Book description
This review guide is broken into six parts, each one corresponding to one of the six domain areas of the Security+ exam: systems security, network infrastructure, access control, assessments and audits, cryptography, and organizational security. You’ll find this book to be essential reading if you are studying for Security+ certification and want to get up to speed on the most recent security topics. The CD-ROM contains more than 120 review questions, two bonus exams, electronic flashcards, and a searchable key term database.
Table of contents
- Copyright
- Dear Reader
- Dedication
- Acknowledgments
- About the Author
- Introduction
-
Systems Security
- Differentiate among various systems security threats.
- Explain the security risks pertaining to system hardware and peripherals.
- Implement OS hardening practices and procedures to achieve workstation and server security.
- Carry out the appropriate procedures to establish application security.
- Implement security applications.
- Explain the purpose and application of virtualization technology.
- Review Questions
- Answers to Review Questions
-
Network Infrastructure
- Differentiate between the different ports & protocols, their respective threats and mitigation techniques.
- Distinguish between network design elements and components.
- Determine the appropriate use of network security tools to facilitate network security.
- Apply the appropriate network tools to facilitate network security.
- Explain the vulnerabilities and mitigations associated with network devices.
- Explain the vulnerabilities and mitigations associated with various transmission media.
- Explain the vulnerabilities and implement mitigations associated with wireless networking.
- Review Questions
- Answers to Review Questions
-
Access Control
- Identify and apply industry best practices for access control methods.
- Explain common access control models and the differences between each.
- Organize users and computers into appropriate security groups and roles while distinguishing between appropriate rights and privileges.
- Apply appropriate security controls to file and print resources.
- Compare and implement logical access control methods.
- Summarize the various authentication models and identify the components of each.
- Deploy various authentication models and identify the components of each.
- Explain the difference between identification and authentication (identity proofing).
- Explain and apply physical access security methods.
- Review Questions
- Answers to Review Questions
-
Assessments and Audits
- Conduct risk assessments and implement risk mitigation.
- Carry out vulnerability assessments using common tools.
- Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning.
- Use monitoring tools on systems and networks and detect security-related anomalies.
- Compare and contrast various types of monitoring methodologies.
- Execute proper logging procedures and evaluate the results.
- Conduct periodic audits of system security settings.
- Review Questions
- Answers to Review Questions
-
Cryptography
- Explain general cryptography concepts.
- Explain basic hashing concepts and map various algorithms to appropriate applications.
- Explain basic encryption concepts and map various algorithms to appropriate applications.
- Explain and implement protocols.
- Explain core concepts of public key cryptography.
- Implement PKI and certificate management.
- Review Questions
- Answers to Review Questions
-
Organizational Security
- Explain redundancy planning and its components.
- Implement disaster recovery procedures.
- Differentiate between and execute appropriate incident response procedures.
- Identify and explain applicable legislation and organizational policies.
- Explain the importance of environmental controls.
- Explain the concept of and how to reduce the risks of social engineering.
- Review Questions
- Answers to Review Questions
- About the Companion CD
- Index
Product information
- Title: CompTIA Security+™: Review Guide
- Author(s):
- Release date: December 2008
- Publisher(s): Sybex
- ISBN: 9780470404843
You might also like
book
CMMI for Development : Implementation Guide
Apply best practices and proven methods to ensure a successful CMMi implementation. This practical book shows …
article
Reinventing the Organization for GenAI and LLMs
Previous technology breakthroughs did not upend organizational structure, but generative AI and LLMs will. We now …
book
Hacker Techniques, Tools, and Incident Handling
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Hacker Techniques, …
book
Automating Active Directory® Administration with Windows PowerShell® 2.0
Focused content on automating the user authentication and authorization tool for Windows environments Automation helps make …