CompTIA security + study guide exam SYO-401
Join over 250,000 IT professionals who've earned Security+ certification If you're an IT professional hoping to progress in your career, then you know that the CompTIA Security+ exam is one of the most valuable certifications available. Since its introduction in 2002, over a quarter millio...
Otros Autores: | , , , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Indianapolis, Indiana :
John Wiley & Sons
2014.
|
Edición: | 6th ed |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628152306719 |
Tabla de Contenidos:
- Cover; Title Page; Copyright; Contents; Introduction; Chapter 1 Measuring and Weighing Risk; Risk Assessment; Computing Risk Assessment; Acting on Your Risk Assessment; Risks Associated with Cloud Computing; Risks Associated with Virtualization; Developing Policies, Standards, and Guidelines; Implementing Policies; Understanding Control Types and False Positives/Negatives; Risk Management Best Practices; Disaster Recovery; Tabletop Exercise; Summary; Exam Essentials; Review Questions; Chapter 2 Monitoring and Diagnosing Networks; Monitoring Networks; Network Monitors; Understanding Hardening
- Working with ServicesPatches; User Account Control; Filesystems; Securing the Network; Security Posture; Continuous Security Monitoring; Setting a Remediation Policy; Reporting Security Issues; Alarms; Alerts; Trends; Differentiating between Detection Controls and Prevention Controls; Summary; Exam Essentials; Review Questions; Chapter 3 Understanding Devices and Infrastructure; Mastering TCP/IP; OSI Relevance; Working with the TCP/IP Suite; IPv4 and IPv6; Understanding Encapsulation; Working with Protocols and Services; Designing a Secure Network; Demilitarized Zones; Subnetting
- Virtual Local Area NetworksRemote Access; Network Address Translation; Telephony; Network Access Control; Understanding the Various Network Infrastructure Devices; Firewalls; Routers; Switches; Load Balancers; Proxies; Web Security Gateway; VPNs and VPN Concentrators; Intrusion Detection Systems; Understanding Intrusion Detection Systems; IDS vs. IPS; Working with a Network-Based IDS; Working with a Host-Based IDS; Working with NIPSs; Protocol Analyzers; Spam Filters; UTM Security Appliances; Summary; Exam Essentials; Review Questions
- Chapter 4 Access Control, Authentication, and AuthorizationUnderstanding Access Control Basics; Identification vs. Authentication; Authentication (Single Factor) and Authorization; Multifactor Authentication; Layered Security and Defense in Depth; Network Access Control; Tokens; Federations; Potential Authentication and Access Problems; Authentication Issues to Consider; Authentication Protocols; Account Policy Enforcement; Users with Multiple Accounts/Roles; Generic Account Prohibition; Group-based and User-assigned Privileges; Understanding Remote Access Connectivity
- Using the Point-to-Point ProtocolWorking with Tunneling Protocols; Working with RADIUS; TACACS/TACACS+/XTACACS; VLAN Management; SAML; Understanding Authentication Services; LDAP; Kerberos; Single Sign-On Initiatives; Understanding Access Control; Mandatory Access Control; Discretionary Access Control; Role-Based Access Control; Rule-Based Access Control; Implementing Access Controlling Best Practices; Least Privileges; Separation of Duties; Time of Day Restrictions; User Access Review; Smart Cards; Access Control Lists; Port Security; Working with 802.1X; Flood Guards and Loop Protection
- Preventing Network Bridging