O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CompTIA Security+ Review Guide, 4th Edition

Book Description

Consolidate your knowledge base with critical Security+ review

CompTIA Security+ Review Guide, Fourth Edition, is the smart candidate's secret weapon for passing Exam SY0-501 with flying colors. You've worked through your study guide, but are you sure you're prepared? This book provides tight, concise reviews of all essential topics throughout each of the exam's six domains to help you reinforce what you know. Take the pre-assessment test to identify your weak areas while there is still time to review, and use your remaining prep time to turn weaknesses into strengths. The Sybex online learning environment gives you access to portable study aids, including electronic flashcards and a glossary of key terms, so you can review on the go. Hundreds of practice questions allow you to gauge your readiness, and give you a preview of the big day.

Avoid exam-day surprises by reviewing with the makers of the test—this review guide is fully approved and endorsed by CompTIA, so you can be sure that it accurately reflects the latest version of the exam. The perfect companion to the CompTIA Security+ Study Guide, Seventh Edition, this review guide can be used with any study guide to help you:

  • Review the critical points of each exam topic area
  • Ensure your understanding of how concepts translate into tasks
  • Brush up on essential terminology, processes, and skills
  • Test your readiness with hundreds of practice questions

You've put in the time, gained hands-on experience, and now it's time to prove what you know. The CompTIA Security+ certification tells employers that you're the person they need to keep their data secure; with threats becoming more and more sophisticated, the demand for your skills will only continue to grow. Don't leave anything to chance on exam day—be absolutely sure you're prepared with the CompTIA Security+ Review Guide, Fourth Edition.

Table of Contents

  1. Acknowledgments
  2. About the Author
  3. Introduction
    1. What Is Security+ Certification?
    2. Is This Book for You?
    3. How Is This Book Organized?
    4. Interactive Online Learning Environment and Test Bank
    5. Tips for Taking the Security+ Exam
    6. The Security+ Exam Objectives
    7. Security+ Acronyms
  4. Chapter 1 Threats, Attacks, and Vulnerabilities
    1. 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware.
    2. 1.2 Compare and contrast types of attacks.
    3. 1.3 Explain threat actor types and attributes.
    4. 1.4 Explain penetration testing concepts.
    5. 1.5 Explain vulnerability scanning concepts.
    6. 1.6 Explain the impact associated with types of vulnerabilities.
    7. Review Questions
  5. Chapter 2 Technologies and Tools
    1. 2.1 Install and configure network components, both hardware- and software-based, to support organizational security.
    2. 2.2 Given a scenario, use appropriate software tools to assess the security posture of an organization.
    3. 2.3 Given a scenario, troubleshoot common security issues.
    4. 2.4 Given a scenario, analyze and interpret output from security technologies.
    5. 2.5 Given a scenario, deploy mobile devices securely.
    6. 2.6 Given a scenario, implement secure protocols.
    7. Review Questions
  6. Chapter 3 Architecture and Design
    1. 3.1 Explain use cases and purpose for frameworks, best practices and secure configuration guides.
    2. 3.2 Given a scenario, implement secure network architecture concepts.
    3. 3.3 Given a scenario, implement secure systems design.
    4. 3.4 Explain the importance of secure staging deployment concepts.
    5. 3.5 Explain the security implications of embedded systems.
    6. 3.6 Summarize secure application development and deployment concepts.
    7. 3.7 Summarize cloud and virtualization concepts.
    8. 3.8 Explain how resiliency and automation strategies reduce risk.
    9. 3.9 Explain the importance of physical security controls.
    10. Review Questions
  7. Chapter 4 Identity and Access Management
    1. 4.1 Compare and contrast identity and access management concepts.
    2. 4.2 Given a scenario, install and configure identity and access services.
    3. 4.3 Given a scenario, implement identity and access management controls.
    4. 4.4 Given a scenario, differentiate common account management practices.
    5. Review Questions
  8. Chapter 5 Risk Management
    1. 5.1 Explain the importance of policies, plans and procedures related to organizational security.
    2. 5.2 Summarize business impact analysis concepts.
    3. 5.3 Explain risk management processes and concepts.
    4. 5.4 Given a scenario, follow incident response procedures.
    5. 5.5 Summarize basic concepts of forensics.
    6. 5.6 Explain disaster recovery and continuity of operation concepts.
    7. 5.7 Compare and contrast various types of controls.
    8. 5.8 Given a scenario, carry out data security and privacy practices.
    9. Review Questions
  9. Chapter 6 Cryptography and PKI
    1. 6.1 Compare and contrast basic concepts of cryptography.
    2. 6.2 Explain cryptography algorithms and their basic characteristics.
    3. 6.3 Given a scenario, install and configure wireless security settings.
    4. 6.4 Given a scenario, implement public key infrastructure.
    5. Review Questions
  10. Appendix Answers to Review Questions
    1. Chapter 1: Threats, Attacks, and Vulnerabilities
    2. Chapter 2: Technologies and Tools
    3. Chapter 3: Architecture and Design
    4. Chapter 4: Identity and Access Management
    5. Chapter 5: Risk Management
    6. Chapter 6: Cryptography and PKI
  11. Advert
  12. EULA