Cargando…

GSEC, GIAC security essentials certification : exam guide /

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Fully updated coverage of every topic on the current version of the GSEC exam Get complete coverage of all...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Messier, Ric (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : McGraw-Hill, [2019]
Edición:Second edition.
Colección:All-in-one (Series)
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Cover
  • About the Author
  • Title Page
  • Copyright Page
  • Dedication
  • Contents at a Glance
  • Contents
  • Acknowledgments
  • Introduction
  • Exam Objective Map: GSEC Exam
  • Chapter 1 Information Security and the GIAC Security Essentials Certification
  • The Evolution and Importance of Security
  • Types of Security Threats
  • Social Engineering
  • Malware
  • Identity Theft
  • Mobile Device Threats
  • Denial of Service
  • Insider Threats
  • About SANS
  • About the GSEC Certification
  • Accreditations
  • Who the Exam Is For
  • About the Exam
  • The Purpose of This Book
  • Test Tips
  • Chapter 2 Networking Fundamentals
  • History of TCP/IP
  • Networking Stacks
  • The OSI Model
  • TCP/IP Architecture
  • Protocols
  • Internet Protocol
  • IP Version 4 Headers
  • Addressing
  • Fragmentation
  • Internet Protocol Version 6
  • Internet Control Message Protocol (ICMP)
  • Transmission Control Protocol (TCP)
  • Reliable Delivery
  • The Mitnick-Shimomura Attack
  • User Datagram Protocol (UDP)
  • Domain Name System (DNS)
  • Chapter Review
  • Questions
  • Answers
  • Exercise Answers
  • Chapter 3 Network Design
  • Cable Types
  • Coaxial Cable
  • Twisted Pair
  • Fiber Optics
  • Network Topologies
  • Bus Topology
  • Star Topology
  • Mesh Topology
  • Full Mesh Topology
  • Ring Topology
  • Switching
  • Ethernet
  • Asynchronous Transfer Mode (ATM)
  • Hubs, Bridges, and Switches
  • Routing
  • Distance Vector Routing
  • Link-State Routing
  • Network Security Technologies
  • Routers
  • Firewalls
  • Intrusion Detection Systems
  • Chapter Review
  • Questions
  • Answers
  • Exercise 3-1 Answer
  • Chapter 4 Authentication and Access Control
  • Authentication
  • Credentials
  • Token-Based Authentication
  • Biometrics
  • RADIUS
  • TACACS/TACACS+
  • Web-Based Authentication
  • Multifactor Authentication
  • Authorization
  • Principle of Least Privilege
  • Accounting
  • Access Control
  • Discretionary Access Control
  • Mandatory Access Control
  • Role-Based Access Control
  • Attribute-Based Access Control
  • Single Sign-On
  • Chapter Review
  • Questions
  • Answers
  • Exercise 4-1 Answer
  • Chapter 5 Cloud Computing
  • Cloud Computing Services
  • Storage as a Service
  • Software as a Service (SaaS)
  • Infrastructure as a Service (IaaS)
  • Platform as a Service (PaaS)
  • Security Considerations
  • Application Design
  • Secure Software Development Lifecycle (S-SDLC)
  • Agile Methodology
  • Deployment Considerations
  • Private Clouds
  • Chapter Review
  • Questions
  • Answers
  • Chapter 6 Unix/Linux
  • Unix History
  • GNU
  • The Kernel
  • Filesystem Layout
  • Using Linux
  • General Utilities
  • File Management
  • Process Management
  • Networking
  • Software Management
  • Debian
  • Red Hat Enterprise Linux/CentOS
  • Slackware
  • Boot Process
  • Process Management
  • Processes and Threads
  • Process Tools
  • Signals
  • System Management
  • Backups
  • Patch Management
  • Job Scheduling
  • User Management
  • Configuration
  • Logging and Log Management
  • Monitoring