CompTIA security+ (exam SY0-401) /
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Autor Corporativo: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
New York :
McGraw-Hill Education,
©2014.
|
Edición: | 4th ed. |
Colección: | Mike Meyers' certification passport.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright Page
- Contents
- Acknowledgments
- Check-In
- Part I: Organizational Security
- Chapter 1: Organizational Security and Compliance
- Objective 1.01 Explain Risk-Related Concepts
- Risk Control Types
- Risk Assessment
- Risk Management Options
- False Positives and Negatives
- Use Organizational Policies to Reduce Risk
- Objective 1.02 Implement Appropriate Risk Mitigation Strategies
- Change Management Policy
- Incident Management and Response Policy
- Perform Routine Audits
- User Rights and Permissions Reviews
- Data Loss Prevention and Regulatory Compliance
- Objective 1.03 Integrate with Third Parties
- Interoperability Agreements
- Privacy Considerations
- Risk Awareness
- Unauthorized Data Sharing
- Data Ownerships
- Data Backup
- Verification of Adherence
- Chapter 2: Security Training and Incident Response
- Objective 2.01 Explain the Importance of Security-Related Awareness and Training
- Accessing Policy Documentation
- Data and Documentation Policies
- Best Practices for User Habits
- Objective 2.02 Analyze and Differentiate Among Types of Social Engineering Attacks
- Phishing
- Whaling
- Shoulder Surfing
- Tailgating
- Pharming
- Spim
- Vishing
- Spam
- Hoaxes
- Objective 2.03 Execute Appropriate Incident Response Procedures
- Preparation
- Incident Identification
- First Responders
- Incident Isolation
- Damage and Loss Control
- Escalation Policy
- Reporting and Notification
- Mitigation and Recovery Steps
- Lessons Learned
- Objective 2.04 Implement Basic Forensic Procedures
- Collection and Preservation of Evidence
- Chapter 3: Business Continuity and Disaster Recovery
- Objective 3.01 Compare and Contrast Aspects of Business Continuity
- Recovery Plans
- Objective 3.02 Execute Disaster Recovery Plans and Procedures
- High Availability and Redundancy Planning
- Fault Tolerance
- Objective 3.03 Select the Appropriate Control to Meet the Goals of Security
- Objective 3.04 Explain the Impact and Proper Use of Environmental Controls
- Facility Construction Issues
- Environmental Issues
- Cable Shielding
- Fire Suppression
- Part II: Cryptography
- Chapter 4: Cryptography and Encryption Basics
- Objective 4.01 Utilize the Concepts of Cryptography
- Information Assurance
- Algorithms
- Steganography
- Digital Signatures
- Basic Hashing Concepts
- Message Digest Hashing
- Secure Hash Algorithm (SHA)
- RIPEMD
- HMAC
- Objective 4.02 Use and Apply Appropriate Cryptographic Tools and Products
- Symmetric Encryption Algorithms
- Asymmetric Encryption Algorithms
- One-Time Pad
- Quantum Cryptography
- Implementing Encryption Protocols
- Wireless Encryption
- Chapter 5: Public Key Infrastructure
- Objective 5.01 Explain the Core Concepts of Public Key Infrastructure
- Digital Certificates
- Certificate Authorities
- Trust Models
- Key Management and Storage