0%

Book Description

CompTIA Security+ Deluxe Study Guide gives you complete coverage of the Security+ exam objectives with clear and concise information on crucial security topics. Learn from practical examples and insights drawn from real-world experience and review your newly acquired knowledge with cutting-edge exam preparation software, including a test engine and electronic flashcards. Find authoritative coverage of key topics like general security concepts, communication security, infrastructure security, the basics of cryptography and operational and organizational security. The Deluxe edition contains a bonus exam, special Security Administrators’ Troubleshooting Guide appendix, and 100 pages of additional hands-on exercises.

Book Description

CompTIA Security+ Deluxe Study Guide gives you complete coverage of the Security+ exam objectives with clear and concise information on crucial security topics. Learn from practical examples and insights drawn from real-world experience and review your newly acquired knowledge with cutting-edge exam preparation software, including a test engine and electronic flashcards. Find authoritative coverage of key topics like general security concepts, communication security, infrastructure security, the basics of cryptography and operational and organizational security. The Deluxe edition contains a bonus exam, special Security Administrators’ Troubleshooting Guide appendix, and 100 pages of additional hands-on exercises.

Table of Contents

  1. Copyright
  2. Dear Reader
  3. Dedication
  4. Acknowledgments
  5. About the Author
  6. Introduction
  7. General Security Concepts
    1. Understanding Information Security
    2. Understanding the Goals of Information Security
    3. Comprehending the Security Process
    4. Authentication Issues to Consider
    5. Distinguishing between Security Topologies
    6. Summary
    7. Exam Essentials
    8. Hands-On Labs
    9. Review Questions
    10. Answers to Review Questions
  8. Identifying Potential Risks
    1. Calculating Attack Strategies
    2. Recognizing Common Attacks
    3. Identifying TCP/IP Security Concerns
    4. Understanding Software Exploitation
    5. Understanding OVAL
    6. Surviving Malicious Code
    7. Understanding Social Engineering
    8. Introducing Auditing Processes and Files
    9. Summary
    10. Exam Essentials
    11. Hands-On Labs
    12. Review Questions
    13. Answers to Review Questions
  9. Infrastructure and Connectivity
    1. Understanding Infrastructure Security
    2. Understanding the Different Network Infrastructure Devices
    3. Monitoring and Diagnosing Networks
    4. Securing Workstations and Servers
    5. Understanding Mobile Devices
    6. Understanding Remote Access
    7. Securing Internet Connections
    8. Understanding Network Protocols
    9. The Basics of Cabling, Wires, and Communications
    10. Employing Removable Storage
    11. Summary
    12. Exam Essentials
    13. Hands-On Labs
    14. Review Questions
    15. Answers to Review Questions
  10. Monitoring Activity and Intrusion Detection
    1. Monitoring the Network
    2. Understanding Intrusion Detection Systems
    3. Working with Wireless Systems
    4. Understanding Instant Messaging's Features
    5. Working with 8.3 File Naming
    6. Understanding Protocol Analyzers
    7. Understanding Signal Analysis and Intelligence
    8. Summary
    9. Exam Essentials
    10. Hands-On Labs
    11. Review Questions
    12. Answers to Review Questions
  11. Implementing and Maintaining a Secure Network
    1. Overview of Network Security Threats
    2. Defining Security Baselines
    3. Hardening the OS and NOS
    4. Hardening Network Devices
    5. Hardening Applications
    6. Summary
    7. Exam Essentials
    8. Hands-On Labs
    9. Review Questions
    10. Answers to Review Questions
  12. Securing the Network and Environment
    1. Understanding Physical and Network Security
    2. Understanding Business Continuity Planning
    3. Developing Policies, Standards, and Guidelines
    4. Working with Security Standards and ISO 17799
    5. Classifying Information
    6. Summary
    7. Exam Essentials
    8. Hands-On Lab
    9. Review Questions
    10. Answers to Review Questions
  13. Cryptography Basics, Methods, and Standards
    1. An Overview of Cryptography
    2. Understanding Cryptographic Algorithms
    3. Using Cryptographic Systems
    4. Using Public Key Infrastructure
    5. Preparing for Cryptographic Attacks
    6. Understanding Cryptography Standards and Protocols
    7. Understanding Key Management and the Key Life Cycle
    8. Summary
    9. Exam Essentials
    10. Hands-On Labs
