CompTIA Security+ Study Guide

Exam SY0-501
 
 
Standards Information Network (Verlag)
  • 7. Auflage
  • |
  • erschienen am 5. Oktober 2017
  • |
  • 512 Seiten
 
E-Book | PDF mit Adobe DRM | Systemvoraussetzungen
978-1-119-41690-6 (ISBN)
 
Some copies of CompTIA Security+ Study Guide: Exam SY0-501 (9781119416876) were printed without discount exam vouchers in the front of the books. If you did not receive a discount exam voucher with your book, please visit http://media.wiley.com/product_ancillary/5X/11194168/DOWNLOAD/CompTIA_Coupon.pdf to download one.
Expert preparation covering 100% of Security+ exam SY0-501 objectives
CompTIA Security+ Study Guide, Seventh Edition offers invaluable preparation for Exam SY0-501. Written by an expert author team, this book covers 100% of the exam objectives with clear, concise explanation. You'll learn how to handle threats, attacks, and vulnerabilities using industry-standard tools and technologies, while understanding the role of architecture and design. From everyday tasks like identity and access management to complex topics like risk management and cryptography, this study guide helps you consolidate your knowledge base in preparation for the Security+ exam. Practical examples illustrate how these processes play out in real-world scenarios, allowing you to immediately translate essential concepts to on-the-job application. You also gain access to the Sybex online learning environment, which features a robust toolkit for more thorough prep: flashcards, glossary of key terms, practice questions, and a pre-assessment exam equip you with everything you need to enter the exam confident in your skill set.
This study guide is approved and endorsed by CompTIA, and has been fully updated to align with the latest version of the exam.
* Master essential security technologies, tools, and tasks
* Understand how Security+ concepts are applied in the real world
* Study on the go with electronic flashcards and more
* Test your knowledge along the way with hundreds of practice questions
To an employer, the CompTIA Security+ certification proves that you have the knowledge base and skill set to secure applications, devices, and networks; analyze and respond to threats; participate in risk mitigation, and so much more. As data threats loom larger every day, the demand for qualified security professionals will only continue to grow. If you're ready to take the first step toward a rewarding career, CompTIA Security+ Study Guide, Seventh Edition is the ideal companion for thorough exam preparation.
7. Auflage
  • Englisch
  • Newark
  • |
  • USA
John Wiley & Sons Inc
  • Für Beruf und Forschung
  • Überarbeitete Ausgabe
  • 27,62 MB
978-1-119-41690-6 (9781119416906)
1119416906 (1119416906)
weitere Ausgaben werden ermittelt
Emmett Dulaney is a Professor at a small university in Indiana. He has written several certification books on Windows, Security, IT project management, and UNIX, and was co-author of two of Sybex's leading certification titles: CompTIA Security+ Study Guide and CompTIA A+ Complete Study Guide. Chuck Easttom is CEO and Chief Trainer for CEC-Security, which specializes in IT security training and CISP and Security+ exam preparation. He has over 18 years in the IT industry, 10 years teaching and training, and has authored 15 published books.
  • "Cover"
  • "Title Page"
  • "Copyright"
  • "Acknowledgments"
  • "About the Authors"
  • "Contents at a Glance"
  • "Contents"
  • "Table of Exercises"
  • "Introduction"
  • "Assessment Test"
  • "Answers to Assessment Test"
  • "Chapter 1 Managing Risk"
  • "Risk Terminology"
  • "Threat Assessment"
  • "Risk Assessment"
  • "Computing Risk Assessment"
  • "Assessing Privacy"
  • "Acting on Your Risk Assessment"
  • "Risks Associated with Cloud Computing"
  • "Risks Associated with Virtualization"
  • "Developing Policies, Standards, and Guidelines"
  • "Implementing Policies"
  • "Understanding Control Types and False Positives/Negatives"
  • "Risk Management Best Practices"
  • "Change Management"
  • "Summary"
  • "Exam Essentials"
  • "Review Questions"
  • "Chapter 2 Monitoring and Diagnosing Networks"
  • "Monitoring and Diagnosing Networks Terminology"
  • "Frameworks, Best Practices, and Configuration Guides"
  • "Industry-Standard Frameworks and Reference Architectures"
  • "National Institute of Standards and Technology (NIST)"
  • "Benchmarks/Secure Configuration Guides"
  • "Secure Network Architecture Concepts"
  • "Zones"
  • "Tunneling/VPN"
