Eleventh Hour Security+: Exam SY0-201 Study Guide [NOOK Book]

Overview

This book will focus on just the essentials needed to pass the Security+ certification exam. It will be filled with critical information in a way that will be easy to remember and use for your quickly approaching exam. It will focus on the main objectives of the exam and include the following pedagogy for ease of use in those final hours. The book will include: •Exam Objectives – Fast Track Review •Key ...

See more details below
Eleventh Hour Security+: Exam SY0-201 Study Guide

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK 7.0
  • Samsung Galaxy Tab 4 NOOK 10.1
  • NOOK HD Tablet
  • NOOK HD+ Tablet
  • NOOK eReaders
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$13.99
BN.com price
(Save 43%)$24.95 List Price

Overview

This book will focus on just the essentials needed to pass the Security+ certification exam. It will be filled with critical information in a way that will be easy to remember and use for your quickly approaching exam. It will focus on the main objectives of the exam and include the following pedagogy for ease of use in those final hours. The book will include: •Exam Objectives – Fast Track Review •Key words/definitions •Five Toughest questions and their answers •Exam Warnings – What to pay attention to



  • The only book keyed to the new SY0-201 objectives that has been crafted for last minute cramming
  • Easy to find, essential material with no fluff – this book does not talk about security in general, just how it applies to the test
  • Includes review of five toughest questions by topic - sure to improve your score
Read More Show Less

Product Details

  • ISBN-13: 9781597494946
  • Publisher: Elsevier Science
  • Publication date: 10/3/2009
  • Sold by: Barnes & Noble
  • Format: eBook
  • Edition number: 1
  • Pages: 232
  • File size: 379 KB

Meet the Author

Ido Dubrawsky (CISSP, CCNA, CCDA) is the Chief Security Advisor for Microsoft’s Communication Sector North America, a division of the Mobile and Embedded Devices Group. Prior to working at Microsoft, Ido was the acting Security Consulting Practice Lead at AT&T’s Callisma subsidiary and a Senior Security Consultant. Before joining AT&T, Ido was a Network Security Architect for Cisco Systems, Inc., SAFE Architecture Team. He has worked in the systems and network administration field for almost 20 years in a variety of environments from government to academia to private enterprise. He has a wide range of experience in various networks, from small to large and relatively simple to complex. Ido is the primary author of three major SAFE white papers and has written, and spoken, extensively on security topics. He is a regular contributor to the SecurityFocus website on a variety of topics covering security issues. Previously, he worked in Cisco Systems, Inc. Secure Consulting Group, providing network security posture assessments and consulting services for a wide range of clients. In addition to providing penetration-testing consultation, he also conducted security architecture reviews and policy and process reviews. He holds a B.Sc. and a M.Sc. in Aerospace Engineering from the University of Texas at Austin.
Read More Show Less

Table of Contents

About the Authors


Chapter 1 Systems Security


Systems security threats


Privilege escalation


Viruses and worms


Trojan


Spyware and adware


Rootkits and botnets


Logic bombs


Host intrusion detection system


Behavior-based vs. signature-based IDS characteristics


Anti-SPAM


Pop-up blockers


Hardware and peripheral security risks


BIOS


USB devices


Cell phones


Removable storage devices


Network attached storage


Summary of exam objectives


Top five toughest questions


Answers


Chapter 2 OS Hardening


General OS hardening


Services


File system


Removing unnecessary programs


Hotfixes/patches


Service packs/maintenance updates


Patch management


Windows group policies


Security templates


Configuration baselines


Server OS hardening


Enabling and disabling services and protocols


FTP servers


DNS servers


NNTP servers


File and print servers


DHCP servers


Data repositories


Workstation OS


User rights and groups


Summary of exam objectives


Top five toughest questions


Answers


Chapter 3 Application Security


Threats are moving “up the stack”


Rationale


Threat modeling


Application security threats


Browser


Buffer overflows


Packet sniffers and instant messaging


Instant messaging


Peer-to-peer


SMTP open relays


Summary of exam objectives


Top five toughest questions


Answers


Chapter 4 Virtualization Technologies


The purpose of virtualization


Benefits of virtualization


Types of virtualization


Designing a virtual environment


System virtualization


Management of virtual servers


Application virtualization


Application streaming


Summary of exam objectives


Top five toughest questions


Answers


Chapter 5 Network Security


General network security


Network services and risks associated with them


Network design elements


Network security tools


Network ports, services, and threats


Network ports and protocols


Network threats


Network design elements and components


Firewalls


What is a DMZ?


