CompTIA security + study guide exam SYO-401

Join over 250,000 IT professionals who've earned Security+ certification If you're an IT professional hoping to progress in your career, then you know that the CompTIA Security+ exam is one of the most valuable certifications available. Since its introduction in 2002, over a quarter millio...

Descripción completa

Detalles Bibliográficos
Otros Autores: Dulaney, Emmett A., author (author), Easttom, Chuck, author (editor), Welch, Elizabeth, editor (cover designer), Woodhouse, Jeremy, cover designer
Formato: Libro electrónico
Idioma:Inglés
Publicado: Indianapolis, Indiana : John Wiley & Sons 2014.
Edición:6th ed
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628152306719
Tabla de Contenidos:
  • Cover; Title Page; Copyright; Contents; Introduction; Chapter 1 Measuring and Weighing Risk; Risk Assessment; Computing Risk Assessment; Acting on Your Risk Assessment; Risks Associated with Cloud Computing; Risks Associated with Virtualization; Developing Policies, Standards, and Guidelines; Implementing Policies; Understanding Control Types and False Positives/Negatives; Risk Management Best Practices; Disaster Recovery; Tabletop Exercise; Summary; Exam Essentials; Review Questions; Chapter 2 Monitoring and Diagnosing Networks; Monitoring Networks; Network Monitors; Understanding Hardening
  • Working with ServicesPatches; User Account Control; Filesystems; Securing the Network; Security Posture; Continuous Security Monitoring; Setting a Remediation Policy; Reporting Security Issues; Alarms; Alerts; Trends; Differentiating between Detection Controls and Prevention Controls; Summary; Exam Essentials; Review Questions; Chapter 3 Understanding Devices and Infrastructure; Mastering TCP/IP; OSI Relevance; Working with the TCP/IP Suite; IPv4 and IPv6; Understanding Encapsulation; Working with Protocols and Services; Designing a Secure Network; Demilitarized Zones; Subnetting
  • Virtual Local Area NetworksRemote Access; Network Address Translation; Telephony; Network Access Control; Understanding the Various Network Infrastructure Devices; Firewalls; Routers; Switches; Load Balancers; Proxies; Web Security Gateway; VPNs and VPN Concentrators; Intrusion Detection Systems; Understanding Intrusion Detection Systems; IDS vs. IPS; Working with a Network-Based IDS; Working with a Host-Based IDS; Working with NIPSs; Protocol Analyzers; Spam Filters; UTM Security Appliances; Summary; Exam Essentials; Review Questions
  • Chapter 4 Access Control, Authentication, and AuthorizationUnderstanding Access Control Basics; Identification vs. Authentication; Authentication (Single Factor) and Authorization; Multifactor Authentication; Layered Security and Defense in Depth; Network Access Control; Tokens; Federations; Potential Authentication and Access Problems; Authentication Issues to Consider; Authentication Protocols; Account Policy Enforcement; Users with Multiple Accounts/Roles; Generic Account Prohibition; Group-based and User-assigned Privileges; Understanding Remote Access Connectivity
  • Using the Point-to-Point ProtocolWorking with Tunneling Protocols; Working with RADIUS; TACACS/TACACS+/XTACACS; VLAN Management; SAML; Understanding Authentication Services; LDAP; Kerberos; Single Sign-On Initiatives; Understanding Access Control; Mandatory Access Control; Discretionary Access Control; Role-Based Access Control; Rule-Based Access Control; Implementing Access Controlling Best Practices; Least Privileges; Separation of Duties; Time of Day Restrictions; User Access Review; Smart Cards; Access Control Lists; Port Security; Working with 802.1X; Flood Guards and Loop Protection
  • Preventing Network Bridging