CompTIA Security+™: Review Guide, Second Edition

Book description

This ebook does not provide access to the CD-ROM files.

Reinforce your preparation for CompTIA's new Security+ exam with this focused review tool

Before you take CompTIA's new Security+ exam SY0-301, reinforce your learning with a thorough review and lots of practice. The new edition of this concise guide helps you do just that. It covers all six domains of exam SY0-301, all exam objectives, and includes a helpful "Exam Essentials" section after each domain to help you zero in on what you need to know for the exam. A companion CD offers additional study tools, including two complete practice exams, over a hundred electronic flashcards, and more.

  • Reviews and reinforces the material you need to know for CompTIA's new Security+ exam SY0-301
  • Covers all exam objectives and the six domain areas of the Security+ exam: Network Security; Compliance and Operational Security; Threats and Vulnerabilities; Application, Data and Host Security; Access Control and Identity Management; and Cryptography
  • Helps you drill and prepare with over 120 review questions, two practice exams, over 100 electronic flashcards, and more on a companion CD
  • Goes hand in hand with any learning tool, including Sybex's CompTIA Security+ Study Guide, 5th Edition

Earn your Security+ certification, then use it as a springboard to more difficult certifications. Start by acing exam SY0-301 with the help of this practical review guide!

Table of contents

  1. Cover
  2. Contents
  3. Title
  4. Copyright
  5. Dedication
  6. Acknowledgments
  7. About the Author
  8. Introduction
  9. Chapter 1: Network Security
    1. 1.1 Explain the security function and purpose of network devices and technologies
    2. 1.2 Apply and implement secure network administration principles
    3. 1.3 Distinguish and differentiate network design elements and compounds
    4. 1.4 Implement and use common protocols
    5. 1.5 Identify commonly used default network ports
    6. 1.6 Implement wireless network in a secure manner
    7. Review Questions
    8. Answers to Review Questions
  10. Chapter 2: Compliance and Operational Security
    1. 2.1 Explain risk-related concepts
    2. 2.2 Carry out appropriate risk mitigation strategies
    3. 2.3 Execute appropriate incident response procedures
    4. 2.4 Explain the importance of security-related awareness and training
    5. 2.5 Compare and contrast aspects of business continuity
    6. 2.6 Explain the impact and proper use of environmental controls
    7. 2.7 Execute disaster recovery plans and procedures
    8. 2.8 Exemplify the concepts of confidentiality, integrity, and availability (CIA)
    9. Review Questions
    10. Answers to Review Questions
  11. Chapter 3: Threats and Vulnerabilities
    1. 3.1 Analyze and differentiate among types of malware
    2. 3.2 Analyze and differentiate among types of attacks
    3. 3.3 Analyze and differentiate among types of social-engineering attacks
    4. 3.4 Analyze and differentiate among types of wireless attacks
    5. 3.5 Analyze and differentiate among types of application attacks
    6. 3.6 Analyze and differentiate among types of mitigation and deterrent techniques
    7. 3.7 Implement assessment tools and techniques to discover security threats and vulnerabilities
    8. 3.8 Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning
    9. Review Questions
    10. Answers to Review Questions
  12. Chapter 4: Application, Data, and Host Security
    1. 4.1 Explain the importance of application security
    2. 4.2 Carry out appropriate procedures to establish host security
    3. 4.3 Explain the importance of data security
    4. Review Questions
    5. Answers to Review Questions
  13. Chapter 5: Access Control and Identity Management
    1. 5.1 Explain the function and purpose of authentication services
    2. 5.2 Explain the fundamental concepts and best practices related to authentication, authorization, and access control
    3. 5.3 Implement appropriate security controls when performing account management
    4. Review Questions
    5. Answers to Review Questions
  14. Chapter 6: Cryptography
    1. 6.1 Summarize general cryptography concepts
    2. 6.2 Use and apply appropriate cryptographic tools and products
    3. 6.3 Explain the core concepts of Public Key Infrastructure
    4. 6.4 Implement PKI, certificate management, and associated components
    5. Review Questions
    6. Answers to Review Questions
  15. Appendix: About the Companion CD
  16. Index
  17. EULA
  18. What’s on the CD
  19. Glossary

Product information

  • Title: CompTIA Security+™: Review Guide, Second Edition
  • Author(s): James Michael Stewart
  • Release date: June 2011
  • Publisher(s): Sybex
  • ISBN: 9781118061176