Welcome to Cheap2Price

    CompTIA Cybersecurity 2017


    Product details:

    Senior Acquisitions Editor: Kenyon Brown
    Development Editor: David Clark
    Technical Editor: Robin Abernathy
    Production Editor: Rebecca Anderson
    Copy Editor: Elizabeth Welch
    Editorial Manager: Mary Beth Wakefield
    Production Manager: Kathleen Wisor
    Executive Editor: Jim Minatel
    Book Designers: Judy Fung and Bill Gibson
    Proofreader: Kim Wimpsett
    Indexer: Ted Laux
    Project Coordinator, Cover: Brent Savage
    Cover Designer: Wiley
    Cover Image: ©Getty Images Inc./Jeremy Woodhouse
    Copyright © 2017 by John Wiley & Sons, Inc., Indianapolis, Indiana
    Published simultaneously in Canada
    ISBN: 978-1-119-34897-9
    ISBN: 978-1-119-34991-4 (ebk.)
    ISBN: 978-1-119-34988-4 (ebk.)
    Manufactured in the United States of America

    Learning Objectives

    In this course, you will assess and respond to security threats and operate a systems and network security analysis platform you will…

    • Assess information security risk in computing and network environments.
    • Analyze reconnaissance threats to computing and network environments.
    • Analyze attacks on computing and network environments.
    • Analyze post-attack techniques on computing and network environments.
    • Implement a vulnerability management program.
    • Collect cybersecurity intelligence.
    • Analyze data collected from security and event logs.
    • Perform active analysis on assets and networks.
    • Respond to cybersecurity incidents.
    • Investigate cybersecurity incidents.
    • Address security issues with the organization’s technology architecture.

    About the Authors:
    Mike Chapple, Ph.D., CSA+, is author of the best-selling CISSP (ISC)2
    Certified Information Systems Security Professional Official Study
    (Sybex, 2015) and the CISSP (ISC)2 Official Practice Tests (Sybex
    2016). He is an information security professional with two decades of
    experience in higher education, the private sector, and government.
    Mike currently serves as senior director for IT Service Delivery at the
    University of Notre Dame. In this role, he oversees the information
    security, data governance, IT architecture, project management, strategic
    planning, and product management functions for Notre Dame. Mike also
    serves as Associate Teaching Professor in the university’s IT, Analytics,
    and Operations department, where he teaches undergraduate and
    graduate courses on cybersecurity, data management, and business
    Before returning to Notre Dame, Mike served as executive vice president
    and chief information officer of the Brand Institute, a Miami-based
    marketing consultancy. Mike also spent four years in the information
    security research group at the National Security Agency and served as an
    active duty intelligence officer in the U.S. Air Force.
    Mike is technical editor for
    Information Security Magazine and has
    written more than 25 books. He earned both his B.S. and Ph.D. degrees
    from Notre Dame in computer science and engineering. Mike also holds
    an M.S. in computer science from the University of Idaho and an MBA
    from Auburn University. Mike holds the Cybersecurity Analyst+ (CSA+),
    Security+, and Certified Information Systems Security Professional
    (CISSP) certifications.
    David Seidl is the senior director for Campus Technology Services at the
    University of Notre Dame. As the senior director for CTS, David is
    responsible for central platform and operating system support, database
    administration and services, identity and access management,
    application services, email and digital signage, and document
    During his over 20 years in information technology, he has served in a

    variety of leadership, technical, and information security roles, including
    leading Notre Dame’s information security team as Notre Dame’s director
    of information security. He currently teaches a popular course on
    networking and security for Notre Dame’s Mendoza College of Business
    and has written books on security certification and cyberwarfare,
    including co-authoring
    CISSP (ISC)2 Official Practice Tests (Sybex 2016).
    David holds a bachelor’s degree in communication technology and a
    master’s degree in information security from Eastern Michigan
    University, as well as CISSP, GPEN, and GCIH certifications.


    There are no reviews yet.

    Only logged in customers who have purchased this product may leave a review.

