Book description
Take charge of your career with certification that can increase your marketability. This new edition of the top-selling Guide is what you need to prepare for CompTIA's Security+ SY0-101 exam.
Developed to meet the exacting requirements of today's certification candidates and aspiring IT security professionals, this fully updated, comprehensive book features:
Clear and concise information on crucial security topics.
Practical examples and hands-on labs to prepare you for actual on-the-job situations.
Authoritative coverage of all key exam topics including general security concepts; communication, infrastructure, operational, and organizational security; and cryptography basics.
The Guide covers all exam objectives, demonstrates implementation of important instructional design principles, and provides instructional reviews to help you assess your readiness for the exam. Additionally, the Guide includes a CD-ROM with advanced testing software, all chapter review questions, and bonus exams as well as electronic flashcards that run on your PC, Pocket PC, or Palm handheld.
Join the more than 20,000 security professionals who have earned this certification with the CompTIA authorized Study Guide.
Table of contents
- Copyright
- Introduction
- Assessment Test
-
1. General Security Concepts
- 1.1. Understanding Information Security
- 1.2. Understanding the Goals of Information Security
-
1.3. Comprehending the Security Process
- 1.3.1. Appreciating Antivirus Software
- 1.3.2. Implementing Access Control
-
1.3.3. Understanding Authentication
- 1.3.3.1. Username/Password
- 1.3.3.2. Password Authentication Protocol (PAP)
- 1.3.3.3. Challenge Handshake Authentication Protocol (CHAP)
- 1.3.3.4. Certificates
- 1.3.3.5. Security Tokens
- 1.3.3.6. Kerberos
- 1.3.3.7. Multi-Factor Authentication
- 1.3.3.8. Smart Cards
- 1.3.3.9. Biometrics
- 1.3.3.10. Authentication Issues to Consider
- 1.3.4. Understanding Networking Services and Protocols
- 1.4. Distinguishing Between Security Topologies
- 1.5. Summary
- 1.6. Exam Essentials
- 1.7. Hands-On Labs
- 1.8. Review Questions
- 1.9. Answers to Review Questions
-
2. Identifying Potential Risks
- 2.1. Calculating Attack Strategies
- 2.2. Recognizing Common Attacks
- 2.3. Identifying TCP/IP Security Concerns
- 2.4. Understanding Software Exploitation
- 2.5. Surviving Malicious Code
- 2.6. Understanding Social Engineering
- 2.7. An Introduction to Auditing Processes and Files
- 2.8. Summary
- 2.9. Exam Essentials
- 2.10. Hands-On Labs
- 2.11. Review Questions
- 2.12. Answers to Review Questions
-
3. Infrastructure and Connectivity
- 3.1. Understanding Infrastructure Security
- 3.2. Understanding the Different Network Infrastructure Devices
- 3.3. Monitoring and Diagnosing Networks
- 3.4. Securing Workstations and Servers
- 3.5. Understanding Mobile Devices
- 3.6. Understanding Remote Access
- 3.7. Securing Internet Connections
- 3.8. Understanding SNMP and Other TCP/IP Protocols
- 3.9. The Basics of Cabling, Wires, and Communications
- 3.10. Employing Removable Media
- 3.11. Summary
- 3.12. Exam Essentials
- 3.13. Hands-On Labs
- 3.14. Review Questions
- 3.15. Answers to Review Questions
-
4. Monitoring Activity and Intrusion Detection
- 4.1. Monitoring the Network
- 4.2. Understanding Intrusion Detection Systems
- 4.3. Working with Wireless Systems
- 4.4. Understanding Instant Messaging's Features
- 4.5. Working with 8.3 File Naming
- 4.6. Understanding Packet Sniffing
- 4.7. Understanding Signal Analysis and Intelligence
- 4.8. Summary
- 4.9. Exam Essentials
- 4.10. Hands-On Labs
- 4.11. Review Questions
- 4.12. Answers to Review Questions
-
5. Implementing and Maintaining a Secure Network
- 5.1. Overview of Network Security Threats
- 5.2. Defining Security Baselines
-
5.3. Hardening the OS and NOS
- 5.3.1. Configuring Network Protocols
- 5.3.2. Hardening Microsoft Windows 2000
- 5.3.3. Hardening Microsoft Windows XP
- 5.3.4. Hardening Windows Server 2003
- 5.3.5. Hardening Unix/Linux
- 5.3.6. Hardening Novell NetWare
- 5.3.7. Hardening Apple Macintosh
- 5.3.8. Hardening Filesystems
- 5.3.9. Updating Your Operating System
