CompTIA Security+ study guide
Comprehensive Coverage to Help You Prepare for the SY0-201 Exam and Beyond This CompTIA Authorized Study Guide provides complete coverage of the objectives for CompTIA's Security+ Exam (SY0-201), with clear and concise information on crucial security topics. Learn from practical examples and i...
Autor principal: | |
---|---|
Otros Autores: | |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
San Francisco, CA : Chichester :
Sybex ; John Wiley [distributor]
2009.
|
Edición: | 4th ed |
Colección: | Sybex serious skills
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627376706719 |
Tabla de Contenidos:
- CompTIA Security+ Study Guide, Fourth Edition; Acknowledgments; About the Author; Contents at a Glance; Contents; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: General Security Concepts; Understanding Information Security; Understanding the Goals of Information Security; Comprehending the Security Process; Authentication Issues to Consider; Distinguishing between Security Topologies; Summary; Exam Essentials; Hands-On Labs; Review Questions; Answers to Review Questions; Chapter 2: Identifying Potential Risks; Calculating Attack Strategies; Recognizing Common Attacks
- Identifying TCP/IP Security ConcernsUnderstanding Software Exploitation; Understanding OVAL; Surviving Malicious Code; Understanding Social Engineering; Introducing Auditing Processes and Files; Summary; Exam Essentials; Hands-On Labs; Review Questions; Answers to Review Questions; Chapter 3: Infrastructure and Connectivity; Understanding Infrastructure Security; Understanding the Different Network Infrastructure Devices; Monitoring and Diagnosing Networks; Securing Workstations and Servers; Understanding Mobile Devices; Understanding Remote Access; Securing Internet Connections
- Understanding Network ProtocolsThe Basics of Cabling, Wires, and Communications; Employing Removable Storage; Summary; Exam Essentials; Hands-On Labs; Review Questions; Answers to Review Questions; Chapter 4: Monitoring Activity and Intrusion Detection; Monitoring the Network; Understanding Intrusion Detection Systems; Working with Wireless Systems; Understanding Instant Messaging's Features; Working with 8.3 File Naming; Understanding Protocol Analyzers; Understanding Signal Analysis and Intelligence; Summary; Exam Essentials; Hands-On Labs; Review Questions; Answers to Review Questions
- Chapter 5: Implementing and Maintaining a Secure NetworkOverview of Network Security Threats; Defining Security Baselines; Hardening the OS and NOS; Hardening Network Devices; Hardening Applications; Summary; Exam Essentials; Hands-On Labs; Review Questions; Answers to Review Questions; Chapter 6: Securing the Network and Environment; Understanding Physical and Network Security; Understanding Business Continuity Planning; Developing Policies, Standards, and Guidelines; Working with Security Standards and ISO 17799; Classifying Information; Summary; Exam Essentials; Hands-On Lab
- Review QuestionsAnswers to Review Questions; Chapter 7: Cryptography Basics, Methods, and Standards; An Overview of Cryptography; Understanding Cryptographic Algorithms; Using Cryptographic Systems; Using Public Key Infrastructure; Preparing for Cryptographic Attacks; Understanding Cryptography Standards and Protocols; Understanding Key Management and the Key Life Cycle; Summary; Exam Essentials; Hands-On Labs; Review Questions; Answers to Review Questions; Chapter 8: Security Policies and Procedures; Understanding Business Continuity; Reinforcing Vendor Support
- Generating Policies and Procedures