A Guide to Cyber Security Career Development

Total Page:16

File Type:pdf, Size:1020Kb

A Guide to Cyber Security Career Development A GUIDE TO CYBER SECURITY CAREER DEVELOPMENT DIGITAL WORLD SHAPE IT Looking to upskill your knowledge and climb up the Cyber Security ladder? Confused by the industry certifications landscape and trying to decide which one is right for you? Check out our handy guide to Cyber Security Professional Certifications currently available in Scotland (as of June 2019) Cyber Cyber Cyber Cyber Cyber Cyber Security Cyber Cyber Forensic Security and Security Security Security Security Security Project Security Security DevSecOps Computer Incident Penetration Risk Compliance Security Analyst Architect Engineer Instructor Manager Manager Researcher Technician Developer Analyst Responder Tester Adviser Auditor Consultant • CASP+ • CASP+ • CASP+ • CASP+ • EC-Council • CASP+ • CREST Certified • CASP+ • (ISC)2 CISSP • GCTI • CREST Certified • CREST Certified • CASP+ • (ISC)2 CISSP • (ISC)2 CISSP • CREST • CCIE Security • CCIE Security • (ISC)2 CISSP CCISO • (ISC)2 CISSP Malware Reverse • (ISC)2 CISSP • GNFA Network Simulated Attack • ISACA CISA • ISACA CISA • ISACA CISA EXPERT Certified Threat • (ISC)2 CISSP • (ISC)2 CISSP • ISACA CISA • (ISC)2 CISSP Engineer Intrusion Analyst Manager • ISACA CISM • ISACA CISM (5+ YEARS’ Intelligence • ISACA CISM • ISACA CGEIT • (ISC)2 CISSP • CREST Certified EXPERIENCE) Manager • ISACA CISM • GCTI Incident • (ISC)2 CISSP Manager • CREST • CREST • CCNP Enterprise • CCNP Security • GSLC • GCPM • GREM • CCNP Enterprise • (ISC)2 CSSLP • GASF • CREST • CREST Certified • ISACA CRISC • GCCC • CCNP Security Registered Registered • PMI PMP • PMI PMP • (ISC)2 CSSLP Registered Infrastructure • ISO 27001 • ISACA CRISC ADVANCED Threat Technical Intrusion Analyst Tester Auditor (3-5 YEARS’ Intelligence Security • CREST Certified EX-PERIENCE) Analyst Architect Simulated Attack • CCNP Security Specialist • ISACA CRISC • CompTIA CySA+ • AWS Associate – • AWS Associate – • CBCI • PRINCE2 • PRINCE2 • AWS Associate – • AWS Associate • GSSP • GCFA • CertNexus CFR • CompTIA • CBCI • Cloud Security • CBCI • CREST Solutions Solutions • CompTIA CySA+ Practitioner Practitioner Solutions – SysOps • Scrum Alliance • CREST PenTest+ • GDPR Alliance CCSK • CompTIA CySA+ Practitioner Architect Architect • CompTIA • CompTIA • CompTIA Architect Administrator CSM Practitioner • CREST Practitioner • GDPR • CompTIA Threat • Microsoft Azure • Microsoft Azure PenTest+ Cloud+ Cloud+ • MCSA • MCSA Intrusion Analyst Registered • ISO 27001 Practitioner PenTest+ INTERMEDIATE Intelligence Administrator Administrator • Cloud Security • GCIA Penetration Practitioner • ISO 27001 • PRINCE2 (2-3 YEARS’ Analyst Associate Associate Alliance CCSK Tester Practitioner Practitioner EXPERIENCE) • Splunk Core • PRINCE2 • OSCP • AWS Associate Certified Power Practitioner – Solutions User Architect • CCNA Cyber • CCNA • CCNA • CCNA • CompTIA • CompTIA • CompTIA Linux+ • CompTIA • CompTIA Linux+ • CompTIA • CompTIA • CompTIA • BCS CISMP • CompTIA • CCNA Ops • CompTIA • CompTIA • CompTIA Network+ Project+ • CompTIA Network+ • GWEB Security+ Security+ Network+ • CompTIA Security+ • CompTIA • CompTIA Security+ Security+ Security+ • CompTIA • CompTIA Security+ • CompTIA • LPIC-1 • EC-Council CHFI • GCIH • CompTIA Security+ • GSNA Security+ Network+ • CompTIA • CompTIA CTT+ Security+ Security+ • LPIC-1 Security+ • GCFE • (ISC)2 SSCP Security+ • GSEC • (ISC)2 CAP • EC-Council CEH FOUNDATION • CompTIA Server+ • EC-Council CEH • (ISC)2 SSCP • CREST • (ISC)2 CAP • ISO 27001 • GSEC (1-2 YEARS’ Security+ • EC-Council CND • ITIL Foundation • ITIL Foundation Practitioner • ISO 27001 Foundation EXPERIENCE) • GSEC