Book description
This is the eBook version of the print title. Note that the eBook does not provide access to the practice test software that accompanies the print book. Access to the videos and exercises is available through product registration at Pearson IT Certification; or see instructions in back pages of your eBook.
Learn, prepare, and practice for CompTIA Security+ SY0-401 exam success with this CompTIA Authorized Cert Guide, Deluxe Edition from Pearson IT Certification, a leader in IT Certification learning and a CompTIA Authorized Platinum Partner. The DVD features three complete practice exams, complete video solutions to 31 hands-on labs, plus 31 interactive flash-based simulations that include drag-and-drop and matching to reinforce the learning.
Master CompTIA’s Security+ SY0-401 exam topics
Assess your knowledge with chapter-ending quizzes
Reinforce your knowledge of key concepts with chapter review activities
Practice with realistic exam questions on the DVD
Includes complete video solutions to 31 hands-on labs
Plus 31 interactive simulations on key exam topics
CompTIA Security+ SY0-401 Authorized Cert Guide, Deluxe Edition includes video solutions to the hands-on labs, practice tests, and interactive simulations that let the reader learn by doing. Best-selling author and expert instructor David L. Prowse shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.
The book presents you with an organized test preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Chapter review activities help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your approach to passing the exam.
Interactive Simulations:
2-1: Identifying Malware Types
2-2: Securing the BIOS
2-4: Filtering E-mails
3-3: Stopping Services in the Command Prompt
4-1: Securing Web Browsers
5-1: Creating a DMZ
5-3: Defending against the Web Shell
6-1a: Understanding Port Numbers, Part A
6-1b: Understanding Port Numbers, Part B
6-1c: Understanding Port Numbers, Part C
6-2a: Identifying Network Attacks, Part A
6-2b: Identifying Network Attacks, Part B
6-2c: Identifying Network Attacks, Part C
6-2d: Identifying Network Attacks, Part D
7-1: Configuring a Firewall's Ruleset
8-4: Planning Network Security
9-1: Choosing Physical Security Methods
9-2: Selecting the Correct Authentication Technology
9-3: Understanding 802.1X
10-1: Password Strength
10-2: Configuring Logon Hours
10-3: Understanding Access Control Models
11-1a: Risk Assessment, Part A
11-1b: Risk Assessment, Part B
11-1c: Vulnerability Management Process
12-1: Capturing and Analyzing Packets
12-2: Deciphering Log Files
13-1: Understanding Symmetric and Asymmetric Algorithms
15-1: Configuring RAID
16-1a: Identifying Social Engineering Attacks, Part A
16-1b: Identifying Social Engineering Attacks, Part B
Hands-On Labs Video Solutions:
2-1: Using Free Malware Scanning Programs
2-2: Securing the BIOS
2-3: Securing Mobile Devices
3-1: Discerning and Updating Service Pack Level
3-2: Securing a Virtual Machine
3-3: Working with Services in Windows and Linux
4-1: Securing Web Browsers
4-2: Whitelisting and Blacklisting Applications with a Windows Server Policy
5-2: Subnetting a Network
6-1: Scanning Ports
7-2: Configuring Packet Filtering and NAT
7-3: Configuring an Inbound Filter
8-1: Securing a Wireless Device
8-2: Enabling MAC Filtering
8-3: Wardriving and the Cure
9-3: Understanding 802.1X
9-4: Setting Up a Secure VPN
10-1: Configuring Complex Passwords
10-2: Configuring Password Policies and User Accounts Restrictions
10-4: Configuring User and Group Permissions
11-2: Mapping and Scanning the Network
11-3: Defending Against Password Cracking
12-1: Capturing and Analyzing Packets
12-2: Deciphering Log Files
12-3: Auditing Files
13-1: Understanding Symmetric and Asymmetric Algorithms
13-2: Disabling the LM Hash
14-1: Understanding PKI
14-2: Making an SSH Connection
15-1: Configuring RAID
17-1: Analyzing Test Questions
Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this CompTIA authorized study guide helps you master the concepts and techniques that will allow you to succeed on the exam the first time.
The CompTIA authorized study guide helps you master all the topics on the Security+ exam, including
Core computer system security
OS hardening and virtualization
Application security
Network design elements and threats
Perimeter security
Network media and devices security
Physical security and authentication models
Access control
Vulnerability and risk assessment
Monitoring and auditing
Cryptography, including PKI
Redundancy and disaster recovery
Policies and procedures
Table of contents
- About This eBook
- Title Page
- Copyright Page
- Contents at a Glance
- Table of Contents
- About the Author
- Dedication
- Acknowledgments
- About the Reviewers
- We Want to Hear from You!
- Reader Services
- CompTIA®
- Introduction
- Chapter 1. Introduction to Security
- Chapter 2. Computer Systems Security
- Chapter 3. OS Hardening and Virtualization
- Chapter 4. Application Security
- Chapter 5. Network Design Elements
- Chapter 6. Networking Protocols and Threats
- Chapter 7. Network Perimeter Security
- Chapter 8. Securing Network Media and Devices
- Chapter 9. Physical Security and Authentication Models
- Chapter 10. Access Control Methods and Models
- Chapter 11. Vulnerability and Risk Assessment
- Chapter 12. Monitoring and Auditing
- Chapter 13. Encryption and Hashing Concepts
- Chapter 14. PKI and Encryption Protocols
- Chapter 15. Redundancy and Disaster Recovery
- Chapter 16. Policies, Procedures, and People
- Chapter 17. Taking the Real Exam
- Practice Exam 1: SY0-401
- Glossary
- Index
- Appendix A. View Recommended Resources
- Appendix B. Master List of Key Topics
- CompTIA Security+ Acronyms
-
Case Studies
- Case Studies for Chapter 2
- Case Study Solutions
- Case Studies for Chapter 3
- Case Study Solutions
- Case Studies for Chapter 4
- Case Study Solutions
- Case Studies for Chapter 5
- Case Study Solutions
- Case Studies for Chapter 6
- Case Study Solutions
- Case Studies for Chapter 7
- Case Study Solutions
- Case Studies for Chapter 8
- Case Study Solutions
- Case Studies for Chapter 9
- Case Study Solutions
- Case Studies for Chapter 10
- Case Study Solutions
- Case Studies for Chapter 11
- Case Study Solutions
- Case Studies for Chapter 12
- Case Study Solutions
- Case Studies for Chapter 13
- Case Study Solutions
- Case Studies for Chapter 14
- Case Study Solutions
- Case Study for Chapter 15
- Case Study Solution
- Case Studies for Chapter 16
- Case Study Solutions
- Case Study for Chapter 17
- Practice Exam 2: SY0-401
- Where are the Companion Content Files?
Product information
- Title: CompTIA® Security+ SY0-401 Cert Guide, Deluxe Edition, Third Edition
- Author(s):
- Release date: July 2014
- Publisher(s): Pearson IT Certification
- ISBN: 9780133836523
You might also like
book
CompTIA® Security+™ SY0-401 Exam Cram, Fourth Edition
The Publisher regrets that the CD/DVD content for this title cannot be made available Online. CompTIA® …
book
Bring Your Own Devices (BYOD) Survival Guide
Where end-users once queued up to ask the IT department for permission to buy a new …
book
Intercloud: Solving Interoperability and Communication in a Cloud of Clouds
The complete guide to Cisco ® Intercloud: use cases, planning, and deployment Using Cisco Intercloud technologies, …
article
Use GitHub Copilot: Additional Tips
Using GitHub Copilot can feel like magic. The tool automatically fills out entire blocks of code--but …