Print Textbook & Cloud Lab Access: 180-day subscription.The cybersecurity Cloud Labs for Fundamentals of Information Systems Security provide fully immersive mock IT infrastructures with live virtual machines and real software, where students will learn and practice the foundational information security skills they will need to excel in their future careers. Unlike simulations, these hands-on virtual labs reproduce the complex challenges of the real world, without putting an institution's assets at risk. Available as a standalone lab solution or bundled with Jones & Bartlett Learning textbooks, these cybersecurity Cloud Labs are an essential tool for mastering key course concepts through hands-on training.Fundamentals of Information Systems Security with Cloud Labs can help students prepare for the Certified in Cybersecurity (CC) credential from ISC2. See how Dorothy Staton at Iowa State University was able to use the textbook to pass the certification. Labs: Lab 1: Exploring the Seven Domains of a Typical IT InfrastructureLab 2: Performing a Vulnerability AssessmentLab 3: Performing Packet Capture and Traffic AnalysisLab 4: Applying User Authentication and Access ControlsLab 5: Using Encryption to Enhance Confidentiality and IntegrityLab 6: Assessing Common Attack VectorsLab 7: Implementing an Information Security PolicyLab 8: Implementing Security Monitoring and LoggingLab 9: Performing Backup and Recovery FunctionsLab 10: Performing Incident Response and Forensic Analysis © 2023
"synopsis" may belong to another edition of this title.
David Kim is the president of Security Evolutions, Inc. (SEI; www.security-evolutions.com), located outside the Washington, DC, metropolitan area. SEI provides governance, risk, and compliance consulting services for public and private sector clients globally. SEI’s clients include healthcare institutions, banking institutions, governments, and international airports. SEI’s IT security consulting services include security risk assessments, vulnerability assessments, compliance audits, and designing of layered security solutions for enterprises. In addition, available services include developing business continuity and disaster recovery plans. Mr. Kim’s IT and IT security experience encompasses more than 30+ years of technical engineering, technical management, and sales and marketing management. This experience includes LAN/WAN, internetworking, enterprise network management, and IT security for voice, video, and data networking infrastructures. He is an accomplished author and part-time adjunct professor who enjoys teaching cybersecurity to students across the United States.
Michael G. Solomon, PhD, CISSP, PMP, CISM, CySA+, Pentest+, is an author, educator, and consultant focusing on privacy, security, blockchain, and identity management. As an IT professional and consultant since 1987, Dr. Solomon has led project teams for many Fortune 500 companies and has authored and contributed to more than 30 books and numerous training courses. Dr. Solomon is a Professor of Computer and Information Sciences at the University of the Cumberlands and holds a Ph.D. in Computer Science and Informatics from Emory University.
"About this title" may belong to another edition of this title.
Seller: KRES's Textbooks Retail, Bolingbrook, IL, U.S.A.
Paperback. Condition: New. Fourth Edition. BRAND NEW! Books are accepted for return within 30 days. Allow 5 - 14 business days for Standard Shipping. To Alaska, Hawaii, California, U.S. protectorate, P.O. box, and APO/FPO addresses "No Expedited Shipping" allow 4-28 business days. We do not currently ship internationally. Seller Inventory # AB-842RY51333
Quantity: 2 available
Seller: Revaluation Books, Exeter, United Kingdom
Hardcover. Condition: Brand New. 4th pck har/ edition. 9.09x7.44x1.30 inches. In Stock. Seller Inventory # 1284251330
Quantity: 1 available
Seller: dsmbooks, Liverpool, United Kingdom
paperback. Condition: New. New. book. Seller Inventory # D8S0-3-M-1284251330-6
Quantity: 1 available