Security Analyst Foundation • Splunk Core • EC-Council CEH Certified User • CompTIA Linux+ • LPIC-1 EXPERIENCE LEVEL APM Group CompTIA GIAC Microsoft FOUNDATION FOUNDATION FOUNDATION INTERMEDIATE • ISO 27001 Foundation • CTT+: Certified Technical Trainer • GCFE: GIAC Certified Forensics Examiner • Microsoft Azure Administrator Associate • Linux+ • GCIH: GIAC Certified Incident Handler • MCSA: Microsoft Certified Solutions Associate INTERMEDIATE • Network+ • GSNA: GIAC Systems and Network Auditors • GDPR Practitioner • Project+ • GSEC: GIAC Security Essentials Certification • ISO 27001 Practitioner Offensive Security • Security+ • GWEB: GIAC Certified Web Application Defender ADVANCED • Server+ INTERMEDIATE INTERMEDIATE • ISO 27001 Auditor • OSCP: Offensive Security Certified Professional INTERMEDIATE • GCFA: GIAC Certified Forensic Analyst • Cloud+ • GCIA: GIAC Certified Intrusion Analyst Amazon Web Services • CySA+: Cyber Security Analyst • GSSP: GIAC Secure Software Programmer PMI • PenTest+: Penetration Tester INTERMEDIATE ADVANCED ADVANCED • AWS Associate – Solutions Architect EXPERT • GASF: GIAC Advanced Smartphone Forensics • PMP: Project Management Professional • AWS Associate – SysOps Administrator • CASP+: CompTIA Advanced Security Practitioner • GCCC: GIAC Critical Controls Certification • GCPM: GIAC Certified Project Manager Certification Scrum Alliance Axelos Cloud Security Alliance • GSLC: GIAC Security Leadership • GREM: GIAC Reverse Engineering Malware INTERMEDIATE FOUNDATION INTERMEDIATE • CSM: Certified ScrumMaster EXPERT • ITIL Foundation • CCSK: Certificate of Cloud Security Knowledge • GCTI: GIAC Cyber Threat Intelligence INTERMEDIATE • GNFA: GIAC Network Forensic Analyst Splunk • PRINCE2 Practitioner CREST FOUNDATION FOUNDATION ISACA • Splunk Core Certified User Business Continuity Institute (BCI) • Practitioner Security Analyst ADVANCED INTERMEDIATE INTERMEDIATE INTERMEDIATE • CRISC: Certified in Risk and Information Systems • Splunk Core Certified Power User • CBCI: Certificate of the Business Continuity Institute • Practitioner Threat Intelligence Analyst Control • Practitioner Intrusion Analyst EXPERT British Computer Society (BCS) • Registered Penetration Tester • CGEIT: Certified in the Governance of Enterprise IT ADVANCED • CISA: Certified Information Systems Auditor FOUNDATION • Registered Threat Intelligence Analyst • CISM: Certified Information Security Manager • CISMP: Certificate of Information Security Management Principles • Registered Technical Security Architect • Registered Intrusion Analyst (ISC)2 • Certified Infrastructure Tester Cisco Systems • Certified Simulated Attack Specialist FOUNDATION • CAP: Security Assessment and Authorisation FOUNDATION EXPERT Certification • CCNA: Cisco Certified Network Associate • Certified Threat Intelligence Manager • SSCP: Systems Security Certified Practitioner • CCNA Cyber Ops: Cisco Certified Network Associate • Certified Malware Reverse Engineer Cyber Operations ADVANCED • Certified Network Intrusion Analyst • CSSLP: Certified Secure Software Lifecycle ADVANCED • Certified Incident Manager Professional • CCNP Enterprise: Cisco Certified Network • Certified Simulated Attack Manager Professional Enterprise EXPERT • CCNP Security: Cisco Certified Network • CISSP: Certified Information Systems Security Professional Security EC-Council Professional EXPERT FOUNDATION • CCIE Security: Cisco Certified Internetwork • CEH: Certified Ethical Hacker Linux Professional Institute Expert Security • CHFI: Computer Hacking Forensics Investigator FOUNDATION • CND: Certified Network Defender • LPIC-1: Systems Administrator CertNexus EXPERT INTERMEDIATE • CCISO: Certified Chief Information Security Officer • CFR: CyberSec First Responder.
