Home Page Icon
Home Page
Table of Contents for
Part III: Implementation
Close
Part III: Implementation
by
CompTIA Security+ SY0-601 Cert Guide, 5th Edition
Cover Page
About This eBook
Title Page
Copyright Page
Contents at a Glance
Table of Contents
About the Authors
Dedication
Acknowledgments
About the Technical Reviewer
We Want to Hear from You!
Reader Services
Introduction
Goals and Methods
Who Should Read This Book?
CompTIA Security+ Exam Topics
Companion Website
Pearson Test Prep Practice Test Software
Premium Edition eBook and Practice Tests
Figure Credits
Part I: Threats, Attacks, and Vulnerabilities
Chapter 1. Comparing and Contrasting Different Types of Social Engineering Techniques
“Do I Know This Already?” Quiz
Foundation Topics
Social Engineering Fundamentals
User Security Awareness Education
Chapter Review Activities
Review Key Topics
Define Key Terms
Review Questions
Chapter 2. Analyzing Potential Indicators to Determine the Type of Attack
“Do I Know This Already?” Quiz
Foundation Topics
Malicious Software (Malware)
Password Attacks
Physical Attacks
Adversarial Artificial Intelligence
Supply-Chain Attacks
Cloud-based vs. On-premises Attacks
Cryptographic Attacks
Chapter Review Activities
Review Key Topics
Define Key Terms
Review Questions
Chapter 3. Analyzing Potential Indicators Associated with Application Attacks
“Do I Know This Already?” Quiz
Foundation Topics
Privilege Escalation
Cross-Site Scripting (XSS) Attacks
Injection Attacks
Pointer/Object Dereference
Directory Traversal
Buffer Overflows
Race Conditions
Error Handling
Improper Input Handling
Replay Attacks
Request Forgeries
Application Programming Interface (API) Attacks
Resource Exhaustion
Memory Leaks
Secure Socket Layer (SSL) Stripping
Driver Manipulation
Pass the Hash
Chapter Review Activities
Review Key Topics
Define Key Terms
Review Questions
Chapter 4. Analyzing Potential Indicators Associated with Network Attacks
“Do I Know This Already?” Quiz
Foundation Topics
Wireless Attacks
On-Path Attacks
Layer 2 Attacks
Domain Name System (DNS) Attacks
Distributed Denial-of-Service (DDoS) Attacks
Malicious Code or Script Execution Attacks
Chapter Review Activities
Review Key Topics
Define Key Terms
Review Questions
Chapter 5. Understanding Different Threat Actors, Vectors, and Intelligence Sources
“Do I Know This Already?” Quiz
Foundation Topics
Actors and Threats
Attributes of Threat Actors
Attack Vectors
Threat Intelligence and Threat Intelligence Sources
Research Sources
Chapter Review Activities
Review Key Topics
Define Key Terms
Review Questions
Chapter 6. Understanding the Security Concerns Associated with Various Types of Vulnerabilities
“Do I Know This Already?” Quiz
Foundation Topics
Cloud-based vs. On-premises Vulnerabilities
Zero-day Vulnerabilities
Weak Configurations
Third-party Risks
Improper or Weak Patch Management
Legacy Platforms
The Impact of Cybersecurity Attacks and Breaches
Chapter Review Activities
Review Key Topics
Define Key Terms
Review Questions
Chapter 7. Summarizing the Techniques Used in Security Assessments
“Do I Know This Already?” Quiz
Foundation Topics
Threat Hunting
Vulnerability Scans
Logs and Security Information and Event Management (SIEM)
Security Orchestration, Automation, and Response (SOAR)
Chapter Review Activities
Review Key Topics
Define Key Terms
Review Questions
Chapter 8. Understanding the Techniques Used in Penetration Testing
“Do I Know This Already?” Quiz
Foundation Topics
Penetration Testing
Passive and Active Reconnaissance
Exercise Types
Chapter Review Activities
Review Key Topics
Define Key Terms
Review Questions
Part II: Architecture and Design
Chapter 9. Understanding the Importance of Security Concepts in an Enterprise Environment
