CompTIA Security+ Review Guide (eBook)

Exam SY0-401
eBook Download: EPUB
2014 | 3. Auflage
456 Seiten
John Wiley & Sons (Verlag)
978-1-118-92290-3 (ISBN)

Lese- und Medienproben

CompTIA Security+ Review Guide - James Michael Stewart
Systemvoraussetzungen
20,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Focused review for the CompTIA Security+ certification exam

The CompTIA Security+ certification offers tremendousopportunities for IT professionals. For those who want to taketheir careers to the next level, CompTIA Security+ Review Guide:Exam SY0-401 is here to serve as a great resource forcertification preparation. This concise, focused guide is easy touse and is organized by each exam objective for quick review andreinforcement of key topics. You'll find information on networksecurity, compliance and operational security, and threats andvulnerabilities. Additionally, this indispensable resource delvesinto application, data, and host security, access control andidentity management, and cryptography. Whether you're looking toachieve Security+ certification or simply get up to speed on key ITsecurity concepts, this review guide brings together lessons on themost essential topics.

In addition to the content in the book, you'll have access tomore than 100 practice exam questions, electronic flashcards, and asearchable glossary of key terms.
* Serves as an essential review guide for Security+ certificationexam
* Split into six sections that cover the most essential topicsfor professionals interested in Security+ certification and othercertifications
* Features additional resources featured on companion website,including practice exam questions, electronic flashcards, and aglossary of key terms

More than 250,000 IT professionals have earned their Security+certification since it was founded. Join the thousands who areexcelling in their IT careers and get a head start on reviewing forone of the field's most sought after certifications.

James Michael Stewart, Security+, CISSP, CEH, CHFI, is asecurity expert, full-time writer, trainer, and researcher forImpact Online, an independent courseware development company. Hehas authored and contributed to over 75 books, including previouseditions of the CompTIA Security+ Review Guide, and theCISSP Study Guide, both by Sybex. Stewart provides ITinstruction across the globe for various public and privateorganizations.

Introduction xxv

Chapter 1 Network Security 1

1.1 Implement security configuration parameters on network devices and other technologies 5

1.2 Given a scenario, use secure network administration principles 22

1.3 Explain network design elements and components 27

1.4 Given a scenario, implement common protocols and services 40

1.5 Given a scenario, troubleshoot security issues related to wireless networking 56

Chapter 2 Compliance and Operational Security 69

2.1 Explain the importance of risk-related concepts 76

2.2 Summarize the security implications of integrating systems and data with third parties 92

2.3 Given a scenario, implement appropriate riskmitigation strategies 96

2.4 Given a scenario, implement basic forensic procedures 101

2.5 Summarize common incident response procedures 106

2.6 Explain the importance of security-related awareness and training 111

2.7 Compare and contrast physical security and environmental controls 123

2.8 Summarize risk-management best practices 135

2.9 Given a scenario, select the appropriate control to meet the goals of security 148

Chapter 3 Threats and Vulnerabilities 155

3.1 Explain types of malware 161

3.2 Summarize various types of attacks 167

3.3 Summarize social engineering attacks and the associated effectiveness with each attack 184

3.4 Explain types of wireless attacks 188

3.5 Explain types of application attacks 194

3.6 Analyze a scenario and select the appropriate type of mitigation and deterrent techniques 201

3.7 Given a scenario, use appropriate tools and techniques to discover security threats and vulnerabilities 211

3.8 Explain the proper use of penetration testing versus vulnerability scanning 217

Chapter 4 Application, Data, and Host Security 225

4.1 Explain the importance of application security controls and techniques 229

4.2 Summarize mobile security concepts and technologies 235

4.3 Given a scenario, select the appropriate solution to establish host security 244

4.4 Implement the appropriate controls to ensure data security 251

4.5 Compare and contrast alternative methods to mitigate security risks in static environments 257

Chapter 5 Access Control and Identity Management 267

5.1 Compare and contrast the function and purpose of authentication services 270

5.2 Given a scenario, select the appropriate authentication, authorization, or access control 275

5.3 Install and configure security controls when performing account management, based on best practices 289

Chapter 6 Cryptography 299

6.1 Given a scenario, utilize general cryptography concepts 302

6.2 Given a scenario, use appropriate cryptographic methods 331

6.3 Given a scenario, use appropriate PKI, certificate management, and associated components 344

Appendix A Answers to Review Questions 359

Chapter 1: Network Security 360

Chapter 2: Compliance and Operational Security 360

Chapter 3: Threats and Vulnerabilities 361

Chapter 4: Application, Data, and Host Security 362

Chapter 5: Access Control and Identity Management 363

Chapter 6: Cryptography 364

Appendix B About the Additional Study Tools 367

Additional Study Tools 368

Sybex Test Engine 368

Electronic Flashcards 368

PDF of Glossary of Terms 368

Adobe Reader 368

System Requirements 369

Using the Study Tools 369

Troubleshooting 369

Customer Care 370

Index 371

Erscheint lt. Verlag 5.5.2014
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Weitere Themen Zertifizierung
Schlagworte Certification (MSCE, Novell, etc.) • CompTIA • Prüfungsvorbereitung • Prüfungsvorbereitung • Test Prep • Zertifizierung f. MSCE u. Novell
ISBN-10 1-118-92290-5 / 1118922905
ISBN-13 978-1-118-92290-3 / 9781118922903
Haben Sie eine Frage zum Produkt?
EPUBEPUB (Adobe DRM)

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belle­tristik und Sach­büchern. Der Fließ­text wird dynamisch an die Display- und Schrift­größe ange­passt. Auch für mobile Lese­geräte ist EPUB daher gut geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
49,90