    11. Review Questions
    12. Answers to Review Questions
  14. Security Policies and Procedures
    1. Understanding Business Continuity
    2. Reinforcing Vendor Support
    3. Generating Policies and Procedures
    4. Enforcing Privilege Management
    5. Summary
    6. Exam Essentials
    7. Hands-On Labs
    8. Review Questions
    9. Answers to Review Questions
  15. Security Administration
    1. Understanding Security Management
    2. Simplifying Security Administration
    3. Understanding Security Awareness and Education
    4. Staying on Top of Security
    5. Regulating Privacy and Security
    6. Summary
    7. Exam Essentials
    8. Hands-On Labs
    9. Review Questions
    10. Answers to Review Questions
  16. Security Administrator's Troubleshooting Guide
    1. Getting Started
    2. Access Control Issues
    3. Accountability Concerns
    4. Auditing
    5. Authentication Schemes
    6. Backup Management
    7. Baselining Security
    8. Certificate Management
    9. Communications Security
    10. Directory Services Protection
    11. Disaster Planning
    12. Documenting Your Environment
    13. E-Mail Issues
    14. File-Sharing Basics
    15. Working with IDSs and Honey Pots
    16. Incident Handling
    17. Internet Common Sense
    18. Key Management Conventions
    19. Preventing Common Malicious Events
    20. Managing Personnel
    21. Keeping Physical Security Meaningful
    22. Securing the Infrastructure
    23. Working with Security Zones
    24. Social Engineering Risks
    25. System Hardening Basics
    26. Securing the Wireless Environment
  17. Workbook Exercises
    1. Lab B.1: Change to WPA Security in Windows XP
    2. Lab B.2: Turn on the Firewall in Windows XP: Method One
    3. Lab B.3: Turn on the Firewall in Windows XP: Method Two
    4. Lab B.4: Create a Baseline for Internet Access
    5. Lab B.5: Turn on a Screensaver Password for Windows XP
    6. Lab B.6: Look for Security Events within Windows XP
    7. Lab B.7: Identify User Accounts with Administrator Access in Windows XP
    8. Lab B.8: Turn on a Screensaver Password for openSUSE
    9. Lab B.9: Change a Password in Linux
    10. Lab B.10: Find SUID and SGID Files in Linux
    11. Lab B.11: Change ACLs on All Files in a Linux Directory
    12. Lab B.12: Change Permissions on All Files in a Linux Directory
    13. Lab B.13: Change the Default Permissions for all Newly Created Files in Linux
    14. Lab B.14: View all Linux Logins
    15. Lab B.15: Change the Group Associated with Files
    16. Lab B.16: View Failed Login Attempts
    17. Lab B.17: Hide a Linux File
    18. Lab B.18: Hide and Access a Windows Share
    19. Lab B.19: Encrypt a Windows File
    20. Lab B.20: Count the Number of Running Linux Processes
    21. Lab B.21: Display the Security Tab in Windows XP
    22. Lab B.22: View Effective Permissions in Windows XP
    23. Lab B.23: Turn the Guest Account Off
    24. Lab B.24: View Internet Explorer Security Settings
    25. Lab B.25: Change Internet Explorer Pop-up Blocker Settings
    26. Lab B.26: Prevent a Folder from Being Shared
    27. Lab B.27: Enable openSUSE Firewall
    28. Lab B.28: Configure openSUSE Local Security
    29. Lab B.29: Set the Defaults for New Users
    30. Lab B.30: View Logged Warnings in openSUSE
    31. Lab B.31: Configure AppArmor
    32. Lab B.32: View AppArmor Reports
    33. Lab B.33: Configure openSUSE as a Kerberos Client
    34. Lab B.34: Configure openSUSE as an LDAP Client
    35. Lab B.35: Turn Off IPv6 in openSUSE
    36. Lab B.36: Turn On Folder Encryption with cipher
    37. Lab B.37: Change the Minimum Password Age
    38. Lab B.38: Compare Your System to a Security Template
    39. Lab B.39: Clear Private Data in Internet Explorer
    40. Lab B.40: Clear Private Data in Firefox
    41. Lab B.41: Configure SELinux in Fedora
    42. Lab B.42: Limit Cookies to First Party
    43. Lab B.43: Configure the Phishing Filter
    44. Lab B.44: Add a Legal Notice
    45. Lab B.45: Configure Windows XP Startup
    46. Lab B.46: Run a Remote Desktop
    47. Lab B.47: Secure the Account Database
    48. Lab B.48: Create a Restore Point
    49. Lab B.49: Return to a Restore Point
    50. Lab B.50: Boot to a Good Configuration
  18. Security+ Acronym List
  19. About the Companion CD
    1. What You'll Find on the CD
    2. System Requirements
    3. Using the CD
    4. Troubleshooting
  20. Glossary
    1. A
    2. B
    3. C
    4. D
    5. E
    6. F
    7. G
    8. H
    9. I
    10. J
    11. K
    12. L
    13. M
    14. N
    15. O
    16. P
    17. Q
    18. R
    19. S
    20. T
    21. U
    22. V
    23. W
    24. X
    25. Z
3.145.156.46