,

CompTIA Security+ SY0-501 Cert Guide

Paperback Engels 2017 9780789758996
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

This is the most comprehensive core study tool for CompTIA's latest Security+ exam. Perfect for every candidate preparing for this challenging exam, its comprehensive coverage offers all the information and insight readers need to succeed. From start to finish, the book has been organized and edited to improve retention and help network and security professionals focus on areas where they need the most assistance.

 

This is the professional edition.

 

Academic Edition:

0789759128 / 9780789759122 CompTIA Security+ SYO-501 Cert Guide, Academic Edition

Specificaties

ISBN13:9780789758996
Taal:Engels
Bindwijze:paperback

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

<p>Introduction xxiv</p> <p><strong>Chapter 1</strong> Introduction to Security 3</p> <p>Foundation Topics 4</p> <p>Security 101 4</p> <p>The CIA of Computer Security 4</p> <p>The Basics of Information Security 6</p> <p>Think Like a Hacker 9</p> <p>Threat Actor Types and Attributes 10</p> <p>Chapter Review Activities 12</p> <p>Review Key Topics 12</p> <p>Define Key Terms 12</p> <p>Review Questions 13</p> <p>Answers and Explanations 15</p> <p><strong>Chapter 2</strong> Computer Systems Security Part I 19</p> <p>Foundation Topics 19</p> <p>Malicious Software Types 19</p> <p>Viruses 20</p> <p>Worms 21</p> <p>Trojan Horses 22</p> <p>Ransomware 22</p> <p>Spyware 23</p> <p>Rootkits 24</p> <p>Spam 25</p> <p>Summary of Malware Threats 25</p> <p>Delivery of Malware 26</p> <p>Via Software, Messaging, and Media 26</p> <p>Botnets and Zombies 28</p> <p>Active Interception 28</p> <p>Privilege Escalation 29</p> <p>Backdoors 29</p> <p>Logic Bombs 29</p> <p>Preventing and Troubleshooting Malware 30</p> <p>Preventing and Troubleshooting Viruses 31</p> <p>Preventing and Troubleshooting Worms and Trojans 35</p> <p>Preventing and Troubleshooting Spyware 35</p> <p>Preventing and Troubleshooting Rootkits 38</p> <p>Preventing and Troubleshooting Spam 38</p> <p>You Can't Save Every Computer from Malware! 40</p> <p>Summary of Malware Prevention Techniques 40</p> <p>Chapter Summary 41</p> <p>Chapter Review Activities 42</p> <p>Review Key Topics 42</p> <p>Define Key Terms 42</p> <p>Complete the Real-World Scenarios 43</p> <p>Review Questions 43</p> <p>Answers and Explanations 48</p> <p><strong>Chapter 3</strong> Computer Systems Security Part II 53</p> <p>Foundation Topics 53</p> <p>Implementing Security Applications 53</p> <p>Personal Software Firewalls 53</p> <p>Host-Based Intrusion Detection Systems 55</p> <p>Pop-Up Blockers 57</p> <p>Data Loss Prevention Systems 59</p> <p>Securing Computer Hardware and Peripherals 59</p> <p>Securing the BIOS 60</p> <p>Securing Storage Devices 62</p> <p>Removable Storage 62</p> <p>Network Attached Storage 63</p> <p>Whole Disk Encryption 64</p> <p>Hardware Security Modules 65</p> <p>Securing Wireless Peripherals 66</p> <p>Securing Mobile Devices 66</p> <p>Malware 67</p> <p>Botnet Activity 68</p> <p>SIM Cloning and Carrier Unlocking 68</p> <p>Wireless Attacks 69</p> <p>Theft 70</p> <p>Application Security 71</p> <p>BYOD Concerns 74</p> <p>Chapter Summary 78</p> <p>Chapter