Essential Security+
-
Section 1: Basic Security Concepts
-
Chapter 1: Security Terms
-
Chapter 2: From Vulnerability To Exposure
-
Section 2: Security Technology
-
Chapter 3: Cryptography
-
Chapter 4: Data
-
Chapter 5: Enterprise Network Architecture
-
Chapter 6: Network Security Appliances
-
Chapter 7: Application Protocols
-
Chapter 8: Secure Communications
-
Chapter 9: Wireless Networks
-
Chapter 10: Identity And Access Management
-
Chapter 11: Cloud Infrastructure
-
Chapter 12: Embedded Devices
-
Chapter 13: High Availability
-
Chapter 14: Data Backups
-
Chapter 15: Physical Security
-
Section 3: Advanced Security Concepts
-
Chapter 16: Attack Surfaces
-
Chapter 17: Controls
-
Chapter 18: Endpoint Security
-
Chapter 19: Deperimeterization And Zero-Trust
-
Chapter 20: Network Security
-
Chapter 21: Device Hardening
-
Chapter 22: Asset Tracking
-
Chapter 23: Stay Organized
-
Section 4: The Attacker
-
Chapter 24: Who Is The Adversary?
-
Chapter 25: Studying An Attacker
-
Chapter 26 Evidences Of An Attack
-
Section 5: The Attack
-
Chapter 27: Cryptographic Attacks
-
Chapter 28: Supply Chain Attacks
-
Chapter 29: Physical Attacks
-
Chapter 30: People Attacks
-
Chapter 31: Device Attacks
-
Chapter 32: Network Attacks
-
Chapter 33: Software Attacks
-
Chapter 34: Operating System Attacks
-
Section 6: The Best Response To An Attack
-
Chapter 35: Pre-Incident Activities
-
Chapter 36: During The Incident
-
Chapter 37: Post-Incident Activities
-
Section 7: Governance
-
Chapter 38: Security Governance Concepts
-
Chapter 39: Risk Management Processes
-
Chapter 40: Data Protection And Compliance Concepts
1652 Private Road 3532, Quinlan TX 75474
Phone number: 800-337-1500
Phone number: 800-337-1500
Copyright © 2025