    Vendor Information

    • Sale!
      Rated 0 out of 5

      SAMSUNG Galaxy S20 FE 5G Factory Unlocked Android Cell Phone 128GB US Version Smartphone

      Model Name S20FE
      Wireless Carrier Unlocked
      Brand SAMSUNG
      Form Factor Smartphone
      Memory Storage Capacity 256 GB
      Operating System Android
      Color CLOUD NAVY
      Cellular Technology 5G
      Screen Size 6.5 Inches
      Display Type AMOLED
      Add to cart
    • Honeypots and Routers_ Collecting Internet Attacks hacking ebook
      Rated 0 out of 5

      Honeypots and Routers Collecting Internet Attacks

      Product Descriptions:

      • Product Name: Honeypots and Routers Collecting Internet Attacks
      • Publisher ‏ : ‎ Auerbach Publications; 1st edition (December 2, 2015)
      • Publication date ‏ : ‎ December 2, 2015
      • Language ‏ : ‎ English
      • File size ‏ : ‎ 9348 KB
      • Simultaneous device usage ‏ : ‎ Up to 4 simultaneous devices, per publisher limits
      • Text-to-Speech ‏ : ‎ Not enabled
      • Enhanced typesetting ‏ : ‎ Not Enabled
      • X-Ray ‏ : ‎ Not Enabled
      • Word Wise ‏ : ‎ Not Enabled
      • Print length ‏ : ‎ 198 pages
      • Lending ‏ : ‎ Not Enabled
      Read more
    • Sale!
      Rated 0 out of 5

      Spy Camera Eyewear Sunglass

      Brand Hereta
      Connectivity Technology Wired
      Room Type Office, Kitchen, Living Room, Bedroom, Classroom, Study Room, Hallway
      Special Feature Take photos, Video recording, 1920*1080P
      Power Source Battery Powered

      Product Description:

      5.0 Mega Pixels CMOS Camera. Sexy and Fashionable Design. Video @ High Resolution (HD) : 1920x1080P. With TF Card Slot, Support TF Card up to 32GB (Not included). User friendly operation button for easy control. Real time recording, never let memorable moments sneak away from life. A “Must Have” gadget for all kind of recording need, like : surveillance, trend-spotter, journalist, traffic police, travelers, hikers, mount climbers, students, life-lovers and etc.

      Add to cart
    • Sale! Xiaomei Clear and Exquisite 925 Sterling Silver Cube Diamond Drill Cz Diamond Engagement Bride Jewelry Ring
      Rated 0 out of 5

      Xiaomei Clear and Exquisite 925 Sterling Silver Cube Diamond Drill Cz Diamond Engagement Bride Jewelry Ring


      Product information:

      Add to cart
    • Sale!
      Rated 0 out of 5



      Item specifics

      New with box: A brand-new, unused, and unworn item (including handmade items) in the original packaging (such as the original box or bag) and/or with the original tags attached.
      Brand: Technic
      Skin Type: All Skin Types MPN: 28724
      Size: Standard Manufacturer Part Number: 28724
      Coverage: Full Type: Foundation
      Period After Opening (PAO): 6M Formulation: Liquid
      Features: Cruelty-free/No Animal Testing, Fair Trade, Long Lasting Volume: 35ml
      Country/Region of Manufacture: United Kingdom Effect: Satin
      Add to cart
    • Sale!
      Rated 0 out of 5

      Computer Security Fundamentals


      Product details:

      • Product Format: PDF Format
      • Publisher ‏ : ‎ Pearson IT Certification; 3rd edition (June 28, 2016)
      • Language ‏ : ‎ English
      • Paperback ‏ : ‎ 447 pages


      Clearly explains core concepts, terminology, challenges, technologies, and skills

      Covers today&;s latest attacks and countermeasures

      The perfect beginner&;s guide for anyone interested in a computer security career

      Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started.

      Drawing on 20+ years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.

      This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you&;ve learned.

      Whether you&;re a student, a professional, or a manager, this guide will help you protect your assets&;and expand your career options.

      Learn how to

      ·         Identify and prioritize potential threats to your network

      ·         Use basic networking knowledge to improve security

      ·         Get inside the minds of hackers, so you can deter their attacks

      ·         Implement a proven layered approach to network security

      ·         Resist modern social engineering attacks

      ·         Defend against today&;s most common Denial of Service (DoS) attacks

      ·         Halt viruses, spyware, worms, Trojans, and other malware

      ·         Prevent problems arising from malfeasance or ignorance

      ·         Choose the best encryption methods for your organization

      ·         Compare security technologies, including the latest security appliances

      ·         Implement security policies that will work in your environment

      ·         Scan your network for vulnerabilities

      ·         Evaluate potential security consultants

      ·         Master basic computer forensics and know what to do if you&;re attacked

      ·         Learn how cyberterrorism and information warfare are evolving


      Add to cart
    Select the fields to be shown. Others will be hidden. Drag and drop to rearrange the order.
    • Image
    • SKU
    • Rating
    • Price
    • Stock
    • Availability
    • Add to cart
    • Description
    • Content
    • Weight
    • Dimensions
    • Additional information
    • Attributes
    • Custom attributes
    • Custom fields
    Click outside to hide the compare bar
    Wishlist 0
    Open wishlist page Continue shopping