Book description
Get the streamlined tool you need to bone up for the Security+ exam [SYO-101]. Fast Pass coverage includes:
General security concepts.
Assessing risk.
Securing communications.
Implementing wireless security features.
Configuring a firewall.
Detecting intrusions.
Securing your organization's infrastructure.
Understanding the basics of cryptography.
Managing security keys and certificates.
Ensuring operational and organizational security.
Recovering from disasters.
A CD-ROM so you can practice, practice, practice.
Concise, objective-focused coverage and review questions.
Order your copy of the perfect preparation and review resource, Security+ Fast Pass today!
Note:CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
Table of contents
- Copyright
- Acknowledgments
- Introduction
-
1. General Security Concepts
- 1.1. Identifying Access Control Models
- 1.2. Identifying Authentication Methods
- 1.3. Identifying Non-Essential Services
-
1.4. Identifying Attack Methods
-
1.4.1. Critical Information
- 1.4.1.1. Denial of Service/Distributed Denial of Service (DOS/DDOS) Attacks
- 1.4.1.2. Back Door Attacks
- 1.4.1.3. Spoofing Attacks
- 1.4.1.4. Man-in-the-Middle Attacks
- 1.4.1.5. Replay Attacks
- 1.4.1.6. TCP/IP Hijacking Attacks
- 1.4.1.7. Weak Keys
- 1.4.1.8. Mathematical Attacks
- 1.4.1.9. Social Engineering
- 1.4.1.10. Birthday Attacks
- 1.4.1.11. Password-Guessing Attacks
- 1.4.1.12. Software Exploitation Attacks
- 1.4.2. Exam Essentials
-
1.4.1. Critical Information
- 1.5. Identifying Malicious Code
- 1.6. Understanding Social Engineering
- 1.7. Understanding Auditing
- 1.8. Review Questions
- 1.9. Answers to Review Questions
-
2. Communication Security
-
2.1. Remote Access Technologies
-
2.1.1. Critical Information
- 2.1.1.1. 802.1x
- 2.1.1.2. Virtual Private Network (VPN)
- 2.1.1.3. Remote Authentication Dial-In User Service (RADIUS)
- 2.1.1.4. Terminal Access Controller Access Control System (TACACS)
- 2.1.1.5. Layer 2 Tunneling Protocol / Point to Point Tunneling Protocol (L2TP/PPTP)
- 2.1.1.6. Secure Shell (SSH)
- 2.1.1.7. Internet Protocol Security (IPSec)
- 2.1.1.8. Vulnerabilities
- 2.1.2. Exam Essentials
-
2.1.1. Critical Information
- 2.2. E-mail Security
- 2.3. Internet Security
- 2.4. Directory Security
- 2.5. File Transfer Protocols
- 2.6. Wireless
- 2.7. Review Questions
- 2.8. Answers to Review Questions
-
2.1. Remote Access Technologies
-
3. Infrastructure Security
-
3.1. Security Devices
-
3.1.1. Critical Information
- 3.1.1.1. Firewalls
- 3.1.1.2. Routers
- 3.1.1.3. Switches
- 3.1.1.4. Wireless
- 3.1.1.5. Modems
- 3.1.1.6. RAS (Remote Access Server)
- 3.1.1.7. Telecom / PBX (Private Branch Exchange)
- 3.1.1.8. VPN (Virtual Private Network)
- 3.1.1.9. IDS (Intrusion Detection System)
- 3.1.1.10. Network Monitoring/Diagnostics
- 3.1.1.11. Workstations
- 3.1.1.12. Servers
- 3.1.1.13. Mobile Devices
- 3.1.2. Exam Essentials
-
3.1.1. Critical Information
- 3.2. Media Security
- 3.3. Security Topologies
- 3.4. Intrusion Detection
-
3.5. Environment Hardening
-
3.5.1. Critical Information
- 3.5.1.1. OS/NOS (Operating System/Network Operating System) Hardening
- 3.5.1.2. Network Hardening
-
3.5.1.3. Application Hardening
- 3.5.1.3.1. Updates (Hotfixes, Service Packs, Patches)
- 3.5.1.3.2. Web Servers
- 3.5.1.3.3. E-mail Servers
- 3.5.1.3.4. FTP (File Transfer Protocol) Servers
- 3.5.1.3.5. DNS (Domain Name Service) Servers
- 3.5.1.3.6. NNTP (Network News Transfer Protocol) Servers
- 3.5.1.3.7. File/Print Servers
- 3.5.1.3.8. DHCP (Dynamic Host Configuration Protocol) Servers
- 3.5.1.3.9. Data Repositories
- 3.5.1.3.10. Directory Services
- 3.5.1.3.11. Databases
- 3.5.2. Exam Essentials
-
3.5.1. Critical Information
- 3.6. Review Questions
- 3.7. Answers to Review Questions
-
3.1. Security Devices
-
4. Basics of Cryptography
- 4.1. Cryptographic Algorithms
- 4.2. Cryptography Security Concepts
- 4.3. Public Key Infrastructure
- 4.4. Cryptographic Standards And Protocols
- 4.5. Key Management and Certificate Lifecycles
- 4.6. Review Questions
- 4.7. Answers to Review Questions
-
5. Operational/Organizational Security
- 5.1. Physical Security
- 5.2. Disaster Recovery
- 5.3. Business Continuity
-
5.4. Security Policy Issues
-
5.4.1. Critical Information
-
5.4.1.1. Security Policy
- 5.4.1.1.1. Acceptable Use
- 5.4.1.1.2. Due Care
- 5.4.1.1.3. Privacy
- 5.4.1.1.4. Separation of Duties
- 5.4.1.1.5. Need to Know
- 5.4.1.1.6. Password Management
- 5.4.1.1.7. SLAs (Service Level Agreements)
- 5.4.1.1.8. Disposal/Destruction
- 5.4.1.1.9. HR (Human Resources) Policy
- 5.4.1.1.10. Termination (Adding and revoking passwords and privileges, etc.)
- 5.4.1.1.11. Hiring (Adding and revoking passwords and privileges, etc.)
- 5.4.1.1.12. Code of Ethics
- 5.4.1.2. Incident Response Policy
-
5.4.1.1. Security Policy
- 5.4.2. Exam Essentials
-
5.4.1. Critical Information
- 5.5. Privilege Management
- 5.6. Forensics
- 5.7. Risk Identification
- 5.8. Security Training
- 5.9. Security Documentation
- 5.10. Review Questions
- 5.11. Answers to Review Questions
- Glossary
Product information
- Title: Security+™ Fast Pass
- Author(s):
- Release date: October 2004
- Publisher(s): Sybex
- ISBN: 9780782143591
You might also like
book
Network+™ Fast Pass
Get the Perfect Preparation and Review Resource Network+ Fast Pass is the streamlined tool you need …
book
Windows® 98 Unleashed
Windows 98 Unleashed provides you with comprehensive coverage of the newest Windows features. This complete reference …
book
Official (ISC)2® Guide to the ISSMP® CBK®
As the recognized leader in the field of information security education and certification, the (ISC)2® promotes …
book
Special Edition Using Windows 95 with Internet Explorer 4.0
Using Windows 95 with IE 4.0 is a comprehensive reference for the intermediate to advanced user, …