Book description
Get a host of extras with this Deluxe version including a Security Administration Simulator!
Prepare for CompTIA's new Security+ exam SY0-301 with this Deluxe Edition of our popular CompTIA Security+ Study Guide, 5th Edition. In addition to the 100% coverage of all exam essentials and study tools you'll find in the regular study guide, the Deluxe Edition gives you over additional hands-on lab exercises and study tools, three additional practice exams, author videos, and the exclusive Security Administration simulator. This book is a CompTIA Recommended product.
Provides 100% coverage of all exam objectives for Security+ exam SY0-301 including:
Network security
Compliance and operational security
Threats and vulnerabilities
Application, data and host security
Access control and identity management
Cryptography
Features Deluxe-Edition-only additional practice exams, value-added hands-on lab exercises and study tools, and exclusive Security Administrator simulations, so you can practice in a real-world environment
Covers key topics such as general security concepts, communication and infrastructure security, the basics of cryptography, operational security, and more
Shows you pages of practical examples and offers insights drawn from the real world
Get deluxe preparation, pass the exam, and jump-start your career. It all starts with CompTIA Security+ Deluxe Study Guide, 2nd Edition.
Table of contents
- Cover
- Title Page
- Copyright
- Dear Reader,
- Dedication
- Acknowledgments
- About the Author
- Table of Exercises
- Foreword
- Introduction
- Chapter 1: Measuring and Weighing Risk
- Chapter 2: Infrastructure and Connectivity
- Chapter 3: Protecting Networks
- Chapter 4: Threats and Vulnerabilities
- Chapter 5: Access Control and Identity Management
- Chapter 6: Educating and Protecting the User
- Chapter 7: Operating System and Application Security
- Chapter 8: Cryptography Basics
- Chapter 9: Cryptography Implementation
- Chapter 10: Physical and Hardware-Based Security
- Chapter 11: Security and Vulnerability in the Network
- Chapter 12: Wireless Networking Security
- Chapter 13: Disaster Recovery and Incident Response
- Chapter 14: Security-Related Policies and Procedures
-
Chapter 15: Security Administration
- Security Administrator’s Troubleshooting Guide
- Getting Started
- Access Control Issues
- Accountability Concerns
- Auditing
- Authentication Schemes
- Backup Management
- Baselining Security
- Certificate Management
- Communications Security
- Directory Services Protection
- Disaster Planning
- Documenting Your Environment
- Email Issues
- File-Sharing Basics
- Working with IDSs and Honey Pots
- Incident Handling
- Internet Common Sense
- Key Management Conventions
- Preventing Common Malicious Events
- Managing Personnel
- Keeping Physical Security Meaningful
- Securing the Infrastructure
- Working with Security Zones
- Social Engineering Risks
- System Hardening Basics
- Securing the Wireless Environment
- Summary
- Appendix A: About the Companion CD
-
Appendix B: Workbook Exercises
- Lab A.1: Create a Baseline for Internet Access
- Lab A.2: Turn on the Firewall in Windows 7 or Windows Vista
- Lab A.3: Look for Security Events within Windows
- Lab A.4: Turn on a Screensaver Password for openSUSE
- Lab A.5: Change a Password in Linux
- Lab A.6: Find SUID and SGID Files in Linux
- Lab A.7: Change ACLs on All Files in aLinux Directory
- Lab A.8: Change Permissions on All Files in a Linux Directory
- Lab A.9: Change the Default Permissions for All Newly Created Files in Linux
- Lab A.10: View All Linux Logins
- Lab A.11: Change the Group Associated with Files
- Lab A.12: View Failed Login Attempts
- Lab A.13: Hide a Linux File
- Lab A.14: Hide and Access a Windows Share
- Lab A.15: Encrypt a Windows File
- Lab A.16: Count the Number of Running Linux Processes
- Lab A.17: Add a Legal Notice
- Lab A.18: Turn On a Screensaver Password for Windows 7
- Lab A.19: Identify User Accounts with Administrator Access in Windows
- Lab A.20: Display Hidden Files, Folders, and Drives in Windows
- Lab A.21: View Effective Permissions in Windows
- Lab A.22: View Internet Explorer Security Settings
- Lab A.23: Change Internet Explorer Pop-up Blocker Settings
- Lab A.24: Enable openSUSE Firewall
- Lab A.25: Configure openSUSE Local Security
- Lab A.26: Set the Defaults for New Users
- Lab A.27: View Logged Warnings in openSUSE
- Lab A.28: Configure openSUSE as aKerberos Client
- Lab A.29: Configure openSUSE as an LDAP Client
- Lab A.30: Turn Off IPv6 in openSUSE
- Lab A.31: Turn On Folder Encryption with cipher
- Lab A.32: Clear Private Data in Internet Explorer
- Lab A.33: Clear Private Data in Firefox
- Lab A.34: Configure SELinux in Fedora
- Lab A.35: Limit Cookies to First Party
- Lab A.36: Configure the Phishing Filter
- Lab A.37: Configure Windows Startup
- Lab A.38: Secure the Account Database
- Lab A.39: Create a Restore Point
- Lab A.40: Return to a Restore Point
- Lab A.41: Boot to a Good Configuration
- Lab A.42: Hide Your Location in IE 9
- Lab A.43: Configure Windows Update
- Lab A.44: Turn Off AutoRun in Windows
- Lab A.45: Audit an Individual File in Windows 7
- Lab A.46: Use the Problem Sets Recorder
- Lab A.47: Edit a Credential Manager Account
- Lab A.48: Create a System Repair Disk
- Lab A.49: Run a System Scan from the Command Line
- Lab A.50: Configure Windows 7 to Use an Internet Time Server
- Appendix C: Study Tools
- Appendix D: Security+ Acronym List
- Appendix E: The Basics of Cabling, Wires, and Communication
- Glossary
- Index
Product information
- Title: CompTIA® Security+™ Deluxe Study Guide, Second Edition
- Author(s):
- Release date: July 2011
- Publisher(s): Sybex
- ISBN: 9781118014745
You might also like
book
Security+® Practice Tests
Ace the CompTIA Security+ exam with over 700 practice exam questions written using the style and …
book
Microsoft SQL Server 2008 Reporting Services, 3rd Edition
The Definitive Guide to Microsoft SQL Server 2008 Reporting Services Create and deliver data-rich reports across …
book
Bring Your Own Devices (BYOD) Survival Guide
Where end-users once queued up to ask the IT department for permission to buy a new …
book
Swift 4 for Absolute Beginners: Develop Apps for iOS
Stay motivated and overcome obstacles while learning to use Swift Playgrounds to be a great iOS …