CompTIA security+ certification study guide : network security essentials /
Prepare for the CompTIA Security+ certification exam that covers the skills required to perform core security functions and pursue a career in IT. You will learn the basic principles of network security. Computer network vulnerabilities and threats are covered and you will learn how to safeguard com...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
[Berkeley, CA] :
Apress,
[2020]
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Intro
- Table of Contents
- About the Author
- About the Technical Reviewer
- Chapter 1: General Security Concepts and Trends
- Information Security Model
- Operational Model of Computer Security
- Diversity of Defense
- Communications Security
- Access Control
- Authentication
- Social Engineering
- Security Trends
- Due Care and Due Diligence
- Summary
- Resources
- Chapter 2: Network Fundamentals and Infrastructure Security
- Network Architectures
- Network Topology
- Network Protocol
- The OSI Model
- IP Packet
- TCP vs. UDP
- Three-Way Handshake
- Internet Control Message Protocol (ICMP)
- Packet Delivery
- Local Packet Delivery
- Remote Packet Delivery
- Domain Name System (DNS)
- Routing
- IP Addressing
- Subnetting
- Classes of Network Addresses
- Reserved Addresses
- Classless IP Addressing
- Network Address Translation (NAT)
- Security Zones
- Demilitarized Zone
- Virtual LAN (VLAN)
- Tunneling
- Infrastructure Security: Securing a Workstation
- Virtualization
- Hubs
- Bridges
- Switches
- Routers
- Firewalls
- Basic Packet Filtering
- Stateful Packet Filtering
- Modems
- Cable Modems
- DSL Modems
- Virtual Private Networks
- Intrusion Detection System
- Mobile Devices
- Media Cables
- Security Concerns for Transmission Media
- Object Reuse
- Network-Attached Storage
- Summary
- Resources
- Chapter 3: Wireless and Intrusion Detection System Network Security
- Introduction to Wireless Networking
- 802.11
- WAP
- WAP Vulnerabilities
- Bluetooth
- 802.11 Modulation
- 802.11 Individual Standards
- 802.11 Protocol
- Attacking 802.11
- NetStumbler on a Windows PC
- Windows Displaying Access Points
- New Security Protocols
- Implementing 802.X
- Types of Intrusion Detection Systems
- IDS Components
- NIDS Placement
- Network IDS
- Advantages
- Disadvantages
- Active vs. Passive NIDS
- Signatures
- IDS Matrix
- IDS Detection Models
- Firewall
- Intrusion Prevention Systems
- Proxy Servers
- Types of Proxy Servers
- Protocol Analyzers
- Honeypots and Honeynets
- Host-Based IDS (HIDS)
- HIDs Advantages vs. Disadvantages
- Modern HIDS
- Antivirus Products
- Antivirus Products: Signature-Based and Heuristic Scanning
- Signature-Based Scanning
- Heuristic Scanning
- Personal Software Firewalls
- Pop-Up Blockers and Windows Defender
- Anti-spam
- Summary
- Chapter 4: Role of People in Security-Operational and Organizational Security
- Security Options
- The Operational Process
- Controls
- Physical Security
- Physical Barriers
- Environmental Issues
- Fire Suppression
- Electromagnetic Eavesdropping
- Location
- Role of People in Security
- Social Engineering
- Phishing
- Spear Phishing and Pharming
- Vishing
- Shoulder Surfing
- Security Hoaxes
- Password Best Practices
- Piggybacking
- Dumpster Diving
- Installing Unauthorized Hardware and Software