Casp compTia advanced security practitioner study guide

CompTIA-approved, best-selling prep for CompTIA''s Advanced Security Practitioner certification, updated for the CAS-002 exam CASP: CompTIA Advanced Security Practitioner Study Guide: CAS-002 is the updated edition of the bestselling book covering the CASP certification exam. CompTIA appro...

Full description

Bibliographic Details
Other Authors: Gregg, Michael, author (author), Fung, Judy, book designer (book designer), Bell, Nancy, proofreader (proofreader), Laux, Ted, bibliographic antecedent (bibliographic antecedent)
Format: eBook
Language:Inglés
Published: Indianapolis, Indiana : Sybex 2014.
Edition:2nd ed
Subjects:
See on Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009849136006719
Table of Contents:
  • Cover; Title Page; Copyright; Contents; Foreword; Introduction; Assessment Test; Chapter 1 Cryptographic Tools and Techniques; The History of Cryptography; Cryptographic Services; Cryptographic Goals; Cryptographic Terms; Cipher Types and Methods; Symmetric Encryption; Data Encryption Standard; Triple DES; Advanced Encryption Standard; International Data Encryption Algorithm; Rivest Cipher Algorithms; Asymmetric Encryption; Diffie-Hellman; RSA; Elliptic Curve Cryptography; ElGamal; Hybrid Encryption; Hashing; Hashing and Message Digests; MD Series; SHA; HAVAL; Message Authentication Code
  • HMACDigital Signatures; Public Key Infrastructure; Certificate Authority; Registration Authority; Certificate Revocation List; Digital Certificates; Certificate Distribution; The Client's Role in PKI; Implementation of Cryptographic Solutions; Application Layer Encryption; Transport Layer Encryption; Internet Layer Controls; Physical Layer Controls; Steganography; Cryptographic Attacks; Summary; Exam Essentials; Review Questions; Chapter 2 Comprehensive Security Solutions; Advanced Network Design; Network Authentication Methods; 802.1x; Mesh Networks; Remote Access
  • Virtual Networking and Placement of Security ComponentsSCADA; VoIP; TCP/IP; Network Interface Layer; Internet Layer; Transport Layer; Application Layer; Secure Communication Solutions; Network Data Flow; SSL Inspection; Domain Name Service; Securing Zone Transfers; Start of Authority; Secure DNS; Transaction Signature; Fast Flux DNS; Lightweight Directory Access Protocol; Secure Directory Services; Active Directory; Security Information and Event Management; Database Activity Monitoring; Federated ID; Single Sign-On; Kerberos; Secure Facility Solutions; Building Layouts; Facilities Management
  • Secure Network Infrastructure DesignRouter Configuration; Enterprise Service Bus; Web Services Security; Summary; Exam Essentials; Review Questions; Chapter 3 Securing Virtualized, Distributed, and Shared Computing; Enterprise Security; Software-Defined Networking; Cloud Computing; Cloud Computing Models; Cloud Computing Providers and Hosting Options; Benefits of Cloud Computing; Security of On-Demand/Elastic Cloud Computing; Cloud Computing Vulnerabilities; Cloud Storage; Cloud-Augmented Security Services; Virtualization; Virtualized Servers; Virtual LANs
  • Virtual Networking and Security ComponentsEnterprise Storage; Summary; Exam Essentials; Review Questions; Chapter 4 Host Security; Firewalls and Network Access Control; Host-Based Firewalls; Trusted Operating Systems; Endpoint Security Solutions; Common Threats to Endpoint Security; Anti-malware; Antivirus; Anti-spyware; Spam Filters; Host Hardening; Asset Management; Data Exfiltration; Intrusion Detection and Prevention; Network Management, Monitoring, and Security Tools; Security Devices; Operational and Consumer Network-Enabled Devices; Summary; Exam Essentials; Review Questions
  • Chapter 5 Application Security and Penetration Testing