Mike Meyers' CompTIA security+ certification guide : (exam SY0-401) /
An all-new CompTIA Security+ exam guide from top CompTIA training and exam prep expert Mike Meyers In Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401), the bestselling author and leading authority on CompTIA A+ certification brings his highly effective methodology to IT securit...
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
New York :
McGraw-Hill Education,
2015.
|
Edición: | Version 1.0. |
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright Page
- Dedication
- About The Authors
- Contents at a Glance
- Contents
- Acknowledgments
- Introduction
- PART I The CompTIA Security+ Exam
- Module 1 Meet the Security+ Exam
- Why Do We Need Certification Exams?
- Demonstrating and Validating Skills and Knowledge
- The World of IT Security Certification
- The CompTIA Security+ Examination
- CompTIA as an Organization
- The Exam
- Module 1 Questions and Answers
- Module 2 Assessment Exam
- Assessment Questions
- Answers
- PART II Stepping Up to IT Security
- Module 3 The Basics of Security
- The Goals of Security
- Confidentiality
- Integrity
- Availability
- Other Elements of Security
- Identification
- Authentication
- Authorization
- Auditing and Accountability
- Non-repudiation
- Security Concepts
- Controls
- Defense-in-Depth
- Data Sensitivity and Classification
- Principle of Least Privilege
- Separation of Duties
- Multi-person Control
- Mandatory Vacations
- Job Rotation
- Due Diligence and Due Care
- Module 3 Questions and Answers
- Module 4 Understanding Security Governance
- Security Governance
- Laws and Regulations
- Organizational Governance
- Security Policies
- Module 4 Questions and Answers
- Module 5 Risk Management
- Risk Concepts
- Elements of Risk
- Putting It All Together: Risk
- Managing Risk
- Module 5 Questions and Answers
- Module 6 IT Risk Assessment
- Assessing Risk
- Risk Factors
- Risk Assessment Methods
- Quantitative Assessment
- Qualitative Assessment
- Putting It All Together: Determining Risk
- Risk Response
- Module 6 Questions and Answers
- PART III Core Security Concepts
- Module 7 Understanding Cryptography
- Cryptography Concepts
- What Is Cryptography?
- Cryptography Components
- Module 7 Questions and Answers
- Module 8 Cryptographic Methods
- Cryptographic Algorithms
- Symmetric Algorithms
- Asymmetric Algorithms
- Hashing Algorithms
- Module 8 Questions and Answers
- Module 9 Application of Cryptographic Methods
- Application of Cryptographic Methods
- Cryptography Applications
- Cryptographic Method Considerations
- Module 9 Questions and Answers
- Module 10 Public Key Infrastructure
- PKI Concepts
- Keys, Algorithms, and Standards
- PKI Services
- Digital Certificates and PKI Structure
- PKI Considerations
- Trust Models
- Module 10 Questions and Answers
- PART IV Authentication and Authorization
- Module 11 Understanding Identification and Authentication
- Authentication Concepts
- Authentication Factors
- Identification Methods
- Trusted Entity Authentication
- Module 11 Questions and Answers
- Module 12 Understanding Authorization
- Authorization Concepts
- Supporting Authorization
- Access Control Models
- Module 12 Questions and Answers
- Module 13 Authentication Methods and Services
- Authentication Concepts
- Authentication Protocols and Methods