Request for consultation

Thanks for your request. You’ll soon be chatting with a consultant to get the answers you need.
Your form is submitting...
{{formPostErrorMessage.message}} [{{formPostErrorMessage.code}}]
Email Address is required. 'Email Address' must contain at least 0 characters 'Email Address' cannot exceed 0 characters Please enter a valid Email Address
First Name is required. 'First Name' must contain at least 0 characters 'First Name' cannot exceed 0 characters Please enter a valid First Name
Last Name is required. 'Last Name' must contain at least 0 characters 'Last Name' cannot exceed 0 characters Please enter a valid Last Name
Institution is required.
Discipline is required.
Cengage, at your service! How can we best meet your needs? is required.
Why are you contacting us today? is required. 'Why are you contacting us today?' must contain at least 0 characters 'Why are you contacting us today?' cannot exceed 0 characters Please enter a valid Why are you contacting us today?

MindTap for Ciampa's CompTIA Security+ Guide to Network Security Fundamentals, 2 Terms Instant Access, 7th Edition

Mark Ciampa

  • {{checkPublicationMessage('Published', '2021-03-11T00:00:00+0000')}}
Starting At $99.95 See pricing and ISBN options
MindTap for Ciampa's CompTIA Security+ Guide to Network Security Fundamentals, 2 Terms Instant Access 7th Edition by Mark Ciampa

Overview

MindTap for Ciampa's CompTIA Security+ Guide to Network Security Fundamentals 7th edition is the digital learning solution that powers students from memorization to mastery. It gives you complete control of your course--to provide engaging content, to challenge every individual and to build their confidence. Empower students to accelerate their progress with MindTap. \n\nMindTap gives you full ownership of your content and learning experience. Customize the interactive syllabi, emphasize the most important topics and add your own material or notes in the ebook. \n\nAssign live, gradable interactive virtual machine labs and let your students explore and practice different solutions in a safe, sandbox environment using real Cisco hardware and virtualized operating systems. \n\nUse the Security for Life activities to help build student interest in the cybersecurity field, as well as lifelong learning habits. Each module includes a Reflection discussion prompt that encourages self-reflection and open sharing among classmates. \n\nPre- and post-course assessment quizzes help students understand what prior knowledge they bring into the course and then help them measure their progress throughout and identify any skills where they need additional practice.