- 5.4. Hardening Network Devices
- 5.5. Hardening Applications
- 5.6. Summary
- 5.7. Exam Essentials
- 5.8. Hands-On Labs
- 5.9. Review Questions
- 5.10. Answers to Review Questions
-
6. Securing the Network and Environment
- 6.1. Understanding Physical and Network Security
- 6.2. Understanding Business Continuity Planning
- 6.3. Developing Policies, Standards, and Guidelines
- 6.4. Working with Security Standards and ISO 17799
- 6.5. Classifying Information
- 6.6. Summary
- 6.7. Exam Essentials
- 6.8. Hands-On Lab
- 6.9. Review Questions
- 6.10. Answers to Review Questions
-
7. Cryptography Basics, Methods, and Standards
- 7.1. An Overview of Cryptography
- 7.2. Understanding Cryptographic Algorithms
- 7.3. Using Cryptographic Systems
- 7.4. Using Public Key Infrastructure
- 7.5. Preparing for Cryptographic Attacks
-
7.6. Understanding Cryptography Standards and Protocols
- 7.6.1. The Origins of Encryption Standards
- 7.6.2. PKIX/PKCS
- 7.6.3. X.509
- 7.6.4. SSL and TLS
- 7.6.5. CMP
- 7.6.6. S/MIME
- 7.6.7. SET
- 7.6.8. SSH
- 7.6.9. PGP
- 7.6.10. HTTPS
- 7.6.11. S-HTTP
- 7.6.12. IPSec
- 7.6.13. FIPS
- 7.6.14. Common Criteria
- 7.6.15. WTLS
- 7.6.16. WEP
- 7.6.17. ISO 17799
- 7.7. Understanding Key Management and the Key Life Cycle
- 7.8. Summary
- 7.9. Exam Essentials
- 7.10. Hands-On Labs
- 7.11. Review Questions
- 7.12. Answers to Review Questions
-
8. Security Policies and Procedures
- 8.1. Understanding Business Continuity
- 8.2. Reinforcing Vendor Support
- 8.3. Generating Policies and Procedures
- 8.4. Enforcing Privilege Management
- 8.5. Summary
- 8.6. Exam Essentials
- 8.7. Hands-On Labs
- 8.8. Review Questions
- 8.9. Answers to Review Questions
-
9. Security Management
- 9.1. Understanding Computer Forensics
-
9.2. Understanding Security Management
-
9.2.1. Drafting Best Practices and Documentation
-
9.2.1.1. Using Policies and Procedures
- 9.2.1.1.1. Information Classification and Notification Policies
- 9.2.1.1.2. Information Retention and Storage Policies
- 9.2.1.1.3. Information Destruction Policies
- 9.2.1.1.4. Security Policy
- 9.2.1.1.5. Use Policy
- 9.2.1.1.6. Backup Policy
- 9.2.1.1.7. Configuration Management Policies
- 9.2.1.1.8. Logs and Inventories
- 9.2.1.1.9. System Architecture
- 9.2.1.1.10. Change Documentation
- 9.2.1.1.11. User Management
- 9.2.1.2. Allocating Resources
- 9.2.1.3. Defining Responsibility
- 9.2.1.4. Minimizing Mistakes
- 9.2.1.5. Enforcing the Policies and Procedures
-
9.2.1.1. Using Policies and Procedures
-
9.2.1. Drafting Best Practices and Documentation
- 9.3. Understanding Security Awareness and Education
- 9.4. Staying on Top of Security
-
9.5. Regulating Privacy and Security
- 9.5.1. Health Insurance Portability and Accountability Act
- 9.5.2. Gramm-Leach-Bliley Act of 1999
- 9.5.3. Computer Fraud and Abuse Act
- 9.5.4. Family Educational Rights and Privacy Act
- 9.5.5. Computer Security Act of 1987
- 9.5.6. Cyberspace Electronic Security Act
- 9.5.7. Cyber Security Enhancement Act
- 9.5.8. Patriot Act
- 9.5.9. Familiarizing Yourself with International Efforts
- 9.6. Summary
- 9.7. Exam Essentials
- 9.8. Hands-On Labs
- 9.9. Review Questions
- 9.10. Answers to Review Questions
- Glossary
Product information
- Title: CompTIA Security+™: Study Guide, Third Edition
- Author(s):
- Release date: May 2006
- Publisher(s): Sybex
- ISBN: 9780470036686
You might also like
book
Executive Guide to Information Security, The: Threats, Challenges, and Solutions
Praise for The Executive Guide to Information Security "In today's world, no business can operate without …
book
The Process of Investigation, 4th Edition
The Process of Investigation, Fourth Edition addresses the needs of today’s private sector investigative professional by …
book
Integrated Security Systems Design, 2nd Edition
Integrated Security Systems Design, 2nd Edition, is recognized as the industry-leading book on the subject of …
book
Healthcare Information Technology Exam Guide for CompTIA Healthcare IT Technician and HIT Pro Certifications
The Complete Healthcare Information Technology Reference and Exam Guide Gain the skills and knowledge required to …