Book description
The Security+ certification is CompTIA's response to membership requests to develop a foundation-level certification for security workers. The IT industry is in agreement that there is a need to better train, staff, and empower those tasked with designing and implementing information security, and Security+ is an effort to meet this demand. The exam is under consideration by Microsoft as the baseline security certification for Microsoft's new security certification initiative.
The Security+ Training Guide is a comprehensive resource for those preparing to take this exam, covering everything in a format that maps to the exam objectives. The book has been subjected to a rigorous technical review, ensuring content is superior in both coverage and technical accuracy.
The accompanying CD features PrepLogic™ Practice Tests, Preview Edition. This product includes one complete PrepLogic Practice Test with approximately the same number of questions found on the actual vendor exam. Each question contains full, detailed explanations of the correct and incorrect answers. The engine offers two study modes, Practice Test and Flash Review, full exam customization, and a detailed score report.
Table of contents
- Copyright
- CramSession Approved Study Material
- Security+ Training Guide Objective Matrix
- A Note from Series Editor Ed Tittel
- About the Author
- Acknowledgments
- We Want to Hear from You!
- How to Use This Book
- Introduction
- Study and Exam Prep Tips
-
Exam Preparation
- General Security Concepts
-
Communication Security
- Introduction
- Recognizing and Administering Remote and Wireless Access
- Recognizing and Administering Security Controls—Email Communications
- Recognizing and Administering Security Controls—Web Presence
- Recognizing and Administering Security Controls—Directory
- Recognizing and Administering Security Controls—File Transfer
- Recognizing and Administering Security Controls—Wireless
- Recognizing Vulnerabilities and Taking Action—Instant Messaging
- Case Study: Bear, Trap, and Associates
- Chapter Summary
- Apply Your Knowledge
- Devices, Media, and Topology Security
- Intrusion Detection, Baselines, and Hardening
- Cryptography Algorithms
- PKI and Key Management
- Physical Security, Disaster Recovery, and Business Continuity
- Security Policy and Procedures
- Security Management
- Final Review
-
Appendixes
- Security Resources
- Glossary
-
General Security Resources and Bibliography
- 1. General Security Concepts
- 2. Communication Security
- 3. Devices, Media, and Topology Security
- 4. Intrusion Detection, Baselines, and Hardening
- 5. Cryptography Algorithms
- 6. PKI and Key Management
- 7. Physical Security, Disaster Recovery, and Business Continuity
- 8. Security Policy and Procedures
- 9. Security Management
- Overview of the Certification Process
- What's on the CD-ROM
-
Using the PrepLogic Practice Tests, Preview Edition Software
- Exam Simulation
- Question Quality
- Interface Design
- Effective Learning Environment
- Software Requirements
- Installing PrepLogic Practice Tests, Preview Edition
- Removing PrepLogic Practice Tests, Preview Edition from Your Computer
- Using PrepLogic Practice Tests, Preview Edition
- Customer Service
- Product Suggestions and Comments
- License Agreement
- Index
Product information
- Title: Security+ Training Guide
- Author(s):
- Release date: March 2003
- Publisher(s): Pearson IT Certification
- ISBN: 9780789728364
You might also like
book
CompTIA® Security+™ SY0-401 Exam Cram, Fourth Edition
The Publisher regrets that the CD/DVD content for this title cannot be made available Online. CompTIA® …
book
TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001
TICSA (TruSecure ICSA Computer Security Associate) is a popular new entry-level computer security certification aimed at …
article
Reinventing the Organization for GenAI and LLMs
Previous technology breakthroughs did not upend organizational structure, but generative AI and LLMs will. We now …
book
CCNA Security Exam Cram (Exam IINS 640-553)
In this book you’ll learn how to: Build a secure network using security controls Secure network …