Mark Ciampa

Dr. Mark Ciampa is a professor of information systems in the Gordon Ford College of Business at Western Kentucky University in Bowling Green, Kentucky. Prior to this current role, he served as an associate professor and the director of academic computing at Volunteer State Community College in Gallatin, Tennessee, for 20 years. Dr. Ciampa has worked in the IT industry as a computer consultant for businesses, government agencies and educational institutions. He has published more than 20 articles in peer-reviewed journals and has written more than 25 technology textbooks, including CompTIA CySA+ Guide to Cybersecurity Analyst, Security+ Guide to Network Security Fundamentals, Security Awareness: Applying Practical Security in Your World, CWNA Guide to Wireless LANS, and Guide to Wireless Communications. Dr. Ciampa holds a Ph.D. in technology management with a specialization in digital communication systems from Indiana State University and has certifications in security and healthcare.
  • MindTap is an outcome-driven application that propels students from memorization to mastery. It’s the only platform that gives you complete ownership of your course. With it, you can challenge every student, build their confidence and empower them to be unstoppable.
  • ACCESS EVERYTHING YOU NEED IN ONE PLACE. Cut down on prep with preloaded, organized course materials in MindTap. Teach more efficiently with interactive multimedia, assignments, quizzes and more. And give your students the power to read, listen and study on their phones, so they can learn on their terms.
  • EMPOWER YOUR STUDENTS TO REACH THEIR POTENTIAL. Twelve distinct metrics give you actionable insights into student engagement. Identify topics troubling your entire class and instantly communicate with struggling students. And students can track their scores to stay motivated toward their goals. Together, you can accelerate progress.
  • YOUR COURSE. YOUR CONTENT. Only MindTap gives you complete control over your course. You have the flexibility to reorder textbook chapters, add your own notes and embed a variety of content including OER. Personalize course content to your students’ needs. They can even read your notes, add their own and highlight key text to aid their progress.
  • A DEDICATED TEAM, WHENEVER YOU NEED THEM. MindTap isn’t just a tool; it’s backed by a personalized team eager to support you. Get help setting up your course and tailoring it to your specific objectives. You’ll be ready to make an impact from day one. And, we’ll be right here to help you and your students throughout the semester—and beyond.
  • Updated Live Virtual Machine Labs within MindTap give learners hands-on practice troubleshooting, exploring and trying different solutions in a safe, sandbox environment using real hardware and virtualized operating systems.
  • Pre- and post-course assessment quizzes help students understand what prior knowledge they bring into the course and then help them measure their progress throughout and identify any skills where they need additional practice.
  • Lab Simulations with remediation capabilities provide students with a simulated environment to develop foundational troubleshooting skills in a guided environment.
  • The Adaptive Test Prep App gives students a low-stakes place to create mock certification exams for practice, boosting their exam confidence without the pressure of a grade.
I. SECURITY FUNDAMENTALS
1. Introduction to Security
a. Who are the attackers?
i. Categories of threat actors
ii. Attributes of actors
b. Attack vectors and their causes
i. Avenues of attacks
ii. Vulnerabilities that create attack vectors
iii. Social engineering attacks
c. Cybersecurity standards
i. Regulations and standards
ii. Frameworks
iii. Configuration guidelines
d. Sources of information
i. Threat intelligence sources
ii. Research sources
2. Security Evaluations
a. Security assessments
i. Threat hunting
ii. Vulnerability scans
iii. Security information and event management (SIEM)
iv. Security orchestration, automation, response (SOAR)
b. Penetration testing
i. What is penetration testing?
ii. Types of reconnaissance
iii. Exercise types (
II. DEVICE SECURITY
3. Threats and Attacks on Devices
a. Attacks using malware
i. Circulation
ii. Infection
iii. Concealment
iv. Payload capabilities
b. Adversarial AI attacks
c. Application attacks
i. Web server application attacks
ii. Hijacking
iii. Overflow attacks
iv. Advertising attacks
v. Browser vulnerabilities
4. Client and Application Security
a. Securing client devices
i. Endpoint protection
ii. Boot integrity
iii. Database protection
iv. Hardware and software protection
b. Creating and deploying SecDevOps
i. Application development
ii. Secure coding techniques
iii. Code testing
5. Mobile, Embedded and Specialized Device Security
a. Securing mobile devices
i. Mobile device types and deployment
ii. Mobile device risks
iii. Securing mobile devices
iv. Mobile management tools
b. Embedded and IoT device security
i. Types of embedded systems
ii. IoT devices
iii. Specialized devices
c. Keeping specialized devices secure
i. Vulnerabilities
ii. Securing communications
III. CRYPTOGRAPHY
6. Basic Cryptography
a. Defining cryptography
b. Cryptographic algorithms
c. Cryptographic attacks
d. Using cryptography
7. Advanced Cryptography and PKI
a. Implementing cryptography
b. Digital certificates
c. Public Key Infrastructure (PKI)
d. Cryptographic transport protocols
IV. NETWORK SECURITY
8. Network Threats, Assessments, and Defenses
a. Attacks on networks
i. Interception
ii. Poisoning
iii. Denial of Service
b. Assessing network and organizational security
i. Network reconnaissance and discovery
ii. File manipulation
iii. Shell and script environments
iv. Packet capture and replay
c. Physical security defenses
i. External perimeter defenses
ii. Internal physical access security
iii. Computer hardware security
9. Network Security Design and Technologies
a. Security through network devices
i. Standard network devices
ii. Network security hardware
b. Security through architecture and design
c. Implementing secure protocols
d. Enterprise network security concepts
i. Configuration management
ii. Data protection
10. Wireless Network Security
a. Wireless attacks
i. Bluetooth attacks
ii. Near field communication attacks
iii. Radio frequency identification attacks
iv. Wireless local area network attacks
b. Vulnerabilities of IEEE wireless security
c. Wireless security solutions
i. Wi-Fi Protected Access
ii. Wi-Fi Protected Access 2
iii. Additional wireless security protections
11. Cloud and Virtualization Security
a. Cloud security
i. Cloud concepts and models
ii. Cloud security solutions
1. Cloud security controls
2. Cloud security solutions
b. Virtualization security
i. Virtualization concepts
ii. Securing virtual environments
ENTERPRISE SECURITY
12. Identity and Access Management (IAM)
a. Authentication credentials
i. What you know: passwords
ii. What you have: tokens, cards, and cell phones
iii. What you are: biometrics
iv. What you do: behavioral biometrics
v. Where you are: geolocation
b. Identity and account management controls
c. Access services
13. Incident Response and Investigation
a. Incident response plans and procedures
i. What is an incident response plan?
ii. Incident response exercises
iii. Attack frameworks
b. Investigating an incident by using data sources
c. Digital forensics
i. What is forensics?
ii. Forensics procedures
14. Cybersecurity Resilience
a. Control types
b. Techniques for resiliency
i. Redundancy
ii. Replication
iii. Data backups
c. Using organizational policies for security
15. Risk Management and Data Privacy
a. Managing risk
i. Threat assessment
ii. Risk assessment
b. Protecting sensitive data
i. Data types
ii. Consequences of privacy breaches
iii. Breach notifications
iv. Roles and responsibilities
v. Privacy enhancing technologies
MindTap
Each MindTap product offers the full, mobile-ready textbook combined with superior and proven learning tools at one affordable price. Students who purchase digital access can add a print option at any time when a print option is available for their course.

