Introduction Preparing for the exam CHAPTER 1 Implement server hardening solutions CHAPTER 2 Secure a Virtualization Infrastructure CHAPTER 3 Secure a network infrastructure CHAPTER 4 Manage Privileged Identities CHAPTER 5 Implement threat detection solutions CHAPTER 6 Implement workload-specific security Index
Contributors
Author Info
Warner, Timothy L. Timothy L. Warner has worked in nearly every facet of IT, from systems administration and software architecture to technical writing and training. ZACKER, CRAIG Craig Zacker is a writer, editor, and educator who has written or contributed to dozens of IT books, college texts, and online training courses.