Mike Meyers' CompTIA Security+ Certification Passport, Second Edition

Author:   T. J. Samuelle
Publisher:   McGraw-Hill Education - Europe
Edition:   2nd edition
ISBN:  

9780071601238


Pages:   448
Publication Date:   16 January 2009
Format:   Book
Availability:   In Print   Availability explained
Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock.

Our Price $79.17 Quantity:  
Add to Cart

Share |

Mike Meyers' CompTIA Security+ Certification Passport, Second Edition


Add your own review!

Overview

From the #1 Name in Professional Certification Get on the fast track to becoming CompTIA Security+ certified with this affordable, portable study tool. Inside, network security expert T.J. Samuelle guides you on your career path, providing expert tips and sound advice along the way. With an intensive focus only on what you need to know to pass the CompTIA Security+ exam, this certification passport is your ticket to success on exam day. Featuring: Itineraries--List of official exam objectives covered ETAs--Amount of time needed to complete each lesson Travel Advisories--Expert advice on critical topics Local Lingo--Concise definitions of key terms and concepts Travel Assistance--Recommended resources for more information Exam Tips--Common exam pitfalls and solutions Checkpoints--End-of-chapter questions, answers, and explanations Career Flight Path--Career options mapped out to maximize the return from your IT journey Practice exam on CD powered by LearnKey

Full Product Details

Author:   T. J. Samuelle
Publisher:   McGraw-Hill Education - Europe
Imprint:   McGraw-Hill Professional
Edition:   2nd edition
Dimensions:   Width: 15.20cm , Height: 2.30cm , Length: 22.90cm
Weight:   0.612kg
ISBN:  

9780071601238


ISBN 10:   0071601236
Pages:   448
Publication Date:   16 January 2009
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Book
Publisher's Status:   Out of Print
Availability:   In Print   Availability explained
Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock.

Table of Contents

Check-In Part I: Systems Security Chapter 1. System Security Threats and Risks Objective 1.01 Differentiate Among Various Systems Security Threats Object 1.02 Explain System Hardware and Peripheral Risks Chapter 2. System Software Security Objective 2.01 Implement OS Hardening Practices Objective 2.02 Establish Application Security Objective 2.03 Implement Security Applications Objective 2.04 Explain Virtualization Technology Part II: Network Infrastructure Chapter 3. Network Security Objective 3.01 Network Ports and Protocol Threats Objective 3.02 Network Design Elements and Components Objective 3.03 Network Device Vulnerabilities Objective 3.04 Transmission Media Vulnerabilities Chapter 4. Network Security Tools and Wireless Security Objective 4.01 Determine and Apply Appropriate Network Security Tools Objective 4.02 Explain Wireless Networking Vulnerabilities and Implement Mitigations Part III: Access Control Chapter 5. Access Control Objective 5.01 Identify and Apply Access Control Methods Objective 5.02 Explain Common Access Control Models Objective 5.03 Organize Appropriate Security Groups, Roles, Rights, and Privileges Objective 5.04 Apply File and Print Security Controls Objective 5.05 Compare and Implement Logical Access Control Methods Chapter 6. Authentication Objective 6.01 Explain Identification and Authentication Objective 6.02 Identify Authentication Models Objective 6.03 Deploy Authentication Models Objective 6.04 Apply Physical Access Security Part IV: Assessments and Audits Chapter 7. Risk and Vulnerability Assessment Objective 7.01 Conduct Risk Assessments Objective 7.02 Perform Vulnerability Assessments Objective 7.03 Penetration Testing and Vulnerability Chapter 8. Monitoring and Auditing Objective 8.01 Monitor and Detect Security-Related Anomalies Objective 8.02 Compare Monitoring Methodologies Objective 8.03 Execute Proper Logging Procedures Objective 8.04 Conduct System Audits Part V: Cryptography Chapter 9. Cryptography and Encryption Overview Objective 9.01 Explain General Cryptography Concepts Objective 9.02 Explain Basic Hashing Concepts Objective 9.03 Explain Basic Encryption Concepts Objective 9.04 Explain and Implement Protocols Chapter 10. Public Key Cryptography Objective 10.01 Public Key Cryptography Objective 10.02 Certificate Management Part VI: Organizational Security Chapter 11. Redundancy and Environmental Planning Objective 11.01 Explain Redundancy Planning Objective 11.02 Explain Environmental Controls Chapter 12. Disaster Recovery and Incident Response Objective 12.01 Implement Disaster Recovery Procedures Objective 12.02 Execute Incident Response Procedures Chapter 13. Organizational Policies and Procedures Objective 13.01 Explain Legislation and Organizational Policies Objective 13.02 Reduce the Risks of Social Engineering Appendix A: About the CD-ROM Appendix B: Career Flight Path Index

Reviews

Author Information

Trevor Kay (London Ontario, Canada), Network+, Server+, Security+, is an IT consultant and author of a number of computer books on CompTIA certifications. Trevor has held many IT positions, including IT helpdesk, desktop and network support, and network administration. Trevor served as a subject matter expert for CompTIA on the Network+ and Security+ exams, and is the author of the Linux+ Bible, the Server+ Bible, and the Network+ Bible, all from Wiley.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List