Book description
TICSA (TruSecure ICSA Computer Security Associate) is a popular new entry-level computer security certification aimed at individuals with 2 or more years of computer security experience or training equivalent to 48 hours in a 24 month period. TICSA represents base level certification, and is designed for system or network administrators responsible for security administration of systems or networks in an enterprise alongside their regular responsibilities. This first-tier certification recognizes that not all security professionals need to become security wizards to perform serious and effective security work.
Que's Training Guides, which are endorsed by cramsessions.com as Cramsession Approved Study Material, are the most effective self-study guides in the marketplace, featuring exam tips, study strategies, practice exams, and many more valuable tools for test preparation. The CD features PrepLogic™ Practice Tests, Preview Edition. This product includes one complete PrepLogic Practice Test with approximately the same number of questions found on the actual vendor exam with full, detailed explanations of correct and incorrect answers.
Table of contents
- Copyright
- About the Authors
- Acknowledgments
- Tell Us What You Think!
- How to Use This Book
- Introduction
-
Exam Preparation
-
Information Security Essentials
- Introduction
- Understanding the Need for Security Controls
- Data Protection
- Basic Security Threats and Principles
- Where Attacks Can Come From
- Assessing and Valuing Security
- Identifying the Elements of Security
- Understanding Security Trade-Offs and Drawbacks
- Case Study: San Diego Security Company
- Chapter Summary
- Apply Your Knowledge
- Fundamentals of TCP/IP
-
Information Security Basics
- Introduction
- AAA Overview: Access Control, Authentication, and Accounting
- Security Administration—The Importance of a Security Policy
- Keeping Up with and Enforcing Security Policies
- Risk Assessment
- Why Data Classification Is Important
- The Importance of Change Management
- Performing Vulnerability Assessments
- Case Study: Acme Industries
- Chapter Summary
- Apply Your Knowledge
-
Intrusion Detection and Prevention
- Introduction
- Necessary Components to Good Security
- Intrusion Detection Systems Fundamentals
- Discussion on Firewall Architectures
- Administration of Firewalls
- Understanding Incident Handling
- Setting Up a Honeypot to Attract the Intruder
- Using Vulnerability Scanners
- Network Sniffers
- Chapter Summary
- Apply Your Knowledge
- System Security Using Firewalls
- Disaster Planning and Recovery
- Intrusions, Attacks, and Countermeasures
- Operating System Security
-
Cryptography and Public Key Infrastructure
- Introduction
- Brief History of Cryptography
- Uses of Cryptography in Information Security
- Types of Encryption
- Digital Certificates
- Hashing and Hash Functions
- Digital Signatures
- Managing the Encryption Keys
- Steganography
- Introduction to PKI
- Case Study: Using Encryption Technologies to Secure a Small Network
- Chapter Summary
- Apply Your Knowledge
-
Computer Law and Ethics
- Introduction
- Types of Computer Law
- Categories of Intellectual Property Law
- Types of Computer Crime
- Information Privacy Laws
- Basics of Computer Investigation and Forensics
- Technology Export and Import Issues
- Computer Ethics
- How to Protect You and Your Company
- Case Study: Investigating a Computer Crimes Case
- Chapter Summary
- Apply Your Knowledge
-
Information Security Essentials
-
Final Review
-
Fast Facts
- Introductory Note: Learn Key Terms!
- Define, Specify, or Identify Examples of Essential Security Practices
- Identify or Explain Examples of Risk Management Fundamentals and the Basic Tenets of Security
- Describe, Recognize, or Select Basic Weaknesses in TCP/IP Networking
- Describe, Recognize, or Select Good Firewall Architectures, Properties, and Administration Fundamentals
- Describe, Recognize, or Select Good Intrusion Detection Methodologies, Applications, and Disaster Recovery and Forensic Practices
- Describe, Recognize, or Select Good Administrative Maintenance and Change-Control Issues and Tools
- Identify the Basic Security Issues Associated with System/Network Design and Configuration
- Identify and Explain Basic Malicious Code Threats and Common Defensive Mechanisms
- Identify, Specify, or Describe Common Computer and Network Ethical, Legal, and Privacy Issues
- Identify, Specify, or Describe Good Access Control and Authentication Processes and Techniques
- Identify Key Issues of Cryptography, and Be Able to Explain Basic Cryptographic Methods in Use Today
- Explain, Identify, or Recognize Basic Uses, Requirements, and Functions of PKI and Digital Certificates
- Identify, Specify, or Describe Good Host- and Network-Based Security Fundamentals
- Explain, Identify, or Recognize Fundamentals of Operating System Security
- Understanding Hacker Tools and Techniques
- Study and Exam Prep Tips
- Practice Exam
-
Fast Facts
-
Appendixes
- Key ICSA Resources Online
-
General Security Resources and Bibliography
- Information Security Essentials
- Fundamentals of TCP/IP
- Information Security Basics
- Intrusion Detection and Prevention
- System Security Using Firewalls
- Disaster Planning and Recovery
- Intrusions, Attacks, and Countermeasures
- Operating System Security
- Cryptography and Public Key Infrastructure
- Computer Law
- Glossary of Technical Terms
- Overview of the Certification Process
- What's on the CD-ROM
- Using the PrepLogic Practice Tests, Preview Edition Software
- Index
Product information
- Title: TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001
- Author(s):
- Release date: September 2002
- Publisher(s): Pearson IT Certification
- ISBN: 9780789727831
You might also like
book
CCSP Self-Study: CCSP SNRS Exam Certification Guide
Official self-study test preparation guide for the Cisco SNRS exam 642-502 Attack threats Router management and …
book
CompTIA® Security+™ Rapid Review (Exam SY0-301)
Assess your readiness for CompTIA Security+ Exam SY0-301—and quickly identify where you need to focus and …
book
CompTIA® Security+™ SY0-301 Exam Cram, Third Edition
Prepare for CompTIA Security+ SY0-301 exam success with this CompTIA Authorized Exam Cram from Pearson IT …
book
CCNA Security Official Exam Certification Guide (Exam 640-553)
CCNA Security Official Exam Certification Guide Master the IINS 640-553 exam with this official study guide …