Recommended publications
  • Employment Application
    CSX-P Application NYU Exam Passers September 2020 and Later *Designates Required Field APPLICANT DETAILS FULL NAME*: ISACA ID*: EMAIL*: PHONE: STEP 1: PASS EXAM Please provide the year that you passed the CSX-P Certification Exam. EXAM PASS YEAR*: STEP 2: EDUCATION AND WORK EXPERIENCE Please indicate if you hold any of the Certifications and/or Certificates, as well as if you have experience in any of the work domains listed below. Certifications and Certificates: Certified Information System Auditor (CISA) Certified in Risk and Information Systems Control (CRISC) Certified in the Governance of Enterprise IT (CGEIT) Certified Information Security Manager (CISM) Certified Ethical Hacker (CEH) EC-Council Certified Security Analyst (ECSA) Licensed Penetration Tester (LPT) GIAC Certified Incident Handler (GCIH) Offensive Security Certified Professional (OSCP) GIAC Certified Penetration Tester (GPEN) CompTIA Cybersecurity Analyst+ (CySA+) Certified Information Systems Security Professional (CISSP) CSX Cybersecurity Fundamentals CSX Penetration Testing Overview (CPTO) Other College/University Program Name* Work Experience Domains: Domain 1: Identify • Analyze network infrastructure and digital assets • Analyze network topology, data flows, and communication pathways • Perform security reviews and identify gaps in security architecture 1 • Contribute to the development of security policies and procedures • Interpret and evaluate impact of applicable regulations and laws • Participate in information sharing within the enterprise and with specialized
    [Show full text]
  • Provide Your Students with a Competitive Advantage
    Kaplan Credegree™ Provide your students with a competitive advantage The Kaplan Credegree is designed to enhance the job readiness and marketability of college students by partnering the traditional four-year degree program with Kaplan’s educational programs. This allows students to complete their four- year degree while also earning industry-recognized credentials that are highly valued by employers. The Kaplan Credegree appeals to employers Although the traditional academic experience creates a solid foundation for students, a recent Gallup study on higher education found that only 11% of business leaders strongly agree that college graduates are well- prepared for success in the workforce.* Considering that a more knowledgeable student has greater appeal to potential employers, it’s not surprising that a 2019 Quest Research Group survey found over 70% of respondents agreed that a Kaplan Credegree would help college students to have a more well-rounded education and overall skill set.** Universities also benefit from offering Kaplan Credegrees Right now, only 3% of institutions are making a major investment in alternative credentialing programs but 74% are at least experimenting.*** Kaplan works with universities to develop a customized mix of credential programs based on what makes the most sense for their respective degree programs and student needs. Universities that offer Kaplan Credegrees can benefit by: • Positioning graduates more effectively for future careers. • Increasing the tangible and perceived value of a graduate’s degree
    [Show full text]
  • Security Certifications - 2016 Security Certifications
    Security Certifications - 2016 Security Certifications Roy Gertig, CISSP SSCP CISA CISM Security+ SCSecA NSA-IAM/IEM PMP Project+ ITILv3 SSGB CVE4.0 TCC SCSA CIW-Pro Linux+ LPIC-1 SUSE-CLA Storage+ Server+ A+ N+ iNet+ CDIA+ Information current as of July 2016 © SAIC. All rights reserved. Disclaimer • The acronyms used throughout this presentation are either “registered®” or “trademarked™” and are a product of their respective companies • This presentation covers a multitude of certifications, but by no means is all inclusive • This presentation is to be used as a resource and the links throughout work as of today 3 S A IC.c om © SAIC. All rights reserved. | SAIC Communications Agenda • (ISC)2 and Test Builds • Government and Information Assurance • Overview of Security Certifications • Have some fun 4 S A IC.c om © SAIC. All rights reserved. | SAIC Communications First, a story • Reminiscence 5 S A IC.c om © SAIC. All rights reserved. | SAIC Communications What do these have in common? IRS / IG 6 S A IC.c om © SAIC. All rights reserved. | SAIC Communications Answer We’re here to help! 7 S A IC.c om © SAIC. All rights reserved. | SAIC Communications What do these have in common? (ISC) 2 / IRS 8 S A IC.c om © SAIC. All rights reserved. | SAIC Communications Answer They both want your money! 9 S A IC.c om © SAIC. All rights reserved. | SAIC Communications (ISC)2 Banquet . Workshop Timetable – Starts on a Friday AM, ends Sunday PM . NDA – 24 month limitation – Possible loss of CPE and Certs . Why hold workshops – Several times a year to update and refresh item test bank 10 S A IC.c om © SAIC.
