|
![]() |
|||
|
||||
OverviewFrom the #1 Name in Professional Certification Get on the fast track to becoming CompTIA Security+ certified with this affordable, portable study tool. Inside, network security expert T.J. Samuelle guides you on your career path, providing expert tips and sound advice along the way. With an intensive focus only on what you need to know to pass the CompTIA Security+ exam, this certification passport is your ticket to success on exam day. Featuring: Itineraries--List of official exam objectives covered ETAs--Amount of time needed to complete each lesson Travel Advisories--Expert advice on critical topics Local Lingo--Concise definitions of key terms and concepts Travel Assistance--Recommended resources for more information Exam Tips--Common exam pitfalls and solutions Checkpoints--End-of-chapter questions, answers, and explanations Career Flight Path--Career options mapped out to maximize the return from your IT journey Practice exam on CD powered by LearnKey Full Product DetailsAuthor: T. J. SamuellePublisher: McGraw-Hill Education - Europe Imprint: McGraw-Hill Professional Edition: 2nd edition Dimensions: Width: 15.20cm , Height: 2.30cm , Length: 22.90cm Weight: 0.612kg ISBN: 9780071601238ISBN 10: 0071601236 Pages: 448 Publication Date: 16 January 2009 Audience: Professional and scholarly , Professional & Vocational Format: Book Publisher's Status: Out of Print Availability: In Print ![]() Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock. Table of ContentsCheck-In Part I: Systems Security Chapter 1. System Security Threats and Risks Objective 1.01 Differentiate Among Various Systems Security Threats Object 1.02 Explain System Hardware and Peripheral Risks Chapter 2. System Software Security Objective 2.01 Implement OS Hardening Practices Objective 2.02 Establish Application Security Objective 2.03 Implement Security Applications Objective 2.04 Explain Virtualization Technology Part II: Network Infrastructure Chapter 3. Network Security Objective 3.01 Network Ports and Protocol Threats Objective 3.02 Network Design Elements and Components Objective 3.03 Network Device Vulnerabilities Objective 3.04 Transmission Media Vulnerabilities Chapter 4. Network Security Tools and Wireless Security Objective 4.01 Determine and Apply Appropriate Network Security Tools Objective 4.02 Explain Wireless Networking Vulnerabilities and Implement Mitigations Part III: Access Control Chapter 5. Access Control Objective 5.01 Identify and Apply Access Control Methods Objective 5.02 Explain Common Access Control Models Objective 5.03 Organize Appropriate Security Groups, Roles, Rights, and Privileges Objective 5.04 Apply File and Print Security Controls Objective 5.05 Compare and Implement Logical Access Control Methods Chapter 6. Authentication Objective 6.01 Explain Identification and Authentication Objective 6.02 Identify Authentication Models Objective 6.03 Deploy Authentication Models Objective 6.04 Apply Physical Access Security Part IV: Assessments and Audits Chapter 7. Risk and Vulnerability Assessment Objective 7.01 Conduct Risk Assessments Objective 7.02 Perform Vulnerability Assessments Objective 7.03 Penetration Testing and Vulnerability Chapter 8. Monitoring and Auditing Objective 8.01 Monitor and Detect Security-Related Anomalies Objective 8.02 Compare Monitoring Methodologies Objective 8.03 Execute Proper Logging Procedures Objective 8.04 Conduct System Audits Part V: Cryptography Chapter 9. Cryptography and Encryption Overview Objective 9.01 Explain General Cryptography Concepts Objective 9.02 Explain Basic Hashing Concepts Objective 9.03 Explain Basic Encryption Concepts Objective 9.04 Explain and Implement Protocols Chapter 10. Public Key Cryptography Objective 10.01 Public Key Cryptography Objective 10.02 Certificate Management Part VI: Organizational Security Chapter 11. Redundancy and Environmental Planning Objective 11.01 Explain Redundancy Planning Objective 11.02 Explain Environmental Controls Chapter 12. Disaster Recovery and Incident Response Objective 12.01 Implement Disaster Recovery Procedures Objective 12.02 Execute Incident Response Procedures Chapter 13. Organizational Policies and Procedures Objective 13.01 Explain Legislation and Organizational Policies Objective 13.02 Reduce the Risks of Social Engineering Appendix A: About the CD-ROM Appendix B: Career Flight Path IndexReviewsAuthor InformationTrevor Kay (London Ontario, Canada), Network+, Server+, Security+, is an IT consultant and author of a number of computer books on CompTIA certifications. Trevor has held many IT positions, including IT helpdesk, desktop and network support, and network administration. Trevor served as a subject matter expert for CompTIA on the Network+ and Security+ exams, and is the author of the Linux+ Bible, the Server+ Bible, and the Network+ Bible, all from Wiley. Tab Content 6Author Website:Countries AvailableAll regions |