This Cengage solution can be seamlessly integrated into most Learning Management Systems (Blackboard, Brightspace by D2L, Canvas, Moodle, and more) but does require a different ISBN for access codes. Please work with your Cengage Learning Consultant to ensure the proper course set up and ordering information. For additional information, please visit the LMS Integration site.

Standalone Digital Access — Ultimate Value

Recommended and most popular

  • ISBN-10: 0357424425
  • ISBN-13: 9780357424421
  • RETAIL $99.95

  • ISBN-10: 0357424409
  • ISBN-13: 9780357424407
  • RETAIL $99.95

Cengage provides a range of supplements that are updated in coordination with the main title selection. For more information about these supplements, contact your Learning Consultant.

FOR STUDENTS

MindTap for Ciampa's CompTIA Security+ Guide to Network Security Fundamentals, 1 Term Instant Access

ISBN: 9780357424407
MindTap for Ciampa's CompTIA Security+ Guide to Network Security Fundamentals 7th edition is the digital learning solution that powers students from memorization to mastery. It gives you complete control of your course--to provide engaging content, to challenge every individual and to build their confidence. Empower students to accelerate their progress with MindTap. \n\nMindTap gives you full ownership of your content and learning experience. Customize the interactive syllabi, emphasize the most important topics and add your own material or notes in the ebook. \n\nAssign live, gradable interactive virtual machine labs and let your students explore and practice different solutions in a safe, sandbox environment using real Cisco hardware and virtualized operating systems. \n\nUse the Security for Life activities to help build student interest in the cybersecurity field, as well as lifelong learning habits. Each module includes a Reflection discussion prompt that encourages self-reflection and open sharing among classmates. \n\nPre- and post-course assessment quizzes help students understand what prior knowledge they bring into the course and then help them measure their progress throughout and identify any skills where they need additional practice.