Review Activities 79</p> <p>Review Key Topics 79</p> <p>Define Key Terms 79</p> <p>Complete the Real-World Scenarios 80</p> <p>Review Questions 80</p> <p>Answers and Explanations 83</p> <p><strong>Chapter 4</strong> OS Hardening and Virtualization 89</p> <p>Foundation Topics 89</p> <p>Hardening Operating Systems 89</p> <p>Removing Unnecessary Applications and Services 90</p> <p>Windows Update, Patches, and Hotfixes 97</p> <p>Patches and Hotfixes 99</p> <p>Patch Management 101</p> <p>Group Policies, Security Templates, and Configuration Baselines 102</p> <p>Hardening File Systems and Hard Drives 105</p> <p>Virtualization Technology 109</p> <p>Types of Virtualization and Their Purposes 110</p> <p>Hypervisor 111</p> <p>Securing Virtual Machines 113</p> <p>Chapter Summary 115</p> <p>Chapter Review Activities 117</p> <p>Review Key Topics 117</p> <p>Define Key Terms 118</p> <p>Complete the Real-World Scenarios 118</p> <p>Review Questions 118</p> <p>Answers and Explanations 122</p> <p><strong>Chapter 5</strong> Application Security 127</p> <p>Foundation Topics 127</p> <p>Securing the Browser 127</p> <p>General Browser Security Procedures 129</p> <p>Implement Policies 129</p> <p>Train Your Users 133</p> <p>Use a Proxy and Content Filter 133</p> <p>Secure Against Malicious Code 135</p> <p>Web Browser Concerns and Security Methods 135</p> <p>Basic Browser Security 135</p> <p>Cookies 136</p> <p>LSOs 137</p> <p>Add-ons 137</p> <p>Advanced Browser Security 138</p> <p>Securing Other Applications 140</p> <p>Secure Programming 144</p> <p>Software Development Life Cycle 145</p> <p>Core SDLC and DevOps Principles 146</p> <p>Programming Testing Methods 149</p> <p>White-box and Black-box Testing 149</p> <p>Compile-Time Errors Versus Runtime Errors 150</p> <p>Input Validation 150</p> <p>Static and Dynamic Code Analysis 151</p> <p>Fuzz Testing 152</p> <p>Programming Vulnerabilities and Attacks 152</p> <p>Backdoors 153</p> <p>Memory/Buffer Vulnerabilities 153</p> <p>Arbitrary Code Execution/Remote Code Execution 155</p> <p>XSS and XSRF 155</p> <p>More Code Injection Examples 156</p> <p>Directory Traversal 158</p> <p>Zero Day Attack 158</p> <p>Chapter Summary 160</p> <p>Chapter Review Activities 161</p> <p>Review Key Topics 161</p> <p>Define Key Terms 162</p> <p>Complete the Real-World Scenarios 162</p> <p>Review Questions 162</p> <p>Answers and Explanations 167</p> <p><strong>Chapter 6</strong> Network Design Elements 173</p> <p>Foundation Topics 173</p> <p>Network Design 173</p> <p>The OSI Model 173</p> <p>Network Devices 175</p> <p>Switch 175</p> <p>Bridge 178</p> <p>Router 178</p> <p>Network Address Translation, and Private Versus Public IP 180</p> <p>Network Zones and Interconnections 182</p> <p>LAN Versus WAN 182</p> <p>Internet 183</p> <p>Demilitarized Zone (DMZ) 183</p> <p>Intranets and Extranets 184</p> <p>Network Access Control (NAC) 185</p> <p>Subnetting 186</p> <p>Virtual Local Area Network (VLAN) 188</p> <p>Telephony 190</p> <p>Modems 190</p> <p>PBX Equipment 191</p> <p>VoIP 191</p> <p>Cloud Security and Server Defense 192</p> <p>Cloud Computing 192</p> <p>Cloud Security 195</p> <p>Server Defense 198</p> <p>File Servers 198</p> <p>Network Controllers 199</p> <p>E-mail Servers 199</p> <p>Web