Book description
Eleventh Hour Network+: Exam N10-004 Study Guide offers a practical guide for those preparing for the Security+ certification exam. The book's 14 chapters provide in-depth discussions of the following topics: systems security; operating system hardening; application security; virtualization technologies; network security; wireless networks; network access; network authentication; risk assessment and risk mitigation; general cryptographic concepts; public key infrastructure; redundancy planning; environmental controls and implementing disaster recovery and incident response procedures; and legislation and organizational policies. Each chapter includes information on exam objectives, exam warnings, and the top five toughest questions along with their answers.- The only book keyed to the new SY0-201 objectives that has been crafted for last minute cramming
- Easy to find, essential material with no fluff – this book does not talk about security in general, just how it applies to the test
- Includes review of five toughest questions by topic - sure to improve your score
Table of contents
- Brief Table of Contents
- Table of Contents
- Copyright
- About the Authors
- Chapter 1. Systems Security
- Chapter 2. OS Hardening
- Chapter 3. Application Security
- Chapter 4. Virtualization Technologies
- Chapter 5. Network Security
- Chapter 6. Wireless Networks
- Bibliography
- References
- Chapter 7. Network Access
- Chapter 8. Network Authentication
- Chapter 9. Risk Assessment and Risk Mitigation
- Chapter 10. General Cryptographic Concepts
- Chapter 11. Public Key Infrastructure
- Chapter 12. Redundancy Planning
- Chapter 13. Controls and Procedures
- Chapter 14. Legislation and Organizational Policies
Product information
- Title: Eleventh Hour Security+
- Author(s):
- Release date: October 2009
- Publisher(s): Syngress
- ISBN: 9781597494946
You might also like
book
Information Security Handbook
Implement information security effectively as per your organization's needs. About This Book Learn to build your …
book
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in …
book
(ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide, 3rd Edition
The only SSCP study guide officially approved by (ISC)2 The (ISC)2 Systems Security Certified Practitioner (SSCP) …
book
Hunting Cyber Criminals
The skills and tools for collecting, verifying and correlating information from different types of systems is …