O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CompTIA® Security+ SY0-501 Cert Guide

Book Description

This is the most comprehensive core study tool for CompTIA's latest Security+ exam. Perfect for every candidate preparing for this challenging exam, its comprehensive coverage offers all the information and insight readers need to succeed. From start to finish, the book has been organized and edited to improve retention and help network and security professionals focus on areas where they need the most assistance. Its features include:

  • End-of-chapter case studies and hands-on video exercises help students practice what they've learned
  • Three full practice tests based on the real Security + exam - with new video explanations of all answers
  • Quizzes, memory tables, study strategies, tips, notes, cautions, key terms, troubleshooting scenarios, and much more

Security training expert David L. Prowse covers every Security+ exam objective, including: communication security, infrastructure security, operational security, general security concepts, and more. 

Table of Contents

  1. Cover Page
  2. Title Page
  3. Copyright Page
  4. Contents at a Glance
  5. Table of Contents
  6. About the Author
  7. Acknowledgments
  8. About the Technical Reviewer
  9. We Want to Hear from You!
  10. Reader Services
  11. Introduction
  12. Chapter 1 Introduction to Security
    1. Foundation Topics
    2. Security 101
    3. Think Like a Hacker
    4. Threat Actor Types and Attributes
    5. Chapter Review Activities
  13. Chapter 2 Computer Systems Security Part I
    1. Foundation Topics
    2. Malicious Software Types
    3. Delivery of Malware
    4. Preventing and Troubleshooting Malware
    5. Chapter Summary
    6. Chapter Review Activities
  14. Chapter 3 Computer Systems Security Part II
    1. Foundation Topics
    2. Implementing Security Applications
    3. Securing Computer Hardware and Peripherals
    4. Securing Mobile Devices
    5. Chapter Summary
    6. Chapter Review Activities
  15. Chapter 4 OS Hardening and Virtualization
    1. Foundation Topics
    2. Hardening Operating Systems
    3. Virtualization Technology
    4. Chapter Summary
    5. Chapter Review Activities
  16. Chapter 5 Application Security
    1. Foundation Topics
    2. Securing the Browser
    3. Securing Other Applications
    4. Secure Programming
    5. Chapter Summary
    6. Chapter Review Activities
  17. Chapter 6 Network Design Elements
    1. Foundation Topics
    2. Network Design
    3. Cloud Security and Server Defense
    4. Chapter Summary
    5. Chapter Review Activities
  18. Chapter 7 Networking Protocols and Threats
    1. Foundation Topics
    2. Ports and Protocols
    3. Malicious Attacks
    4. Chapter Summary
    5. Chapter Review Activities
  19. Chapter 8 Network Perimeter Security
    1. Foundation Topics
    2. Firewalls and Network Security
    3. NIDS Versus NIPS
    4. Chapter Summary
    5. Chapter Review Activities
  20. Chapter 9 Securing Network Media and Devices
    1. Foundation Topics
    2. Securing Wired Networks and Devices
    3. Securing Wireless Networks
    4. Chapter Summary
    5. Chapter Review Activities
  21. Chapter 10 Physical Security and Authentication Models
    1. Foundation Topics
    2. Physical Security
    3. Authentication Models and Components
    4. Chapter Summary
    5. Chapter Review Activities
  22. Chapter 11 Access Control Methods and Models
    1. Foundation Topic
    2. Access Control Models Defined
    3. Rights, Permissions, and Policies
    4. Chapter Summary
    5. Chapter Review Activities
  23. Chapter 12 Vulnerability and Risk Assessment
    1. Foundation Topics
    2. Conducting Risk Assessments
    3. Assessing Vulnerability with Security Tools
    4. Chapter Summary
    5. Chapter Review Activities
  24. Chapter 13 Monitoring and Auditing
    1. Foundation Topics
    2. Monitoring Methodologies
    3. Using Tools to Monitor Systems and Networks
    4. Conducting Audits
    5. Chapter Summary
    6. Chapter Review Activities
  25. Chapter 14 Encryption and Hashing Concepts
    1. Foundation Topics
    2. Cryptography Concepts
    3. Encryption Algorithms
    4. Hashing Basics
    5. Chapter Summary
    6. Chapter Review Activities
  26. Chapter 15 PKI and Encryption Protocols
    1. Foundation Topics
    2. Public Key Infrastructure
    3. Security Protocols
    4. Chapter Summary
    5. Chapter Review Activities
  27. Chapter 16 Redundancy and Disaster Recovery
    1. Foundation Topics
    2. Redundancy Planning
    3. Disaster Recovery Planning and Procedures
    4. Chapter Summary
    5. Chapter Review Activities
  28. Chapter 17 Social Engineering, User Education, and Facilities Security
    1. Foundation Topics
    2. Social Engineering
    3. User Education
    4. Facilities Security
    5. Chapter Summary
    6. Chapter Review Activities
  29. Chapter 18 Policies and Procedures
    1. Foundation Topics
    2. Legislative and Organizational Policies
    3. Incident Response Procedures
    4. IT Security Frameworks
    5. Chapter Summary
    6. Chapter Review Activities
  30. Chapter 19 Taking the Real Exam
    1. Getting Ready and the Exam Preparation Checklist
    2. Tips for Taking the Real Exam
    3. Beyond the CompTIA Security+ Certification
  31. Practice Exam 1: SY0-501
    1. Answers to Practice Exam 1
    2. Answers with Explanations
  32. Glossary
  33. Index