    [Show full text]
  • Cybersecurity Fortification Initiative 2.0
    Annex Cybersecurity Fortification Initiative 2.0 The HKMA has conducted a holistic review of the Cybersecurity Fortification Initiative (CFI) taking into account i) the experience gained in the past few years; ii) feedback of authorized institutions (AIs) obtained via an industry survey and interviews with selected institutions; and iii) overseas developments and new practices. The HKMA then issued a consultation paper in January 2020 putting forward a set of recommendations to enhance the three pillars of the CFI. Two workshops were conducted with members of the Hong Kong Association of Banks (HKAB), one in March and another in June, to discuss the industry feedback received during the consultation. A revised CFI, or CFI 2.0, is subsequently developed, having regard to the findings of the review. The revised framework aims to simplify the assessment process while maintaining effective control standards that are commensurate with latest technology trends. Substantial efforts will be made to expand the talent supply and encourage cyber threat intelligence sharing across the industry. Details of the major enhancements are set out below. C-RAF 2.0 – Risk assessment Introduction of new and enhanced control principles reflecting recent international sound practices in cyber incident response and recovery, as well as latest technology trends (e.g. cloud technology and virtualisation security); Introduction of Blue team requirements for iCAST to measure the effectiveness of detection, response and recovery functions of AIs; Allowing more
    [Show full text]
  • Career Tracks Available After CEH
    APPENDIX A Career Tracks Available after CEH The goal of this appendix is to introduce the various certifications related to Information Security and provide tips on building a successful career in Information Security. According to a recent report from Forbes , the cyber security market is expected to grow from $75 Billion in 2015 to $170 Billion by 2020. According to another survey, there are around 209,000 vacant cyber security jobs in the United States. This clearly indicates that there is a huge demand for cyber security professionals worldwide. The leaders of major economies are also expressing serious concerns over the cyber security threats to their nations. With this being said, this appendix introduces some of the most in-demand Information Security certifications and some add-on tips to take your professional career to next level. Certifications There are literally dozens of certifications available on the market. This section lists some of the best and most in-demand certifications from various domains of Information Security. The Network Security Track This track helps you learn how to install, configure, deploy and manage various network security devices, like firewalls, intrusion detection systems, intrusion prevention systems, VPNs, and so on. Cisco offers certifications for gaining in-depth knowledge in network security systems. Following are a few of the certifications related to network security: Certification Description Vendor CCNA Cisco Certified Network Associate Cisco CCNA Security Cisco Certified Network Associate with specialization in Security Cisco CCNP Security Cisco Certified Network Professional with specialization in Security Cisco CCIE Security Cisco Certified Internetworking Expert with specialization in Security Cisco ArcSight ESM Security SIEM Certification HP Administrator and Analyst Splunk Administrator or Log Management Splunk Splunk Certified Architect © Sagar Ajay Rahalkar 2016 183 S.A.
    [Show full text]
  • Provide Your Students with a Competitive Advantage
    Provide your students with a competitive advantage. The Kaplan Credegree™ is designed to enhance the job readiness and marketability of college students by partnering the traditional degree program with Kaplan’s educational programs. This allows students to complete their degree while also earning industry-recognized credentials that are highly valued by employers. The Kaplan Credegree™ appeals to employers. Considering that a more knowledgeable student has greater appeal to potential employers, it’s not surprising that a 2019 Quest Research Group survey found over 70% of respondents agreed that a Kaplan Credegree would help college students to have a more well-rounded education and overall skill set.* Universities also benefit from offering Kaplan Credegree. Right now, only 3% of institutions are making a major investment in alternative credentialing programs but 74% are at least experimenting or have shown interest in alternative credentials.† Kaplan works with universities to develop a customized mix of credential programs based on what makes the most sense for their respective degrees and student needs. Universities that offer Kaplan Credegree can benefit by: • Positioning graduates more effectively for future careers • Increasing the tangible and perceived value of a graduate’s degree • Creating a consistent pipeline of work-ready graduates • Being positioned for corporate partnerships through the additional breadth and depth of offering * “Credegree Concept Survey,” Quest Research Group, December 12, 2019 † “The Changing Landscape of Online Education (CHLOE): Behind The Numbers,” CHLOE 3 Report, 2019 Why Kaplan? For over 80 years, Kaplan has been a trusted partner and provider of forward-thinking educational training programs. We offer programs for more than 80 different industry-recognized credentials and across a continually expanding portfolio of career tracks.
