CompTIA Security + / Edition 2

CompTIA Security + / Edition 2

1.0 4
by T. J. Samuelle, Trevor Kay
     
 

ISBN-10: 0071601236

ISBN-13: 9780071601238

Pub. Date: 11/06/2008

Publisher: McGraw-Hill Osborne

From the #1 Name in Professional Certification

Get on the fast track to becoming CompTIA Security+ certified with this affordable, portable study tool. Inside, network security expert T.J. Samuelle guides you on your career path, providing expert tips and sound advice along the way. With an intensive focus only on what you need to know to pass the CompTIA

…  See more details below

Overview

From the #1 Name in Professional Certification

Get on the fast track to becoming CompTIA Security+ certified with this affordable, portable study tool. Inside, network security expert T.J. Samuelle guides you on your career path, providing expert tips and sound advice along the way. With an intensive focus only on what you need to know to pass the CompTIA Security+ exam, this certification passport is your ticket to success on exam day.

Featuring:

  • Itineraries—List of official exam objectives covered

  • ETAs—Amount of time needed to complete each lesson

  • Travel Advisories—Expert advice on critical topics

  • Local Lingo—Concise definitions of key terms and concepts

  • Travel Assistance—Recommended resources for more information

  • Exam Tips—Common exam pitfalls and solutions

  • Checkpoints—End-of-chapter questions, answers, and explanations

  • Career Flight Path—Career options mapped out to maximize the return from your IT journey

  • Practice exam on CD powered by LearnKey

Read More

Product Details

ISBN-13:
9780071601238
Publisher:
McGraw-Hill Osborne
Publication date:
11/06/2008
Edition description:
Paperback with CDROM
Pages:
448
Product dimensions:
6.00(w) x 9.00(h) x 1.30(d)

Related Subjects

Table of Contents

Check-In
Part I: Systems Security
Chapter 1. System Security Threats and Risks
Objective 1.01 Differentiate Among Various Systems Security Threats Object 1.02 Explain System Hardware and Peripheral Risks
Chapter 2. System Software Security
Objective 2.01 Implement OS Hardening Practices Objective 2.02 Establish Application Security Objective 2.03 Implement Security Applications Objective 2.04 Explain Virtualization Technology
Part II: Network Infrastructure
Chapter 3. Network Security
Objective 3.01 Network Ports and Protocol Threats Objective 3.02 Network Design Elements and Components Objective 3.03 Network Device Vulnerabilities Objective 3.04 Transmission Media Vulnerabilities
Chapter 4. Network Security Tools and Wireless Security
Objective 4.01 Determine and Apply Appropriate Network Security Tools Objective 4.02 Explain Wireless Networking Vulnerabilities and Implement Mitigations
Part III: Access Control
Chapter 5. Access Control
Objective 5.01 Identify and Apply Access Control Methods Objective 5.02 Explain Common Access Control Models Objective 5.03 Organize Appropriate Security Groups, Roles, Rights, and Privileges Objective 5.04 Apply File and Print Security Controls Objective 5.05 Compare and Implement Logical Access Control Methods
Chapter 6. Authentication
Objective 6.01 Explain Identification and Authentication Objective 6.02 Identify Authentication Models Objective 6.03 Deploy Authentication Models Objective 6.04 Apply Physical Access Security
Part IV: Assessments and Audits
Chapter 7. Risk and Vulnerability Assessment
Objective 7.01 Conduct Risk Assessments Objective 7.02 Perform Vulnerability Assessments Objective 7.03 Penetration Testing and Vulnerability
Chapter 8. Monitoring and Auditing
Objective 8.01 Monitor and Detect Security-Related Anomalies Objective 8.02 Compare Monitoring Methodologies Objective 8.03 Execute Proper Logging Procedures Objective 8.04 Conduct System Audits
Part V: Cryptography
Chapter 9. Cryptography and Encryption Overview
Objective 9.01 Explain General Cryptography Concepts Objective 9.02 Explain Basic Hashing Concepts Objective 9.03 Explain Basic Encryption Concepts Objective 9.04 Explain and Implement Protocols
Chapter 10. Public Key Cryptography
Objective 10.01 Public Key Cryptography Objective 10.02 Certificate Management
Part VI: Organizational Security
Chapter 11. Redundancy and Environmental Planning
Objective 11.01 Explain Redundancy Planning Objective 11.02 Explain Environmental Controls
Chapter 12. Disaster Recovery and Incident Response
Objective 12.01 Implement Disaster Recovery Procedures Objective 12.02 Execute Incident Response Procedures
Chapter 13. Organizational Policies and Procedures
Objective 13.01 Explain Legislation and Organizational Policies Objective 13.02 Reduce the Risks of Social Engineering
Appendix A: About the CD-ROM Appendix B: Career Flight Path Index

T.J. Samuelle, CompTIA Network+, CompTIA Server+, CompTIA Security+, is an IT consultant and author of several computer books on CompTIA certifications. He served as a subject matter expert for CompTIA on the Network+ and Security+ exams.

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >

CompTIA Security + 1 out of 5 based on 0 ratings. 5 reviews.
Anonymous More than 1 year ago
-The book is easy to read and understand. -The problem is the Master exam program included with the book. The answers to some of the questions are wrong, when the program grades you. The program did not help at all with my exam.
Anonymous More than 1 year ago
Anonymous More than 1 year ago
Anonymous More than 1 year ago
Anonymous More than 1 year ago