Book description
NoneTable of contents
- Acknowledgments
- About the Author
- Introduction
-
Chapter 1 Threats, Attacks, and Vulnerabilities
- 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware.
- 1.2 Compare and contrast types of attacks.
- 1.3 Explain threat actor types and attributes.
- 1.4 Explain penetration testing concepts.
- 1.5 Explain vulnerability scanning concepts.
- 1.6 Explain the impact associated with types of vulnerabilities.
- Review Questions
-
Chapter 2 Technologies and Tools
- 2.1 Install and configure network components, both hardware- and software-based, to support organizational security.
- 2.2 Given a scenario, use appropriate software tools to assess the security posture of an organization.
- 2.3 Given a scenario, troubleshoot common security issues.
- 2.4 Given a scenario, analyze and interpret output from security technologies.
- 2.5 Given a scenario, deploy mobile devices securely.
- 2.6 Given a scenario, implement secure protocols.
- Review Questions
-
Chapter 3 Architecture and Design
- 3.1 Explain use cases and purpose for frameworks, best practices and secure configuration guides.
- 3.2 Given a scenario, implement secure network architecture concepts.
- 3.3 Given a scenario, implement secure systems design.
- 3.4 Explain the importance of secure staging deployment concepts.
- 3.5 Explain the security implications of embedded systems.
- 3.6 Summarize secure application development and deployment concepts.
- 3.7 Summarize cloud and virtualization concepts.
- 3.8 Explain how resiliency and automation strategies reduce risk.
- 3.9 Explain the importance of physical security controls.
- Review Questions
-
Chapter 4 Identity and Access Management
- 4.1 Compare and contrast identity and access management concepts.
- 4.2 Given a scenario, install and configure identity and access services.
- 4.3 Given a scenario, implement identity and access management controls.
- 4.4 Given a scenario, differentiate common account management practices.
- Review Questions
-
Chapter 5 Risk Management
- 5.1 Explain the importance of policies, plans and procedures related to organizational security.
- 5.2 Summarize business impact analysis concepts.
- 5.3 Explain risk management processes and concepts.
- 5.4 Given a scenario, follow incident response procedures.
- 5.5 Summarize basic concepts of forensics.
- 5.6 Explain disaster recovery and continuity of operation concepts.
- 5.7 Compare and contrast various types of controls.
- 5.8 Given a scenario, carry out data security and privacy practices.
- Review Questions
- Chapter 6 Cryptography and PKI
- Appendix Answers to Review Questions
- Advert
- EULA
Product information
- Title: CompTIA Security+ Review Guide, 4th Edition
- Author(s):
- Release date:
- Publisher(s): Sybex
- ISBN: None
You might also like
book
CompTIA Security+ Certification Study Guide, Fourth Edition (Exam SY0-601), 4th Edition
This fully updated self-study guide offers 100% coverage of every objective on the CompTIA Security+ exam …
book
CompTIA Server+ Certification All-in-One Exam Guide, Second Edition (Exam SK0-005), 2nd Edition
This exam-focused study guide contains complete coverage of every topic on the current edition of the …
book
CompTIA Security+ Study Guide, 7th Edition
Expert preparation covering 100% of Security+ exam SY0-501 objectives CompTIA Security+ Study Guide, Seventh Edition offers …
book
CompTIA Advanced Security Practitioner (CASP) CAS-003 Cert Guide, Second Edition
Learn, prepare, and practice for CompTIA Advanced Security Practitioner (CASP) CAS-003 exam success with this CompTIA …