Mike Meyers' CompTIA Security+ Certification Passport, Second Edition - T. J. Samuelle

Mike Meyers' CompTIA Security+ Certification Passport, Second Edition

(Autor)

Buch
448 Seiten
2009 | 2nd edition
McGraw-Hill Professional (Verlag)
978-0-07-160123-8 (ISBN)
24,15 inkl. MwSt
zur Neuauflage
  • Titel erscheint in neuer Auflage
  • Artikel merken
Zu diesem Artikel existiert eine Nachauflage
Now in its second edition, this concise, affordable, and portable study tool helps you prepare for the new release of the Security+ exam from CompTIA.
From the #1 Name in Professional Certification

Get on the fast track to becoming CompTIA Security+ certified with this affordable, portable study tool. Inside, network security expert T.J. Samuelle guides you on your career path, providing expert tips and sound advice along the way. With an intensive focus only on what you need to know to pass the CompTIA Security+ exam, this certification passport is your ticket to success on exam day.

Featuring:



Itineraries--List of official exam objectives covered
ETAs--Amount of time needed to complete each lesson
Travel Advisories--Expert advice on critical topics
Local Lingo--Concise definitions of key terms and concepts
Travel Assistance--Recommended resources for more information
Exam Tips--Common exam pitfalls and solutions
Checkpoints--End-of-chapter questions, answers, and explanations
Career Flight Path--Career options mapped out to maximize the return from your IT journey
Practice exam on CD powered by LearnKey

Trevor Kay (London Ontario, Canada), Network+, Server+, Security+, is an IT consultant and author of a number of computer books on CompTIA certifications. Trevor has held many IT positions, including IT helpdesk, desktop and network support, and network administration. Trevor served as a subject matter expert for CompTIA on the Network+ and Security+ exams, and is the author of the Linux+ Bible, the Server+ Bible, and the Network+ Bible, all from Wiley.

Check-In
Part I: Systems Security
Chapter 1. System Security Threats and Risks
Objective 1.01 Differentiate Among Various Systems Security Threats
Object 1.02 Explain System Hardware and Peripheral Risks
Chapter 2. System Software Security
Objective 2.01 Implement OS Hardening Practices
Objective 2.02 Establish Application Security
Objective 2.03 Implement Security Applications
Objective 2.04 Explain Virtualization Technology
Part II: Network Infrastructure
Chapter 3. Network Security
Objective 3.01 Network Ports and Protocol Threats
Objective 3.02 Network Design Elements and Components
Objective 3.03 Network Device Vulnerabilities
Objective 3.04 Transmission Media Vulnerabilities
Chapter 4. Network Security Tools and Wireless Security
Objective 4.01 Determine and Apply Appropriate Network Security Tools
Objective 4.02 Explain Wireless Networking Vulnerabilities and Implement Mitigations
Part III: Access Control
Chapter 5. Access Control
Objective 5.01 Identify and Apply Access Control Methods
Objective 5.02 Explain Common Access Control Models
Objective 5.03 Organize Appropriate Security Groups, Roles, Rights, and Privileges
Objective 5.04 Apply File and Print Security Controls
Objective 5.05 Compare and Implement Logical Access Control Methods
Chapter 6. Authentication
Objective 6.01 Explain Identification and Authentication
Objective 6.02 Identify Authentication Models
Objective 6.03 Deploy Authentication Models
Objective 6.04 Apply Physical Access Security
Part IV: Assessments and Audits
Chapter 7. Risk and Vulnerability Assessment
Objective 7.01 Conduct Risk Assessments
Objective 7.02 Perform Vulnerability Assessments
Objective 7.03 Penetration Testing and Vulnerability
Chapter 8. Monitoring and Auditing
Objective 8.01 Monitor and Detect Security-Related Anomalies
Objective 8.02 Compare Monitoring Methodologies
Objective 8.03 Execute Proper Logging Procedures
Objective 8.04 Conduct System Audits
Part V: Cryptography
Chapter 9. Cryptography and Encryption Overview
Objective 9.01 Explain General Cryptography Concepts
Objective 9.02 Explain Basic Hashing Concepts
Objective 9.03 Explain Basic Encryption Concepts
Objective 9.04 Explain and Implement Protocols
Chapter 10. Public Key Cryptography
Objective 10.01 Public Key Cryptography
Objective 10.02 Certificate Management
Part VI: Organizational Security
Chapter 11. Redundancy and Environmental Planning
Objective 11.01 Explain Redundancy Planning
Objective 11.02 Explain Environmental Controls
Chapter 12. Disaster Recovery and Incident Response
Objective 12.01 Implement Disaster Recovery Procedures
Objective 12.02 Execute Incident Response Procedures
Chapter 13. Organizational Policies and Procedures
Objective 13.01 Explain Legislation and Organizational Policies
Objective 13.02 Reduce the Risks of Social Engineering
Appendix A: About the CD-ROM
Appendix B: Career Flight Path
Index

Erscheint lt. Verlag 16.1.2009
Zusatzinfo 100 Illustrations, unspecified
Sprache englisch
Maße 152 x 229 mm
Gewicht 612 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Weitere Themen Zertifizierung
Schlagworte Security+ Certification
ISBN-10 0-07-160123-6 / 0071601236
ISBN-13 978-0-07-160123-8 / 9780071601238
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich