CompTIA security+ review guide
This review guide is broken into six parts, each one corresponding to one of the six domain areas of the Security+ exam: systems security, network infrastructure, access control, assessments and audits, cryptography, and organizational security. You'll find this book to be essential reading if...
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Indianapolis, Indiana :
Wiley
2009.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627810406719 |
Tabla de Contenidos:
- Cover; Title Page; Copyright; Publisher's Note; Dedication; Acknowledgments; About the Author; Introduction; Chapter 1: Systems Security; 1.1 Differentiate among various systems security threats.; 1.2 Explain the security risks pertaining to system hardware and peripherals.; 1.3 Implement OS hardening practices and procedures to achieve workstation and server security.; 1.4 Carry out the appropriate procedures to establish application security.; 1.5 Implement security applications.; 1.6 Explain the purpose and application of virtualization technology.; Review Questions
- Answers to Review QuestionsChapter 2: Network Infrastructure; 2.1 Differentiate between the different ports & protocols, their respective threats and mitigation techniques.; 2.2 Distinguish between network design elements and components.; 2.3 Determine the appropriate use of network security tools to facilitate network security.; 2.4 Apply the appropriate network tools to facilitate network security.; 2.5 Explain the vulnerabilities and mitigations associated with network devices.; 2.6 Explain the vulnerabilities and mitigations associated with various transmission media.
- 2.7 Explain the vulnerabilities and implement mitigations associated with wireless networking.Review Questions; Answers to Review Questions; Chapter 3: Access Control; 3.1 Identify and apply industry best practices for access control methods.; 3.2 Explain common access control models and the differences between each.; 3.3 Organize users and computers into appropriate security groups and roles while distinguishing between appropriate rights and privileges.; 3.4 Apply appropriate security controls to file and print resources.; 3.5 Compare and implement logical access control methods.
- 3.6 Summarize the various authentication models and identify the components of each.3.7 Deploy various authentication models and identify the components of each.; 3.8 Explain the difference between identification and authentication (identity proofing).; 3.9 Explain and apply physical access security methods.; Review Questions; Answers to Review Questions; Chapter 4: Assessments and Audits; 4.1 Conduct risk assessments and implement risk mitigation.; 4.2 Carry out vulnerability assessments using common tools.
- 4.3 Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning.4.4 Use monitoring tools on systems and networks and detect security-related anomalies.; 4.5 Compare and contrast various types of monitoring methodologies.; 4.6 Execute proper logging procedures and evaluate the results.; 4.7 Conduct periodic audits of system security settings.; Review Questions; Answers to Review Questions; Chapter 5: Cryptography; 5.1 Explain general cryptography concepts.
- 5.2 Explain basic hashing concepts and map various algorithms to appropriate applications.