    [Show full text]
  • 2019 Catalog
    IT + Cyber Training 2019 Catalog Cybersecurity and IT Training By 2020, 75 percent of organizations will experience visible business disruptions due to skills gaps in infrastructure and operations.* Our mission is to close that skills gap. Focused on the transformative power of education, CyberVista provides premium cybersecurity and IT training for developing the workforce—both individuals and organizations. Through comprehensive training, organizations can better develop human capital, acquire the best talent, and prepare to respond to today’s evolving threats. By bringing Kaplan IT Training, formerly Transcender, and its 25 years of IT training into our portfolio, we now offer a comprehensive offering to deliver on our promise to strengthen technical job skills with the highest quality learning and exam preparation products and address the workforce need from both the employer and practitioner perspectives. We understand the challenges facing today’s large organizations. We work with government and enterprise organizations, from entry-level to the board, to offer flexible and effective training programs. cybervista.net/enterprise * Source: csoonline.com 2 | cybervista.net A Message From Our CEO Our company was founded to help solve a big problem—the cybersecurity competency gap. As a company that evolved from education juggernaut Kaplan, CyberVista’s DNA is that of an education company first and foremost. We help build skills and provide quality training to all cybersecurity and IT professionals. One way we do this is through our Certify certification preparation courses. We ensure that students not only pass their cert exams, but also have learned the underlying know-how and are ready to apply it to their trade.
    [Show full text]
  • Robert Scocca Resume
    ROBERT SCOCCA [email protected] | https://robertscocca.com/ Technical Skills ● Internal network, External network, Web Application, Wireless and Active Directory pentesting ● Kali Linux, Metasploit, Nessus, Burp-Suite, Nmap, SQLmap and Wireshark ● Malware analysis and exploit development experience with Immunity Debugger and Ollydbg ● Installing and using Debian, CentOS, Windows XP, 7, 10, Windows Server and other systems ● Linux administration, Virtual Private Servers, Web hosting, VMware and Virtualbox ● Python, Bash, Powershell, C, C++, and Javascript Experience Cosaint Cyber · Remote - Cyber Security Intern May 2021 – Present ● Static and dynamic Malware Analysis of ransomware,Linux administration and Assembly coding. Trilogy · Remote - Technology Tutor April 2021 – Present ● Support students in learning cyber security related topics such as pentesting and linux Administration Anjolen · Utica, NY - Cyber Security Technician October 2020 – Present ● Vulnerability Scanning, report writing, technician services, IT and Help desk services. ● Penetration Testing including Web application, External and Internal network pentesting. Utica College · Utica, NY - Research Assistant February 2021 – Present ● Researching digital forensics for designing a practical course for law enforcement. ● Building information security capture the flag competition and designing CTF challenges. Utica College · Utica, NY - Teachers Assistant August 2019 – August 2020 ● Inspired students during classes and in using ethical hacking tools and writing reports.
