CompTIA security+ review guide /
"This review guide is broken into six parts, each one corresponding to one of the six domain areas of the Security+ exam: systems security, network infrastructure, access control, assessments and audits, cryptography, and organizational security. You'll find this book to be essential readi...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Indianapolis, Ind. :
Wiley Pub.,
©2009.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Cover; Title Page; Copyright; Publisher's Note; Dedication; Acknowledgments; About the Author; Introduction; Chapter 1: Systems Security; 1.1 Differentiate among various systems security threats.; 1.2 Explain the security risks pertaining to system hardware and peripherals.; 1.3 Implement OS hardening practices and procedures to achieve workstation and server security.; 1.4 Carry out the appropriate procedures to establish application security.; 1.5 Implement security applications.; 1.6 Explain the purpose and application of virtualization technology.; Review Questions
- Answers to Review QuestionsChapter 2: Network Infrastructure; 2.1 Differentiate between the different ports & protocols, their respective threats and mitigation techniques.; 2.2 Distinguish between network design elements and components.; 2.3 Determine the appropriate use of network security tools to facilitate network security.; 2.4 Apply the appropriate network tools to facilitate network security.; 2.5 Explain the vulnerabilities and mitigations associated with network devices.; 2.6 Explain the vulnerabilities and mitigations associated with various transmission media.
- 2.7 Explain the vulnerabilities and implement mitigations associated with wireless networking.Review Questions; Answers to Review Questions; Chapter 3: Access Control; 3.1 Identify and apply industry best practices for access control methods.; 3.2 Explain common access control models and the differences between each.; 3.3 Organize users and computers into appropriate security groups and roles while distinguishing between appropriate rights and privileges.; 3.4 Apply appropriate security controls to file and print resources.; 3.5 Compare and implement logical access control methods.
- 3.6 Summarize the various authentication models and identify the components of each.3.7 Deploy various authentication models and identify the components of each.; 3.8 Explain the difference between identification and authentication (identity proofing).; 3.9 Explain and apply physical access security methods.; Review Questions; Answers to Review Questions; Chapter 4: Assessments and Audits; 4.1 Conduct risk assessments and implement risk mitigation.; 4.2 Carry out vulnerability assessments using common tools.
- 4.3 Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning.4.4 Use monitoring tools on systems and networks and detect security-related anomalies.; 4.5 Compare and contrast various types of monitoring methodologies.; 4.6 Execute proper logging procedures and evaluate the results.; 4.7 Conduct periodic audits of system security settings.; Review Questions; Answers to Review Questions; Chapter 5: Cryptography; 5.1 Explain general cryptography concepts.