VLANs


Network address translation


Network access control/network access protection


Telephony


Network security tools


Intrusion detection and preventions systems


Honeypots


Content filters


Protocol analyzers


Summary of exam objectives


Top five toughest questions


Answers


Chapter 6 Wireless Networks


Wireless network design


Wireless communications


Spread spectrum technology


Wireless network architecture


CSMA/CD and CSMA/CA


Service set ID broadcast


Wireless security standards


The failure of WEP


WPA and WPA2


WAP


WTLS


Authentication


Rogue access points


Data emanation


Bluetooth


Summary of exam objectives


Top five toughest questions


Answers


References


Chapter 7 Network Access


General network access


Access control


Access control models


Authentication models and components


Identity


Access control methods and models


Separation of duties


Least privilege


Job rotation


Mandatory access control


Discretionary access control


Role- and rule-based access control


Access control organization


Security groups


Security controls


Logical access control methods


Access control lists


Group policies


Domain policies


Time of day restrictions


Account expiration


Logical tokens


Physical access security methods


Access lists and logs


Hardware locks


ID badges


Door access systems


Man-trap


Video surveillance


Summary of exam objectives


Top five toughest questions


Answers


Chapter 8 Network Authentication


Authentication methods


Access control


Authentication


Auditing


Authentication methods


One-factor


Two-factor


Three-factor


Single sign-on


Authentication systems


Remote access policies and authentication


Biometrics


Summary of exam objectives


Top five toughest questions


Answers


Chapter 9 Risk Assessment and Risk Mitigation


Conduct risk assessments and implement risk mitigation


Vulnerability assessment tools


Password crackers


Network mapping tools


Use monitoring tools on systems and networks


Workstations


Intrusion detection systems


Logging and auditing


Auditing systems


System Logs


Performance Logs


Access Logs


Audits


Summary of exam objectives


Top five toughest questions


Answers


Chapter 10 General Cryptographic Concepts


General cryptography


Symmetric key cryptography


Asymmetric key cryptography


Hashes and applications


Digital signatures


Certificates


CIA-For all your security needs


Non-repudiation


Key management


Encryption algorithms


DES


3DES


RSA


AES


Elliptic curve cryptography


One-time pads


Transmission encryption


WEP


TKIP


Protocols


SSL/TLS


HTTP vs. HTTPS vs. SHTTP


Other protocols with TLS


S/MIME


SSH


IPSec


PPTP


L2TP


Cryptography in operating systems


File and folder encryption


E-mail


Whole disk encryption


Trusted platform module


Summary of exam objectives


Top five toughest questions


Answers


Chapter 11 Public Key Infrastructure


PKI overview


PKI encryption


PKI Standards


PKI solutions


Components of PKI


Digital certificates


Certification authority


Certificate revocation list


Recovery agents


Certificate authority


Certificate revocation list


Key escrow


Registration


Recovery agents


Implementation


Certificate management


Summary of exam objectives


Top five toughest questions


Answers


Chapter 12 Redundancy Planning


Alternate sites


Hot site


Warm site


Cold site


Redundant systems


Servers


Connections


ISP


RAID


Spare parts


Backup generator


UPS


Summary of exam objectives


Top five toughest questions


Answers


Chapter 13 Controls and Procedures


Environmental controls


Fire suppression


HVAC


Shielding


Implementing disaster recovery and incident response procedures


Disaster recovery


Incident response


Defending against social engineering


Summary of exam objectives


Top five toughest questions


Answers


Chapter 14 Legislation and Organizational Policies


Secure disposal of systems


Retention/storage


Destruction


Acceptable use policies


Password complexity


Strong passwords


Password changes and restrictions


Administrator accounts


Change management


Information classification


Vacations


Separation of duties


Personally identifiable information


Privacy


Due care


Due process


Due diligence


SLAs


User education and awareness training


Communication


User awareness


Education


Online resources


Security-related HR policies


Code of Ethics


Summary of exam objectives


Top five toughest questions


Answers


Index












Read More Show Less

Customer Reviews

Average Rating 3.5
( 3 )
Rating Distribution

5 Star

(2)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(1)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 3 Customer Reviews
  • Anonymous

    Posted October 20, 2014

    The Unexpected Quest (DONT COMMENT HERE)

    Hyperion, titan of light, appears to be rising. Scenario: Two days ago, a blinding light shined in front of the satyrs. All burned up in the precence. One satyr survived, barely, and managed to bring the scroll to camp. He died soon after. Now, here we are. People: Okay. The selection. Kenny. Kai. Kayla. Lucas. Lunafall. (This was just a random selection. A person from a different camp said something about dating. How would I know?) Okay. So that is the quest. It will take place at deprive res 1-5

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted August 12, 2010

    No text was provided for this review.

  • Anonymous

    Posted January 22, 2011

    No text was provided for this review.

Sort by: Showing all of 3 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)