Also available in other formats.
Register your product to gain access to bonus material or receive a coupon.
Welcome to Computer Security Fundamentals Pearson uCertify Course and Labs and Textbook
Computer Security Fundamentals Pearson uCertify Course and Labs is an easy-to-use online course that allows you to assess your readiness and teaches you what you need to know to pass the Computer Security Fundamentals course.
The interactive eBook includes informative text, tables, step-by-step lists, images, interactive exercises, glossary flash cards, and review activities. The course comes complete with extensive pre- and post-assessment tests. In total there are over 200 practice questions.
The award-winning uCertify Labs help bridge the gap between conceptual knowledge and real-world application by providing competency-based, interactive, online, 24x7 training. uCertify Labs simulate real-world networking hardware, software applications and operating systems, and command-line interfaces. Students can feel safe working in this virtual environment resolving real-world operating system and hardware problems.
All of the content–the complete book, the assessment questions, the exercises, and the labs–is focused around the Computer Security Fundamentals book.
Clearly explains core concepts, terminology, challenges, technologies, and skills
Covers today’s latest attacks and countermeasures
The perfect beginner’s guide for anyone interested in a computer security career
Dr. Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started.
Drawing on 30 years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.
This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you’ve learned.
Whether you’re a student, a professional, or a manager, this guide will help you protect your assets–and expand your career options.
LEARN HOW TO