CompTIA Security+ Certification Study Guide: Exam SY0-201 3ESyngress, 17 aug 2009 - 784 pagina's CompTIA Security+ Certification Study Guide: Exam SYO-201, Third Edition, offers a practical guide for those interested in pursuing CompTIA Security+ certification. The book is organized into six parts. Part 1 deals with general security issues including security threats; hardware and peripheral security risks; the fundamentals of operating system (OS) hardening; implementing system security applications; and concepts of virtualization. Part 2 discusses the fundamentals of network security. Part 3 focuses on network access and network authentication. Part 4 explains the importance of risk assessments and risk mitigation, and how to conduct them. Part 5 reviews general cryptographic concepts and addresses the complex issues involved in planning a certificate-based public key infrastructure (PKI). Part 6 on organizational security discusses redundancy planning; environmental controls; implementing disaster recovery and incident response procedures; and the policies, procedures, and documentation upon which organizational computer security is based. Each chapter begins with Exam Objectives and concludes with Self-Test questions along with their corresponding answers.
|
Inhoudsopgave
43 | |
Chapter 3 Application Security | 83 |
Chapter 4 Implementing System Security Applications | 125 |
Chapter 5 Virtualization Technologies | 213 |
Part 2 Network Infrastructure | 247 |
Chapter 7 Wireless Networks | 309 |
Part 3 Access Control | 337 |
Chapter 9 Network Authentication | 381 |
Part 4 Assessments and Audits | 421 |
Veelvoorkomende woorden en zinsdelen
access control subject Active Directory administrator adware algorithm allow Answers and Explanations antivirus antivirus software application attack authentication backup browser buffer overflow certificate client configuration connection cookies Correct Answer create cryptography database decrypt detection devices document domain downloaded e-mail employees encryption ensure exAm ObjecTIVeS exAm wARNINg example Figure hacker hard disk hardware hash host hypervisor implement incorrect installed Internet IP addresses IPSec Kerberos LDAP machine malicious malware method Microsoft monitor operating system option organization packet password perform physical port private key protect Protocol public key require rootkit scan Security+ exam server signature specific spyware storage stored TACACS tion traffic unauthorized user’s users virtual virus viruses VLANs vulnerabilities Windows Defender Windows Firewall Windows Server 2008 Windows Vista wireless networks worm