9781284251333-1284251330-Fundamentals of Information Systems Security + Cloud Labs

Fundamentals of Information Systems Security + Cloud Labs

ISBN-13: 9781284251333
ISBN-10: 1284251330
Edition: 4
Author: Michael G. Solomon, David Kim
Publication date: 2021
Publisher: Jones & Bartlett Learning
Format: Paperback
FREE US shipping

Book details

ISBN-13: 9781284251333
ISBN-10: 1284251330
Edition: 4
Author: Michael G. Solomon, David Kim
Publication date: 2021
Publisher: Jones & Bartlett Learning
Format: Paperback

Summary

Fundamentals of Information Systems Security + Cloud Labs (ISBN-13: 9781284251333 and ISBN-10: 1284251330), written by authors Michael G. Solomon, David Kim, was published by Jones & Bartlett Learning in 2021. With an overall rating of 3.5 stars, it's a notable title among other Security Certifications (Security & Encryption, Network Security, Computer Certification) books. You can easily purchase or rent Fundamentals of Information Systems Security + Cloud Labs (Paperback) from BooksRun, along with many other new and used Security Certifications books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $73.05.

Description

Print Textbook & Cloud Lab Access: 180-day subscription.The cybersecurity Cloud Labs for Fundamentals of Information Systems Security provide fully immersive mock IT infrastructures with live virtual machines and real software, where students will learn and practice the foundational information security skills they will need to excel in their future careers. Unlike simulations, these hands-on virtual labs reproduce the complex challenges of the real world, without putting an institution's assets at risk. Available as a standalone lab solution or bundled with Jones & Bartlett Learning textbooks, these cybersecurity Cloud Labs are an essential tool for mastering key course concepts through hands-on training.Labs: Lab 1: Exploring the Seven Domains of a Typical IT InfrastructureLab 2: Performing a Vulnerability AssessmentLab 3: Performing Packet Capture and Traffic AnalysisLab 4: Applying User Authentication and Access ControlsLab 5: Using Encryption to Enhance Confidentiality and IntegrityLab 6: Assessing Common Attack VectorsLab 7: Implementing an Information Security PolicyLab 8: Implementing Security Monitoring and LoggingLab 9: Performing Backup and Recovery FunctionsLab 10: Performing Incident Response and Forensic Analysis

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book