Diane Barrett is a professor in the Network Security and Computer Forensics programs at the University of Advancing Technology. She has authored several security and forensic books. Diane belongs to the local chapters of several security user groups, including HTCIA and InfraGard. She was also a volunteer for ISSA’s (Information Systems Audit and Control Association) Generally Accepted Information Security Principles (GAISP) in the Ethical Practices Working Group. She holds about 15 industry certifications, including CISSP, ISSMP, and Security+. Diane received her master’s of science degree in computer technology, with a specialization in information security, from Capella University.
Kalani K. Hausman, CISSP, CISA, CISM, GHSC, is an author, teacher, and information technology implementer with more than 20 years’ experience specializing in IT governance, enterprise architecture, regulatory compliance, and enterprise security management. His experience includes medium to large-scale globally deployed networks in governmental, higher-education, health-care, and corporate settings. He is active within the FBI InfraGard, Information Systems Audit and Control Association (ISACA) and ISSA and is currently employed as the Assistant Commandant for IT at Texas A&M University.
Martin Weiss is a manager of information security gurus at RSA, The Security Division of EMC, helping organizations accelerate their business by solving their most complex and sensitive security challenges. He is also on the board of directors for the Connecticut chapter of ISSA and has authored several other books. He holds several certifications, including Security+, CISSP, MCSE: Security, and RSA CSE. Marty received his MBA from the Isenberg School of Management at the University of Massachusetts and currently lives in New England with his wife and three sons. Marty can be reached at marty.weiss@gmail.com.
Introduction | p. 1 |
The CompTIA Certification Program | p. 2 |
Taking a Certification Exam | p. 3 |
Tracking Certification Status | p. 4 |
About This Book | p. 5 |
Chapter Format and Conventions | p. 5 |
Exam Topics | p. 7 |
Self-Assessment | p. 11 |
CompTIA Certification in the Real World | p. 11 |
The Ideal CompTIA Certification Candidate | p. 12 |
Put Yourself to the Test | p. 14 |
How to Prepare for an Exam | p. 19 |
Studying for the Exam | p. 19 |
Testing Your Exam Readiness | p. 21 |
Dealing with Test Anxiety | p. 22 |
Day of the Exam | p. 23 |
System Security | |
System Threats and Risks | p. 27 |
Systems Security Threats | p. 28 |
Privilege Escalation | p. 28 |
Viruses | p. 30 |
Worms | p. 31 |
Trojans | p. 32 |
Table of Contents provided by Publisher. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.