did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781118061176

CompTIA Security+ Review Guide, Includes CD Exam SY0-301

by
  • ISBN13:

    9781118061176

  • ISBN10:

    1118061179

  • Edition: 2nd
  • Format: Paperback
  • Copyright: 2011-06-21
  • Publisher: Sybex
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $29.99

Summary

Organized by exam objectives, this is a focused, concise review guide that works hand-in-hand with any learning tool, including the Sybex CompTIA Security+ Study Guide. The book is is broken into 6 Parts, each part corresponding to one of the 6 domain areas of the Security+ exam:#xA0; Network Security Compliance and Operational Security Threats and Vulnerabilities Application, Data and Host Security Access Control and Identity Management Cryptography In addition, book will have a companion CD with all end of chapter review quesitons in electronic format, two CD-only practice exams, 100-150 electronic flashcards, and a Glossary of Key Terms database.

Author Biography

James Michael Stewart, Security+, CISSP, is a security expert, writer, trainer, and researcher for Impact Online, an independent courseware development company located in Austin, Texas. He has contributed to over 75 books covering topics from IT security and certification to network administration and Microsoft certification. Michael provides IT instruction around the globe for various public and private organizations and holds numerous IT and security certifications. He is also a regular contributor to publications such as C|Net, InfoWorld, and Windows NT Magazine.

Table of Contents

Introduction.

Chapter 1 Network Security.

1.1 Explain the security function and purpose of network devices and technologies.

1.2 Apply and implement secure network administration principles.

1.3 Distinguish and differentiate network design elements and compounds.

1.4 Implement and use common protocols.

1.5 Identify commonly used default network ports.

1.6 Implement wireless network in a secure manner.

Chapter 2 Compliance and Operational Security.

2.1 Explain risk-related concepts.

2.2 Carry out appropriate risk mitigation strategies.

2.3 Execute appropriate incident response procedures.

2.4 Explain the importance of security-related awareness and training.

2.5 Compare and contrast aspects of business continuity.

2.6 Explain the impact and proper use of environmental controls.

2.7 Execute disaster recovery plans and procedures.

2.8 Exemplify the concepts of confidentiality, integrity, and availability (CIA).

Chapter 3 Threats and Vulnerabilities.

3.1 Analyze and differentiate among types of malware.

3.2 Analyze and differentiate among types of attacks.

3.3 Analyze and differentiate among types of social-engineering attacks.

3.4 Analyze and differentiate among types of wireless attacks.

3.5 Analyze and differentiate among types of application attacks.

3.6 Analyze and differentiate among types of mitigation and deterrent techniques.

3.7 Implement assessment tools and techniques to discover security threats and vulnerabilities.

3.8 Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning.

Chapter 4 Application, Data, and Host Security.

4.1 Explain the importance of application security.

4.2 Carry out appropriate procedures to establish host security.

4.3 Explain the importance of data security.

Chapter 5 Access Control and Identity Management.

5.1 Explain the function and purpose of authentication services.

5.2 Explain the fundamental concepts and best practices related to authentication, authorization, and access control.

5.3 Implement appropriate security controls when performing account management.

Chapter 6 Cryptography.

6.1 Summarize general cryptography concepts.

6.2 Use and apply appropriate cryptographic tools and products.

6.3 Explain the core concepts of Public Key Infrastructure.

6.4 Implement PKI, certificate management, and associated components.

Exam Essentials.

Review Questions.

Answers to Review Questions.

Appendix About the Companion CD.

Index.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program