Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Principles of Computer Security: CompTIA Security+ and Beyond Lab Manual (Exam SY0-601)

    Posted By: sammoh
    Principles of Computer Security: CompTIA Security+ and Beyond Lab Manual (Exam SY0-601)

    Principles of Computer Security: CompTIA Security+ and Beyond Lab Manual (Exam SY0-601)
    English | ISBN: ‎ 9781260470123 | 672 pages | 2021 | EPUB | 22.52 MB

    Practice the Skills Essential for a Successful Career in Cybersecurity!

    This hands-on guide contains more than 90 labs that challenge you to solve real-world problems and help you to master key cybersecurity concepts. Clear, measurable lab results map to exam objectives, offering direct correlation to Principles of Computer Security: CompTIA Security+™ and Beyond, Sixth Edition (Exam SY0-601). For each lab, you will get a complete materials list, step-by-step instructions and scenarios that require you to think critically. Each chapter concludes with Lab Analysis questions and a Key Term quiz. Beyond helping you prepare for the challenging exam, this book teaches and reinforces the hands-on, real-world skills that employers are looking for.

    In this lab manual, you’ll gain knowledge and hands-on experience with

    Linux systems administration and security
    Reconnaissance, social engineering, phishing
    Encryption, hashing
    OpenPGP, DNSSEC, TLS, SSH
    Hacking into systems, routers, and switches
    Routing and switching
    Port security, ACLs
    Password cracking
    Cracking WPA2, deauthentication attacks, intercepting wireless traffic
    Snort IDS
    Active Directory, file servers, GPOs
    Malware reverse engineering
    Port scanning
    Packet sniffing, packet crafting, packet spoofing
    SPF, DKIM, and DMARC
    Microsoft Azure, AWS
    SQL injection attacks
    Fileless malware with PowerShell
    Hacking with Metasploit and Armitage
    Computer forensics
    Shodan
    Google hacking
    Policies, ethics, and much more