Technologies and Tools 37
Chapter 3 Architecture and Design 75
Chapter 4 Identity and Access Management 111
Chapter 5 Risk Management 131
Chapter 6 Cryptography and PKI 163
Chapter 7 Practice Test 195
Appendix Answers to Practice Tests 215
Chapter 1: Threats, Attacks, and Vulnerabilities 216
Chapter 2: Technologies and Tools 238
Chapter 3: Architecture and Design 267
Chapter 4: Identity and Access Management 293
Chapter 5: Risk Management 309
Chapter 6: Cryptography and PKI 339
Chapter 7: Practice Test 368
Index 391
ABOUT THE AUTHORS
S. Russell Christy, CompTIA Security+, CySA+, A+, Network+,
Server+, is a Technical Trainer in Memphis, Tenn., delivering
traditional and online classroom learning for adults, covering a
wide variety of products. He specializes in Computer Maintenance
and Network and Security; Microsoft Office applications; and Web
and Print Design. For over 20 years he has deployed new desktops
and operating systems, servers, network hardware and software,
while simultaneously troubleshooting various hardware and software
issues. Chuck Easttom is CEO and Chief Trainer for CEC-Security,
which specializes in IT security training and CISP and Security+
exam preparation. He has over 18 years in the IT industry, 10 years
teaching and training, and has authored 15 published books.
![]() |
Ask a Question About this Product More... |
![]() |