Servers 200</p> <p>FTP Server 202</p> <p>Chapter Summary 203</p> <p>Chapter Review Activities 205</p> <p>Review Key Topics 205</p> <p>Define Key Terms 205</p> <p>Complete the Real-World Scenarios 205</p> <p>Review Questions 206</p> <p>Answers and Explanations 210</p> <p><strong>Chapter 7</strong> Networking Protocols and Threats 217</p> <p>Foundation Topics 217</p> <p>Ports and Protocols 217</p> <p>Port Ranges, Inbound Versus Outbound, and Common Ports 217</p> <p>Protocols That Can Cause Anxiety on the Exam 225</p> <p>Malicious Attacks 226</p> <p>DoS 226</p> <p>DDoS 229</p> <p>Sinkholes and Blackholes 230</p> <p>Spoofing 231</p> <p>Session Hijacking 232</p> <p>Replay 234</p> <p>Null Sessions 235</p> <p>Transitive Access and Client-Side Attacks 236</p> <p>DNS Poisoning and Other DNS Attacks 236</p> <p>ARP Poisoning 238</p> <p>Summary of Network Attacks 238</p> <p>Chapter Summary 242</p> <p>Chapter Review Activities 243</p> <p>Review Key Topics 243</p> <p>Define Key Terms 243</p> <p>Complete the Real-World Scenarios 243</p> <p>Review Questions 244</p> <p>Answers and Explanations 250</p> <p><strong>Chapter 8</strong> Network Perimeter Security 255</p> <p>Foundation Topics 256</p> <p>Firewalls and Network Security 256</p> <p>Firewalls 256</p> <p>Proxy Servers 263</p> <p>Honeypots and Honeynets 266</p> <p>Data Loss Prevention (DLP) 267</p> <p>NIDS Versus NIPS 268</p> <p>NIDS 268</p> <p>NIPS 269</p> <p>Summary of NIDS Versus NIPS 271</p> <p>The Protocol Analyzer's Role in NIDS and NIPS 271</p> <p>Unified Threat Management 272</p> <p>Chapter Summary 273</p> <p>Chapter Review Activities 274</p> <p>Review Key Topics 274</p> <p>Define Key Terms 274</p> <p>Complete the Real-World Scenarios 274</p> <p>Review Questions 275</p> <p>Answers and Explanations 280</p> <p><strong>Chapter 9</strong> Securing Network Media and Devices 285</p> <p>Foundation Topics 285</p> <p>Securing Wired Networks and Devices 285</p> <p>Network Device Vulnerabilities 285</p> <p>Default Accounts 286</p> <p>Weak Passwords 286</p> <p>Privilege Escalation 287</p> <p>Back Doors 288</p> <p>Network Attacks 289</p> <p>Other Network Device Considerations 289</p> <p>Cable Media Vulnerabilities 289</p> <p>Interference 290</p> <p>Crosstalk 291</p> <p>Data Emanation 292</p> <p>Tapping into Data and Conversations 293</p> <p>Securing Wireless Networks 295</p> <p>Wireless Access Point Vulnerabilities 295</p> <p>The Administration Interface 295</p> <p>SSID Broadcast 296</p> <p>Rogue Access Points 296</p> <p>Evil Twin 297</p> <p>Weak Encryption 297</p> <p>Wi-Fi Protected Setup 299</p> <p>Ad Hoc Networks 299</p> <p>VPN over Open Wireless 300</p> <p>Wireless Access Point Security Strategies 300</p> <p>Wireless Transmission Vulnerabilities 304</p> <p>Bluetooth and Other Wireless Technology Vulnerabilities 305</p> <p>Bluejacking 306</p> <p>Bluesnarfing 306</p> <p>RFID and NFC 307</p> <p>More Wireless Technologies 308</p> <p>Chapter Summary 310</p> <p>Chapter Review Activities 312</p> <p>Review Key Topics 312</p> <p>Define Key Terms 312</p> <p>Complete the Real-World Scenarios 312</p> <p>Review Questions 313</p> <p>Answers and Explanations 317</p> <p><strong>Chapter 10</strong> Physical Security and Authentication Models 321</p> <p>Foundation