    [Show full text]
  • DIR Course PDF for Website
    Texas Department of Information Resources (DIR) 101001001001010101010 101010010101010010101 100010101010101110100 001010110100010101001 010001111010101011010 111010111000110101010 101001001001010101010001010101010111010101 101010010101010010101001010100000101001010 100010101010101110100 001010110100010101001 010001111010101011010 111010111000110101010 001010101010111010101 001010100000101001010 InfoSec Academy Learning Tree provides the training and operational management services for DIR’s InfoSec Academy. The Texas DIR InfoSec Academy provides security and education training support to state of Texas agencies and institutions of higher education. The security certification training list below and exams are included in the program: CCSP Certification - Gain a thorough understanding of the information security risks and mitigation Certified Cloud Security strategies critical to data security in the cloud with this (ISC)² Certified Cloud Professional Training and Security Professional (CCSP) training. This course covers the six domains of the ® Certification Exam Prep Official (ISC)² CCSP Common Body of Knowledge (CBK ) and prepares you to pass the CCSP exam and become a Certified Cloud Security Professional. Course 1213 • 5 Days CHFI Certification - EC-Council’s Computer Hacking Forensic Investigator (CHFI) certification Computer Hacking Forensic course outlines a detailed, methodological approach to computer forensic and Investigator Exam Prep evidence analysis, including searching and seizing, chain-of-custody, acquisition, preservation,
    [Show full text]
  • Complete Certified Ethical Hacker Prospectus
    CAREER READY EDUCATION Complete Certified Ethical Hacker Prospectus GET YOUR HANDS ON THE TECH WORLD www.learningpeople.com.au We’re proud to have been supporting and nurturing students in their professional growth since 2010. The tech world is in constant demand for people with up-to-date skills. However, pinpointing the exact skills you need to fill the skills gap can be a challenging task. We’re here to help you identify and navigate through this world of opportunities, develop a career you’re passionate about and in turn provide the tech world with more qualified professionals. We will empower you to make informed choices about your future by giving you the information and support you need to move through your journey with confidence and ease. We are here to help you get your hands “on the tech world. Careers overview 1 CompTIA A+ 3 CompTIA Network+ 5 CompTIA Security+ 7 CompTIA PenTest+ 9 CEH - Certified Ethical Hacker 11 About us 13 Why choose us? 14 Student benefits 15 Supporting you 16 Why online learning? 18 FAQs 22 Connect with us 23 Contact us 24 Cyber Security Our cyber security courses provide you with the teaching and certifications that are necessary to be a successful security professional. The qualifications are some of the best in the industry and all stand out as the most widely recognised when it comes to dealing with cyber security issues within a business. People who will significantly benefit from this collection are security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure of an organisation.
    [Show full text]
  • WG1, State of the Art Syllabus: Overview of Existing Cybersecurity
    STATE OF THE ART SYLLABUS Overview of existing Cybersecurity standards and certification schemes v2 WG1 – Standardisation, certification, labelling and supply chain management DECEMBER 2017 ECSO State of the Art Syllabus v2 ABOUT ECSO The European Cyber Security Organisation (ECSO) ASBL is a fully self-financed non-for-profit organisation under the Belgian law, established in June 2016. ECSO represents the contractual counterpart to the European Commission for the implementation of the Cyber Security contractual Public-Private Partnership (cPPP). ECSO members include a wide variety of stakeholders across EU Member States, EEA / EFTA Countries and H2020 associated countries, such as large companies, SMEs and Start-ups, research centres, universities, end-users, operators, clusters and association as well as European Member State’s local, regional and national administrations. More information about ECSO and its work can be found at www.ecs-org.eu. Contact For queries in relation to this document, please use [email protected]. For media enquiries about this document, please use [email protected]. Disclaimer The document is intended for reference purposes by ECSO WG1 and is allowed to be distributed outside ECSO. Despite the authors’ best efforts, no guarantee is given that the information in this document is complete and accurate. Readers of this document are encouraged to send any missing information or corrections to the ECSO WG1, please use [email protected]. This document integrates the contributions received from ECSO members until October 2017. Cybersecurity is a very dynamic field. As a result, standards and schemes for assessing Cybersecurity are being developed and updated frequently.
    [Show full text]
  • Comptia Project+ Cert Guide: Exam PK0-004
    CompTIA Project+ Cert Guide Robin Abernathy 800 East 96th Street Indianapolis, Indiana 46240 USA CompTIA Project+ Cert Guide Editor-in-Chief Copyright © 2018 by Pearson Education, Inc. Mark Taub All rights reserved. No part of this book shall be reproduced, stored in Product Line Manager a retrieval system, or transmitted by any means, electronic, mechanical, Brett Bartow photocopying, recording, or otherwise, without written permission from the publisher. No patent liability is assumed with respect to the use of the Acquisitions Editor information contained herein. Although every precaution has been taken in Michelle Newcomb the preparation of this book, the publisher and author assume no respon- Development Editor sibility for errors or omissions. Nor is any liability assumed for damages Robin Drake resulting from the use of the information contained herein. ISBN-13: 978-0-7897-5883-5 Managing Editor ISBN-10: 0-7897-5883-0 Sandra Schroeder Library of Congress Control Number: 2017944115 Senior Project Editor Printed in the United States of America Tonya Simpson First Printing: July 2017 Copy Editor Robin Drake Trademarks All terms mentioned in this book that are known to be trademarks or ser- Indexer vice marks have been appropriately capitalized. Pearson IT Certifi cation Publishing Works, Inc. cannot attest to the accuracy of this information. Use of a term in this book Proofreader should not be regarded as affecting the validity of any trademark or service mark. Gill Editorial Services Technical Editor Warning and Disclaimer Ann Lang Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fi tness is implied.
    [Show full text]