Essential Security+

  • Section 1: Basic Security Concepts
  •     Chapter 1: Security Terms
  •     Chapter 2: From Vulnerability To Exposure
  • Section 2: Security Technology
  •     Chapter 3: Cryptography
  •     Chapter 4: Data
  •     Chapter 5: Enterprise Network Architecture
  •     Chapter 6: Network Security Appliances
  •     Chapter 7: Application Protocols
  •     Chapter 8: Secure Communications
  •     Chapter 9: Wireless Networks
  •     Chapter 10: Identity And Access Management
  •     Chapter 11: Cloud Infrastructure
  •     Chapter 12: Embedded Devices
  •     Chapter 13: High Availability
  •     Chapter 14: Data Backups
  •     Chapter 15: Physical Security
  • Section 3: Advanced Security Concepts
  •     Chapter 16: Attack Surfaces
  •     Chapter 17: Controls
  •     Chapter 18: Endpoint Security
  •     Chapter 19: Deperimeterization And Zero-Trust
  •     Chapter 20: Network Security
  •     Chapter 21: Device Hardening
  •     Chapter 22: Asset Tracking
  •     Chapter 23: Stay Organized
  • Section 4: The Attacker
  •     Chapter 24: Who Is The Adversary?
  •     Chapter 25: Studying An Attacker
  •     Chapter 26 Evidences Of An Attack
  • Section 5: The Attack
  •     Chapter 27: Cryptographic Attacks
  •     Chapter 28: Supply Chain Attacks
  •     Chapter 29: Physical Attacks
  •     Chapter 30: People Attacks
  •     Chapter 31: Device Attacks
  •     Chapter 32: Network Attacks
  •     Chapter 33: Software Attacks
  •     Chapter 34: Operating System Attacks
  • Section 6: The Best Response To An Attack
  •     Chapter 35: Pre-Incident Activities
  •     Chapter 36: During The Incident
  •     Chapter 37: Post-Incident Activities
  • Section 7: Governance
  •     Chapter 38: Security Governance Concepts
  •     Chapter 39: Risk Management Processes
  •     Chapter 40: Data Protection And Compliance Concepts
Created with