CompTIA Security+ Rapid Review (Exam SY0-301)

Overview

Assess your readiness for CompTIA Security+ Exam SY0-301—and quickly identify where you need to focus and practice. This practical, ...

See more details below
Paperback
$25.07
BN.com price
(Save 16%)$29.99 List Price

Pick Up In Store

Reserve and pick up in 60 minutes at your local store

Other sellers (Paperback)
  • All (10) from $3.99   
  • New (5) from $18.46   
  • Used (5) from $3.99   
CompTIA Security+ Rapid Review (Exam SY0-301)

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK 7.0
  • Samsung Galaxy Tab 4 NOOK 10.1
  • NOOK HD Tablet
  • NOOK HD+ Tablet
  • NOOK eReaders
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$13.49
BN.com price
(Save 43%)$23.99 List Price

Overview

Assess your readiness for CompTIA Security+ Exam SY0-301—and quickly identify where you need to focus and practice. This practical, streamlined guide walks you through each exam objective, providing "need-to-know" checklists, review questions, tips, and links to further study—all designed to help bolster your preparation.

Reinforce your exam prep with a Rapid Review of these objectives:

  • Network security
  • Compliance and operational security
  • Threats and vulnerabilities
  • Application, data and host security
  • Access control and identity management
  • Cryptography

This book is an ideal complement to the in-depth training of the Microsoft Press® Training Kit and other exam-prep resources for CompTIA Security+ Exam SY0-301.

Read More Show Less

Product Details

  • ISBN-13: 9780735666856
  • Publisher: Microsoft Press
  • Publication date: 12/26/2012
  • Pages: 258
  • Sales rank: 1,441,332
  • Product dimensions: 5.40 (w) x 8.50 (h) x 0.70 (d)

Meet the Author

Michael Gregg, Security+, A+, Network+, CISSP, SSCP, CISA, MCSE, MCT, CTT+, CNA, CCNA, CIW Security Analyst, CCE, CEH, CHFI, DCNP, and ES Dragon IDS, is founder and president of Superior Solutions, Inc., a Houston, Texas–based IT security consulting firm. Superior Solutions performs security assessments and penetration testing for Fortune 1000 firms. Michael has written or co-written 14 books.

Read More Show Less

Table of Contents

Introduction;
CompTIA Professional Certification Program;
Acknowledgments;
Support & Feedback;
Errata;
We Want to Hear from You;
Stay in Touch;
Preparing for the Exam;
Chapter 1: Network Security;
1.1 Objective 1.1: Explain the security function and purpose of network devices and technologies;
1.2 Objective 1.2: Apply and implement secure network administration principles;
1.3 Objective 1.3: Distinguish and differentiate network design elements and compounds;
1.4 Objective 1.4: Implement and use common protocols;
1.5 Objective 1.5: Identify commonly used default network ports;
1.6 Objective 1.6: Implement wireless networks in a secure manner;
1.7 Answers;
Chapter 2: Compliance and Operational Security;
2.1 Objective 2.1: Explain risk related concepts;
2.2 Objective 2.2: Carry out appropriate risk mitigation strategies;
2.3 Objective 2.3: Execute appropriate incident response procedures;
2.4 Objective 2.4: Explain the importance of security related awareness and training;
2.5 Objective 2.5: Compare and contrast aspects of business continuity;
2.6 Objective 2.6: Explain the impact and proper use of environmental controls;
2.7 Objective 2.7: Execute disaster recovery plans and procedures;
2.8 Objective 2.8: Exemplify the concepts of confidentiality, integrity, and availability (CIA);
2.9 Answers;
Chapter 3: Threats and Vulnerabilities;
3.1 Objective 3.1: Analyze and differentiate among types of malware;
3.2 Objective 3.2: Analyze and differentiate among types of attacks;
3.3 Objective 3.3: Analyze and differentiate among types of social engineering attacks;
3.4 Objective 3.4: Analyze and differentiate among types of wireless attacks;
3.5 Objective 3.5: Analyze and differentiate among types of application attacks;
3.6 Exam need to know;
3.7 Objective 3.6: Analyze and differentiate among types of mitigation and deterrent techniques;
3.8 Objective 3.7: Implement assessment tools and techniques to discover security threats and vulnerabilities;
3.9 Objective 3.8: Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning;
3.10 Answers;
Chapter 4: Application, Data, and Host Security;
4.1 Objective 4.1: Explain the importance of application security;
4.2 Objective 4.2: Carry out appropriate procedures to establish host security;
4.3 Objective 4.3: Explain the importance of data security;
4.4 Answers;
Chapter 5: Access Control and Identity Management;
5.1 Objective 5.1: Explain the function and purpose of authentication services;
5.2 Objective 5.2: Explain the fundamental concepts and best practices related to authentication, authorization, and access control;
5.3 Objective 5.3: Implement appropriate security controls when performing account management;
5.4 Answers;
Chapter 6: Cryptography;
6.1 Objective 6.1: Summarize general cryptography concepts;
6.2 Objective 6.2: Use and apply appropriate cryptographic tools and products;
6.3 Objective 6.3: Explain the core concepts of public key infrastructure;
6.4 Objective 6.4: Implement PKI, certificate management, and associated components;
6.5 Answers;
Security+ Acronyms;

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)