Topics 322</p> <p>Physical Security 322</p> <p>General Building and Server Room Security 323</p> <p>Door Access 324</p> <p>Biometric Readers 326</p> <p>Authentication Models and Components 327</p> <p>Authentication Models 327</p> <p>Localized Authentication Technologies 329</p> <p>802.1X and EAP 330</p> <p>LDAP 333</p> <p>Kerberos and Mutual Authentication 334</p> <p>Remote Desktop Services 336</p> <p>Remote Authentication Technologies 337</p> <p>Remote Access Service 337</p> <p>Virtual Private Networks 340</p> <p>RADIUS Versus TACACS 343</p> <p>Chapter Summary 345</p> <p>Chapter Review Activities 346</p> <p>Review Key Topics 346</p> <p>Define Key Terms 347</p> <p>Complete the Real-World Scenarios 347</p> <p>Review Questions 347</p> <p>Answers and Explanations 355</p> <p><strong>Chapter 11</strong> Access Control Methods and Models 361</p> <p>Foundation Topic 361</p> <p>Access Control Models Defined 361</p> <p>Discretionary Access Control 361</p> <p>Mandatory Access Control 363</p> <p>Role-Based Access Control (RBAC) 364</p> <p>Attribute-based Access Control (ABAC) 365</p> <p>Access Control Wise Practices 366</p> <p>Rights, Permissions, and Policies 369</p> <p>Users, Groups, and Permissions 369</p> <p>Permission Inheritance and Propagation 374</p> <p>Moving and Copying Folders and Files 376</p> <p>Usernames and Passwords 376</p> <p>Policies 379</p> <p>User Account Control (UAC) 383</p> <p>Chapter Summary 384</p> <p>Chapter Review Activities 385</p> <p>Review Key Topics 385</p> <p>Define Key Terms 386</p> <p>Complete the Real-World Scenarios 386</p> <p>Review Questions 386</p> <p>Answers and Explanations 392</p> <p><strong>Chapter 12</strong> Vulnerability and Risk Assessment 397</p> <p>Foundation Topics 397</p> <p>Conducting Risk Assessments 397</p> <p>Qualitative Risk Assessment 399</p> <p>Quantitative Risk Assessment 400</p> <p>Security Analysis Methodologies 402</p> <p>Security Controls 404</p> <p>Vulnerability Management 405</p> <p>Penetration Testing 407</p> <p>OVAL 408</p> <p>Additional Vulnerabilities 409</p> <p>Assessing Vulnerability with Security Tools 410</p> <p>Network Mapping 411</p> <p>Vulnerability Scanning 412</p> <p>Network Sniffing 415</p> <p>Password Analysis 417</p> <p>Chapter Summary 420</p> <p>Chapter Review Activities 421</p> <p>Review Key Topics 421</p> <p>Define Key Terms 422</p> <p>Complete the Real-World Scenarios 422</p> <p>Review Questions 422</p> <p>Answers and Explanations 428</p> <p><strong>Chapter 13</strong> Monitoring and Auditing 435</p> <p>Foundation Topics 435</p> <p>Monitoring Methodologies 435</p> <p>Signature-Based Monitoring 435</p> <p>Anomaly-Based Monitoring 436</p> <p>Behavior-Based Monitoring 436</p> <p>Using Tools to Monitor Systems and Networks 437</p> <p>Performance Baselining 438</p> <p>Protocol Analyzers 440</p> <p>Wireshark 441</p> <p>SNMP 443</p> <p>Analytical Tools 445</p> <p>Use Static and Dynamic Tools 447</p> <p>Conducting Audits 448</p> <p>Auditing Files 448</p> <p>Logging 451</p> <p>Log File Maintenance and Security 455</p> <p>Auditing System Security Settings 457</p> <p>SIEM 460</p> <p>Chapter Summary 461</p> <p>Chapter Review Activities 462</p> <p>Review Key Topics 462</p> <p>Define Key Terms 463</p> <p>Complete