  • "Placing Security Devices"
  • "SDN"
  • "IDS vs. IPS"
  • "Secure Systems Design"
  • "Hardware and Firmware Security"
  • "Operating Systems"
  • "Peripherals"
  • "Secure Staging Deployment Concepts"
  • "Summary"
  • "Exam Essentials"
  • "Review Questions"
  • "Chapter 3 Understanding Devices and Infrastructure"
  • "Infrastructure Terminology"
  • "Designing with Security in Mind"
  • "Firewalls"
  • "VPNs and VPN Concentrators"
  • "Intrusion Detection Systems"
  • "Router"
  • "Switch"
  • "Proxy"
  • "Load Balancer"
  • "Access Point"
  • "SIEM"
  • "DLP"
  • "Network Access Control (NAC)"
  • "Mail Gateway"
  • "Bridge"
  • "SSL/TLS Accelerators"
  • "SSL Decryptors"
  • "Media Gateway"
  • "Hardware Security Module"
  • "Summary"
  • "Exam Essentials"
  • "Review Questions"
  • "Chapter 4 Identity and Access Management"
  • "Using Tools to Assess Your Network"
  • "Protocol Analyzer"
  • "Network Scanners"
  • "Password Cracker"
  • "Vulnerability Scanners"
  • "Command-Line Tools"
  • "Additional Tools"
  • "Troubleshooting Common Security Issues"
  • "Access Issues"
  • "Configuration Issues"
  • "Security Technologies"
  • "Intrusion Detection Systems"
  • "Antimalware"
  • "Firewalls and Related Devices"
  • "Other Systems"
  • "Identity and Access Management Concepts"
  • "Identification vs. Authentication"
  • "Authentication (Single Factor) and Authorization"
  • "Multifactor Authentication"
  • "Biometrics"
  • "Federations"
  • "Potential Authentication and Access Problems"
  • "LDAP"
  • "PAP, SPAP, and CHAP"
  • "Kerberos"
  • "Working with RADIUS"
  • "TACACS, TACACS+, XTACACS"
  • "OATH"
  • "One-Time Passwords"
  • "SAML"
  • "Install and Configure Identity and Access Services"
  • "Mandatory Access Control"
  • "Discretionary Access Control"
  • "Role-Based Access Control"
  • "Rule-Based Access Control"
  • "ABAC"
  • "Smartcards"
  • "Tokens"
  • "File and Database Security"
  • "Summary"
  • "Exam Essentials"
  • "Review Questions"
  • "Chapter 5 Wireless Network Threats"
  • "Wireless Threat Terminology"
  • "Wireless Vulnerabilities to Know"
  • "Replay"
  • "Rogue APs and Evil Twins"
  • "Jamming"
  • "WPS"
  • "Bluejacking"
  • "Bluesnarfing"
  • "NFC and RFID"
  • "Disassociation"
  • "Wireless Commonsense"
  • "Wireless Attack Analogy"
  • "Summary"
  • "Exam Essentials"
  • "Review Questions"
  • "Chapter 6 Securing the Cloud"
  • "Cloud-Related Terminology"
  • "Working with Cloud Computing"
  • "Software as a Service (SaaS)"
  • "Platform as a Service (PaaS)"
  • "Infrastructure as a Service (IaaS)"
  • "Private Cloud"
  • "Public Cloud"
  • "Community Cloud"
  • "Hybrid Cloud"
  • "Working with Virtualization"
  • "Understanding Hypervisors"
  • "Understanding Containers and Application Cells"
  • "VDI/VDE"
  • "On-Premise vs. Hosted vs. Cloud"
  • "VM Escape Protection"
  • "VM Sprawl Avoidance"
  • "Security and the Cloud"
  • "Cloud Access Security Brokers"
  • "Cloud Storage"
  • "Security as a Service"
  • "Summary"
  • "Exam Essentials"
  • "Review Questions"
  • "Chapter 7 Host, Data, and Application Security"
  • "Threat Actors and Attributes"
  • "Script Kiddies"
  • "Hacktivist"
  • "Organized Crime"
  • "Nation-States/APT"
  • "Insiders"
  • "Competitors"
  • "Use of Open Source Intelligence"
  • "Types of Vulnerabilities"
  • "Configuration Issues"
  • "User Issues"
  • "Zero-Day Exploits"
  • "Other Issues"
  • "Embedded Systems Security"
  • "Application Vulnerabilities"
  • "Input Vulnerabilities"
  • "Memory Vulnerabilities"
  • "Secure Programming"
  • "Programming Models"
  • "Software Testing"
  • "Specific Types of Testing"
  • "Secure Coding Standards"
  • "Application Configuration Baselining"
  • "Operating System Patch Management"
  • "Application Patch Management"
  • "Other Application Security Issues"
  • "Databases and Technologies"
  • "Database Security"
  • "Secure Configurations"
  • "Code Issues"
  • "Summary"
  • "Exam Essentials"
  • "Review Questions"
  • "Chapter 8 Cryptography"
  • "An Overview of Cryptography"
  • "Historical Cryptography"
  • "Modern Cryptography"
  • "Working with Symmetric Algorithms"
  • "Working with Asymmetric Algorithms"
  • "Cryptography Concepts"
  • "Hashing Algorithms"
  • "Rainbow Tables and Salt"
  • "Key Stretching"
  • "Cryptanalysis Methods"
  • "Wi-Fi Encryption"
  • "Using Cryptographic Systems"
  • "Confidentiality and Strength"
  • "Integrity"
  • "When to Encrypt"
  • "Digital Signatures"
  • "Authentication"
