Book description
A step-by-step guide to the tasks involved in security administration
If you aspire to a career in security administration, one of your greatest challenges will be gaining hands-on experience. This book takes you through the most common security admin tasks step by step, showing you the way around many of the roadblocks you can expect on the job. It offers a variety of scenarios in each phase of the security administrator's job, giving you the confidence of first-hand experience.
In addition, this is an ideal complement to the brand-new, bestselling CompTIA Security+ Study Guide, 5th Edition or the CompTIA Security+ Deluxe Study Guide, 2nd Edition, the latest offerings from Sybex for CompTIA's Security+ SY0-301 exam.
- Targets security administrators who confront a wide assortment of challenging tasks and those seeking a career in security administration who are hampered by a lack of actual experience
- Walks you through a variety of common tasks, demonstrating step by step how to perform them and how to circumvent roadblocks you may encounter
- Features tasks that are arranged according to four phases of the security administrator's role: designing a secure network, creating and implementing standard security policies, identifying insecure systems in an existing environment, and training both onsite and remote users
- Ideal hands-on for those preparing for CompTIA's Security+ exam (SY0-301)
This comprehensive workbook provides the next best thing to intensive on-the-job training for security professionals.
Table of contents
- Cover
- Contents
- Title
- Copyright
- Dedication
- Acknowledgments
- About the Authors
- Introduction
- Phase 1: The Grunt Work of Security
- Phase 2: Hardening Systems
-
Phase 3: Malicious Software
- Task 3.1: Installing, Updating, and Running Antivirus Software
- Task 3.2: Using a Rootkit Checker
- Task 3.3: Adware
- Task 3.4: Using a Spyware Checker
- Task 3.5: Malicious Software Removal Tool
- Task 3.6: McAfee Site Advisor
- Task 3.7: ARP Poisoning with Cain & Abel
- Task 3.8: Attacking Authentication with Firesheep
-
Phase 4: Secure Storage
- Task 4.1: The Encrypting File System
- Task 4.2: EFS Data Recovery
- Task 4.3: Implementing Syskey
- Task 4.4: Converting FAT to NTFS
- Task 4.5: Implementing Disk Fault Tolerance with RAID
- Task 4.6: Backing Up Data
- Task 4.7: Restoring Data from a Backup
- Task 4.8: Securing Shares
- Task 4.9: BitLocker Drive Encryption
- Task 4.10: Securing Data to Satisfy FIPS 140-2 Using PGP Desktop
- Phase 5: Managing User Accounts
-
Phase 6: Network Security
- Task 6.1: Deploying IPSec
- Task 6.2: Configuring the VPN Server
- Task 6.3: Configuring the VPN Client
- Task 6.4: Implementing Secure Remote Administration
- Task 6.5: Secure Administration Using Run As
- Task 6.6: Configuring a Packet Filter
- Task 6.7: Implementing 802.11 Wireless Security
- Task 6.8: Implementing an IPSec VPN Using AES
- Task 6.9: Implementing a Personal Firewall
-
Phase 7: Securing Internet Activity
- Task 7.1: Configuring Internet Access
- Task 7.2: Using Internet Explorer Security Zones
- Task 7.3: Configuring IE for Secure Use of Cookies
- Task 7.4: Using Internet Connection Sharing
- Task 7.5: Securing Email
- Task 7.6: Spam Management
- Task 7.7: Installing and Using a Digital Certificate
- Task 7.8: Certificate Backup and Management
- Task 7.9: Performing Secure File Exchange
- Task 7.10: Validating Downloads and Checking the Hash
- Task 7.11: Logging and Recording Internet Activity
- Task 7.12: Using HTTPS to Encrypt Web Traffic
- Task 7.13: Using Force-TLS to Add Security to Web Browsing
-
Phase 8: Security Testing
- Task 8.1: Penetration Testing with Nessus
- Task 8.2: Penetration Testing with Retina
- Task 8.3: Performing Assessments with MBSA
- Task 8.4: Performing Security Assessments with IT Shavlik
- Task 8.5: Performing Internet Vulnerability Profiling
- Task 8.6: Tracking Hostile IPs
- Task 8.7: Investigating Netcat
- Task 8.8: Exploiting Vulnerabilities with Metasploit
- Phase 9: Investigating Incidents
- Phase 10: Security Troubleshooting
- Index
Product information
- Title: Security Administrator Street Smarts: A Real World Guide to CompTIA Security+™ Skills, Third Edition
- Author(s):
- Release date: June 2011
- Publisher(s): Sybex
- ISBN: 9781118061169
You might also like
book
Handbook on Securing Cyber-Physical Critical Infrastructure
The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on …
book
Solaris™ 8 System Administrator's Reference
Get beyond the man pages! The practical, task-oriented reference to every key Solaris 8 command, from …
book
CCNA®: Cisco® Certified Network Associate: Fast Pass, Third Edition
Organized by exam objectives, this is a focused, concise review guide that works hand-in-hand with any …
book
Protective Security: Creating Military-Grade Defenses for Your Digital Business
This book shows you how military counter-intelligence principles and objectives are applied. It provides you with …