Cargando…

Mike Meyers' CompTIA security+ certification guide : (exam SY0-401) /

An all-new CompTIA Security+ exam guide from top CompTIA training and exam prep expert Mike Meyers In Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401), the bestselling author and leading authority on CompTIA A+ certification brings his highly effective methodology to IT securit...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Meyers, Mike, 1961- (Autor), Rogers, Bobby E. (Autor), Dunkerley, Dawn (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : McGraw-Hill Education, 2015.
Edición:Version 1.0.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright Page
  • Dedication
  • About The Authors
  • Contents at a Glance
  • Contents
  • Acknowledgments
  • Introduction
  • PART I The CompTIA Security+ Exam
  • Module 1 Meet the Security+ Exam
  • Why Do We Need Certification Exams?
  • Demonstrating and Validating Skills and Knowledge
  • The World of IT Security Certification
  • The CompTIA Security+ Examination
  • CompTIA as an Organization
  • The Exam
  • Module 1 Questions and Answers
  • Module 2 Assessment Exam
  • Assessment Questions
  • Answers
  • PART II Stepping Up to IT Security
  • Module 3 The Basics of Security
  • The Goals of Security
  • Confidentiality
  • Integrity
  • Availability
  • Other Elements of Security
  • Identification
  • Authentication
  • Authorization
  • Auditing and Accountability
  • Non-repudiation
  • Security Concepts
  • Controls
  • Defense-in-Depth
  • Data Sensitivity and Classification
  • Principle of Least Privilege
  • Separation of Duties
  • Multi-person Control
  • Mandatory Vacations
  • Job Rotation
  • Due Diligence and Due Care
  • Module 3 Questions and Answers
  • Module 4 Understanding Security Governance
  • Security Governance
  • Laws and Regulations
  • Organizational Governance
  • Security Policies
  • Module 4 Questions and Answers
  • Module 5 Risk Management
  • Risk Concepts
  • Elements of Risk
  • Putting It All Together: Risk
  • Managing Risk
  • Module 5 Questions and Answers
  • Module 6 IT Risk Assessment
  • Assessing Risk
  • Risk Factors
  • Risk Assessment Methods
  • Quantitative Assessment
  • Qualitative Assessment
  • Putting It All Together: Determining Risk
  • Risk Response
  • Module 6 Questions and Answers
  • PART III Core Security Concepts
  • Module 7 Understanding Cryptography
  • Cryptography Concepts
  • What Is Cryptography?
  • Cryptography Components
  • Module 7 Questions and Answers
  • Module 8 Cryptographic Methods
  • Cryptographic Algorithms
  • Symmetric Algorithms
  • Asymmetric Algorithms
  • Hashing Algorithms
  • Module 8 Questions and Answers
  • Module 9 Application of Cryptographic Methods
  • Application of Cryptographic Methods
  • Cryptography Applications
  • Cryptographic Method Considerations
  • Module 9 Questions and Answers
  • Module 10 Public Key Infrastructure
  • PKI Concepts
  • Keys, Algorithms, and Standards
  • PKI Services
  • Digital Certificates and PKI Structure
  • PKI Considerations
  • Trust Models
  • Module 10 Questions and Answers
  • PART IV Authentication and Authorization
  • Module 11 Understanding Identification and Authentication
  • Authentication Concepts
  • Authentication Factors
  • Identification Methods
  • Trusted Entity Authentication
  • Module 11 Questions and Answers
  • Module 12 Understanding Authorization
  • Authorization Concepts
  • Supporting Authorization
  • Access Control Models
  • Module 12 Questions and Answers
  • Module 13 Authentication Methods and Services
  • Authentication Concepts
  • Authentication Protocols and Methods