  • "Nonrepudiation"
  • "Key Features"
  • "Understanding Cryptography Standards and Protocols"
  • "The Origins of Encryption Standards"
  • "Public Key Infrastructure X.509/Public Key Cryptography Standards"
  • "X.509"
  • "Public Key Infrastructure"
  • "Pretty Good Privacy"
  • "SSL and TLS"
  • "Using Public Key Infrastructure"
  • "Hardware-Based Encryption Devices"
  • "Data Encryption"
  • "Authentication"
  • "Summary"
  • "Exam Essentials"
  • "Review Questions"
  • "Chapter 9 Threats, Attacks, and Vulnerabilities"
  • "Threat and Attack Terminology"
  • "Living in a World of Viruses"
  • "Symptoms of a Virus Infection"
  • "How Viruses Work"
  • "Types of Viruses"
  • "Managing Spam to Avoid Viruses"
  • "Antivirus Software"
  • "Malware and Crypto-Malware"
  • "Understanding Various Types of Application/Service Attacks"
  • "Identifying Denial-of-Service and Distributed Denial-of-Service Attacks"
  • "Man-in-the-Middle Attacks"
  • "Buffer Overflow"
  • "Injection"
  • "Cross-Site Scripting and Request Forgery"
  • "Privilege Escalation"
  • "ARP Poisoning"
  • "Amplification"
  • "DNS Poisoning"
  • "Domain Hijacking"
  • "Man-in-the-Browser"
  • "Zero-Day Exploits"
  • "Replay Attacks"
  • "Pass the Hash"
  • "Hijacking and Related Attacks"
  • "Driver Manipulation"
  • "MAC and IP Spoofing Attacks"
  • "Summary"
  • "Exam Essentials"
  • "Review Questions"
  • "Chapter 10 Social Engineering and Other Foes"
  • "Social Engineering and Physical Security Terminology"
  • "Understanding Social Engineering"
  • "Types of Social Engineering Attacks"
  • "What Motivates an Attack?"
  • "The Principles Behind Social Engineering"
  • "Social Engineering Attack Examples"
  • "Understanding Physical Security"
  • "Lighting"
  • "Signs"
  • "Fencing, Gates, and Cages"
  • "Security Guards"
  • "Alarms"
  • "Safe"
  • "Secure Cabinets and Enclosures"
  • "Protected Distribution"
  • "Protected Cabling"
  • "Airgap"
  • "Mantrap"
  • "Faraday Cage"
  • "Lock Types"
  • "Biometrics"
  • "Barricades/Bollards"
  • "Tokens/Cards"
  • "Environmental Controls"
  • "Cable Locks"
  • "Screen Filters"
  • "Cameras"
  • "Motion Detection"
  • "Logs"
  • "Infrared Detection"
  • "Key Management"
  • "Various Control Types"
  • "An Analogy of Control Types"
  • "Data Security and Privacy Practices"
  • "Data Destruction and Media Sanitation"
  • "Data Sensitivity Labeling and Handling"
  • "Data Roles"
  • "Data Retention"
  • "Legal and Compliance"
  • "Summary"
  • "Exam Essentials"
  • "Review Questions"
  • "Chapter 11 Security Administration"
  • "Connection Types"
  • "Cellular"
  • "Bluetooth"
  • "Wi-Fi"
  • "Infrared"
  • "SATCOM"
  • "Mobile Devices"
  • "BYOD Issues"
  • "Enforcement"
  • "Account Management Concepts"
  • "Account Types"
  • "General Concepts"
  • "Summary"
  • "Exam Essentials"
  • "Review Questions"
  • "Chapter 12 Disaster Recovery and Incident Response"
  • "Disaster and Incident Related Terminology"
  • "Penetration Testing"
  • "What Should You Test?"
  • "Vulnerability Scanning"
  • "Issues Associated with Business Continuity"
  • "Types of Storage Mechanisms"
  • "Crafting a Disaster-Recovery Plan"
  • "Incident Response Procedures"
  • "Understanding Incident Response"
  • "Tabletop Exercises"
  • "Summary"
  • "Exam Essentials"
  • "Review Questions"
  • "Appendix Answers to Review Questions"
  • "Chapter 1: Managing Risk"
  • "Chapter 2: Monitoring and Diagnosing Networks"
  • "Chapter 3: Understanding Devices and Infrastructure"
  • "Chapter 4: Identity and Access Management"
  • "Chapter 5: Wireless Network Threats"
  • "Chapter 6: Securing the Cloud"
  • "Chapter 7: Host, Data, and Application Security"
  • "Chapter 8: Cryptography"
  • "Chapter 9: Threats, Attacks, and Vulnerabilities"
  • "Chapter 10: Social Engineering and Other Foes"
  • "Chapter 11: Security Administration"
  • "Chapter 12: Disaster Recovery and Incident Response"
  • "Index"
  • "Advert"

Dateiformat: PDF
Kopierschutz: Adobe-DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)

Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Adobe-DRM wird hier ein "harter" Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Download (sofort verfügbar)

34,99 €
inkl. 19% MwSt.
Download / Einzel-Lizenz
PDF mit Adobe DRM
siehe Systemvoraussetzungen
E-Book bestellen

Unsere Web-Seiten verwenden Cookies. Mit der Nutzung dieser Web-Seiten erklären Sie sich damit einverstanden. Mehr Informationen finden Sie in unserem Datenschutzhinweis. Ok