Pearson IT Cybersecurity Curriculum (ITCC) - Böcker
Complete A+ Guide to IT Hardware and Software
CompTIA A+ Core 1 and Core 2 Exams (V15)
905 kr
Skickas inom 7-10 vardagar
Master IT Hardware, Software, and Troubleshooting—and Fully Prepare for the Latest CompTIA® Core 1 and Core 2 Exams (V15)
The Complete A+ Guide to IT Hardware and Software is your all-in-one, real-world, full-color resource for building the skills you need to become a confident, job-ready IT technician--and for passing the updated CompTIA A+ Core 1 and Core 2 Exams (V15).
Built around the latest A+ exam objectives, this comprehensive guide helps you connect, configure, manage, and troubleshoot today’s most widely used devices, operating systems, and cloud-based technologies--all in the context of real IT scenarios. You’ll gain hands-on expertise with Windows 11, macOS, Linux, Chrome OS, Android, iOS, mobile and IoT devices, Active Directory, cybersecurity, scripting, and more.
Award-winning instructors Cheryl Schmidt and Christopher Lee combine technical depth with a strong focus on customer service and workplace-ready soft skills. Legacy technologies are also covered to prepare you for any environment you may encounter in the field.
WHAT YOU’LL LEARN AND HOW YOU’LL LEARN IT
Covers All Current A+ Exam Objectives: Stay focused with clear coverage of every topic tested on the Core 1 and Core 2 Exams (V15).
Real-World, Visual Learning: Hundreds of full-color photos, illustrations, and tables help you understand how things work.
Hands-On Tech Tips: Practical insights and field-tested troubleshooting advice throughout the book.
Professional Skills Focus: Soft skills tips and team-building exercises help you develop the communication and collaboration abilities today’s employers demand.
Extensive Practice and Review Tools:
Learning Objectives and Key Terms at the start of each chapter Review questions including multiple choice, true/false, matching, fill-in-the-blank, and open-ended formats Critical thinking activities to reinforce deeper understanding Certification Exam Tips to help you study smarterChapter Summaries & Glossary: Recap and reinforce key takeaways for fast and effective study.
Free Online Companion: Complete A+ Lab Manual
Available for free online, the Complete A+ Guide to IT Hardware and Software Lab Manual offers 140+ hands-on labs that walk you through:
PC components and mobile device repair Wired and wireless networking Operating system installation and configuration Security fundamentals Real-world troubleshooting scenariosStep-by-step instructions, built-in challenges, and critical thinking questions help you practice, experiment, and build confidence with core A+ topics. Whether you’re preparing for the exam or the workplace--or both--this lab manual ensures you’re ready.
Perfect for students, instructors, and career changers alike, this guide will prepare you for both certification success and on-the-job performance in today’s fast-moving IT environments.
572 kr
Skickas inom 7-10 vardagar
ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY
Clearly explains core concepts, terminology, challenges, technologies, and skills
Covers today's latest attacks and countermeasures
The perfect beginner's guide for anyone interested in a computer security career
Dr. Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started. Drawing on 30 years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.
This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples refl ect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you've learned.
LEARN HOW TO
Identify and prioritize potential threats to your network Use basic networking knowledge to improve security Get inside the minds of hackers, so you can deter their attacks Implement a proven layered approach to network security Resist modern social engineering attacks Defend against today's most common Denial of Service (DoS) attacks Halt viruses, spyware, worms, Trojans, and other malware Prevent problems arising from malfeasance or ignorance Choose the best encryption methods for your organization Compare security technologies, including the latest security appliances Implement security policies that will work in your environment Scan your network for vulnerabilities Evaluate potential security consultants Master basic computer forensics and know what to do if you're attacked Learn how cyberterrorism and information warfare are evolving
608 kr
Skickas inom 7-10 vardagar
ALL THE KNOWLEDGE YOU NEED TO BUILD CYBERSECURITY PROGRAMS AND POLICIES THAT WORK
Clearly presents best practices, governance frameworks, and key standards
Includes focused coverage of healthcare, finance, and PCI DSS compliance
An essential and invaluable guide for leaders, managers, and technical professionals
Today, cyberattacks can place entire organizations at risk. Cybersecurity can no longer be delegated to specialists: Success requires everyone to work together, from leaders on down. Developing Cybersecurity Programs and Policies in an AI-Driven World offers start-to-finish guidance for establishing effective cybersecurity in any organization. Drawing on more than two decades of real-world experience, Omar Santos presents realistic best practices for defining policy and governance, ensuring compliance, and collaborating to harden the entire organization.
Santos begins by outlining the process of formulating actionable cybersecurity policies and creating a governance framework to support these policies. He then delves into various aspects of risk management, including strategies for asset management and data loss prevention, illustrating how to integrate various organizational functions—from HR to physical security—to enhance overall protection. This book covers many case studies and best practices for safeguarding communications, operations, and access; alongside strategies for the responsible acquisition, development, and maintenance of technology. It also discusses effective responses to security incidents. Santos provides a detailed examination of compliance requirements in different sectors and the NIST Cybersecurity Framework.
LEARN HOW TO
Establish cybersecurity policies and governance that serve your organization’s needs Integrate cybersecurity program components into a coherent framework for action Assess, prioritize, and manage security risk throughout the organization Manage assets and prevent data loss Work with HR to address human factors in cybersecurity Harden your facilities and physical environment Design effective policies for securing communications, operations, and access Strengthen security throughout AI-driven deployments Plan for quick, effective incident response and ensure business continuity Comply with rigorous regulations in finance and healthcare Learn about the NIST AI Risk Framework and how to protect AI implementations Explore and apply the guidance provided by the NIST Cybersecurity Framework
653 kr
Skickas inom 7-10 vardagar
All you need to know about defending networks, in one book
Clearly explains concepts, terminology, challenges, tools, and skills Covers key security standards and models for business and government The perfect introduction for all network/computer security professionals and studentsWelcome to today's most useful and practical introduction to defending modern networks. Drawing on decades of experience, Chuck Easttom brings together updated coverage of all the concepts, terminology, techniques, and solutions you'll need to be effective.
Easttom thoroughly introduces the core technologies of modern network security, including firewalls, intrusion-detection systems, and VPNs. Next, he shows how encryption can be used to safeguard data as it moves across networks.
You'll learn how to harden operating systems, defend against malware and network attacks, establish robust security policies, and assess network security using industry-leading standards and models. You'll also find thorough coverage of key issues such as physical security, forensics, and cyberterrorism.
Throughout, Easttom blends theory and application, helping you understand both what to do and why. In every chapter, quizzes, exercises, projects, and web resources deepen your understanding and help you use what you've learned—in the classroom and in your career.
LEARN HOW TO
Evaluate key network risks and dangers Choose the right network security approach for your organization Anticipate and counter widespread network attacks, including those based on "social engineering" Successfully deploy and apply firewalls and intrusion detection systems Secure network communication with virtual private networks Protect data with cryptographic public/private key systems, digital signatures, and certificates Defend against malware, including ransomware, Trojan horses, and spyware Harden operating systems and keep their security up to date Define and implement security policies that reduce risk Explore leading security standards and models, including ISO and NIST standards Prepare for an investigation if your network has been attacked Understand the growing risks of espionage and cyberterrorism