the Real-World Scenarios 463</p> <p>Review Questions 463</p> <p>Answers and Explanations 470</p> <p><strong>Chapter 14</strong> Encryption and Hashing Concepts 477</p> <p>Foundation Topics 477</p> <p>Cryptography Concepts 477</p> <p>Symmetric Versus Asymmetric Key Algorithms 481</p> <p>Symmetric Key Algorithms 481</p> <p>Asymmetric Key Algorithms 483</p> <p>Public Key Cryptography 483</p> <p>Key Management 484</p> <p>Steganography 485</p> <p>Encryption Algorithms 486</p> <p>DES and 3DES 486</p> <p>AES 487</p> <p>RC 488</p> <p>Blowfish and Twofish 489</p> <p>Summary of Symmetric Algorithms 489</p> <p>RSA 490</p> <p>Diffie-Hellman 491</p> <p>Elliptic Curve 492</p> <p>More Encryption Types 493</p> <p>One-Time Pad 493</p> <p>PGP 494</p> <p>Pseudorandom Number Generators 495</p> <p>Hashing Basics 496</p> <p>Cryptographic Hash Functions 498</p> <p>MD5 498</p> <p>SHA 498</p> <p>RIPEMD and HMAC 499</p> <p>LANMAN, NTLM, and NTLMv2 500</p> <p>LANMAN 500</p> <p>NTLM and NTLMv2 501</p> <p>Hashing Attacks 502</p> <p>Pass the Hash 502</p> <p>Happy Birthday! 503</p> <p>Additional Password Hashing Concepts 503</p> <p>Chapter Summary 505</p> <p>Chapter Review Activities 507</p> <p>Review Key Topics 507</p> <p>Define Key Terms 507</p> <p>Complete the Real-World Scenarios 508</p> <p>Review Questions 508</p> <p>Answers and Explanations 515</p> <p><strong>Chapter 15</strong> PKI and Encryption Protocols 521</p> <p>Foundation Topics 521</p> <p>Public Key Infrastructure 521</p> <p>Certificates 522</p> <p>SSL Certificate Types 522</p> <p>Single-Sided and Dual-Sided Certificates 523</p> <p>Certificate Chain of Trust 523</p> <p>Certificate Formats 523</p> <p>Certificate Authorities 525</p> <p>Web of Trust 529</p> <p>Security Protocols 529</p> <p>S/MIME 530</p> <p>SSL/TLS 531</p> <p>SSH 532</p> <p>PPTP, L2TP, and IPsec 533</p> <p>PPTP 533</p> <p>L2TP 534</p> <p>IPsec 534</p> <p>Chapter Summary 535</p> <p>Chapter Review Activities 536</p> <p>Review Key Topics 536</p> <p>Define Key Terms 536</p> <p>Complete the Real-World Scenarios 537</p> <p>Review Questions 537</p> <p>Answers and Explanations 542</p> <p><strong>Chapter 16</strong> Redundancy and Disaster Recovery 547</p> <p>Foundation Topics 547</p> <p>Redundancy Planning 547</p> <p>Redundant Power 549</p> <p>Redundant Power Supplies 551</p> <p>Uninterruptible Power Supplies 551</p> <p>Backup Generators 553</p> <p>Redundant Data 555</p> <p>Redundant Networking 558</p> <p>Redundant Servers 560</p> <p>Redundant Sites 561</p> <p>Redundant People 562</p> <p>Disaster Recovery Planning and Procedures 562</p> <p>Data Backup 562</p> <p>DR Planning 567</p> <p>Chapter Summary 571</p> <p>Chapter Review Activities 572</p> <p>Review Key Topics 572</p> <p>Define Key Terms 572</p> <p>Complete the Real-World Scenarios 573</p> <p>Review Questions 573</p> <p>Answers and Explanations 577</p> <p><strong>Chapter 17</strong> Social Engineering, User Education, and Facilities Security 583</p> <p>Foundation Topics 583</p> <p>Social Engineering 583</p> <p>Pretexting 584</p> <p>Malicious Insider 585</p> <p>Diversion Theft 586</p> <p>Phishing 586</p> <p>Hoaxes 587</p>

Managementboek Top 100

Rubrieken

    Personen

      Trefwoorden

        CompTIA Security+ SY0-501 Cert Guide