“Do I Know This Already?” Quiz
Foundation Topics
Configuration Management
Data Sovereignty and Data Protection
Site Resiliency
Deception and Disruption
Chapter Review Activities
Review Key Topics
Define Key Terms
Review Questions
Chapter 10. Summarizing Virtualization and Cloud Computing Concepts
“Do I Know This Already?” Quiz
Foundation Topics
Cloud Models
Cloud Service Providers
Cloud Architecture Components
Virtual Machine (VM) Sprawl Avoidance and VM Escape Protection
Chapter Review Activities
Review Key Topics
Define Key Terms
Review Questions
Chapter 11. Summarizing Secure Application Development, Deployment, and Automation Concepts
“Do I Know This Already?” Quiz
Foundation Topics
Software Development Environments and Methodologies
Application Provisioning and Deprovisioning
Software Integrity Measurement
Secure Coding Techniques
Open Web Application Security Project (OWASP)
Software Diversity
Automation/Scripting
Elasticity and Scalability
Chapter Review Activities
Review Key Topics
Define Key Terms
Review Questions
Chapter 12. Summarizing Authentication and Authorization Design Concepts
“Do I Know This Already?” Quiz
Foundation Topics
Authentication Methods
Biometrics
Multifactor Authentication (MFA) Factors and Attributes
Authentication, Authorization, and Accounting (AAA)
Cloud vs. On-premises Requirements
Chapter Review Activities
Review Key Topics
Define Key Terms
Review Questions
Chapter 13. Implementing Cybersecurity Resilience
“Do I Know This Already?” Quiz
Foundation Topics
Redundancy
Replication
On-premises vs. Cloud
Backup Types
Non-persistence
High Availability
Restoration Order
Diversity
Chapter Review Activities
Review Key Topics
Define Key Terms
Review Questions
Chapter 14. Understanding the Security Implications of Embedded and Specialized Systems
“Do I Know This Already?” Quiz
Foundation Topics
Embedded Systems
Supervisory Control and Data Acquisition (SCADA)/Industrial Control Systems (ICS)
Internet of Things (IoT)
Specialized Systems
Voice over IP (VoIP)
Heating, Ventilation, and Air Conditioning (HVAC)
Drones
Multifunction Printers (MFP)
Real-Time Operating Systems (RTOS)
Surveillance Systems
System on a Chip (SoC)
Communication Considerations
Embedded System Constraints
Chapter Review Activities
Review Key Topics
Define Key Terms
Review Questions
Chapter 15. Understanding the Importance of Physical Security Controls
“Do I Know This Already?” Quiz
Foundation Topics
Bollards/Barricades
Access Control Vestibules
Badges
Alarms
Signage
Cameras
Closed-Circuit Television (CCTV)
Industrial Camouflage
Personnel
Locks
USB Data Blockers
Lighting
Fencing
Fire Suppression
Sensors
Drones
Visitor Logs
Faraday Cages
Air Gap
Screened Subnet (Previously Known as Demilitarized Zone [DMZ])
Protected Cable Distribution
Secure Areas
Secure Data Destruction
Chapter Review Activities
Review Key Topics
Define Key Terms
Review Questions
Chapter 16. Summarizing the Basics of Cryptographic Concepts
“Do I Know This Already?” Quiz
Foundation Topics
Digital Signatures
Key Length
Key Stretching
Salting
Hashing
Key Exchange
Elliptic-Curve Cryptography
Perfect Forward Secrecy
Quantum
Post-Quantum
Ephemeral
Modes of Operation
Blockchain
Cipher Suites
Symmetric vs. Asymmetric Encryption
Lightweight Cryptography
Steganography
Homomorphic Encryption
Common Use Cases
Limitations
Chapter Review Activities
Review Key Topics
Define Key Terms
Review Questions
Part III: Implementation
Chapter 17. Implementing Secure Protocols
“Do I Know This Already?” Quiz
Foundation Topics
Use Cases
Chapter Review Activities
Review Key Topics
Define Key Terms
Review Questions
Chapter 18. Implementing Host or Application Security Solutions
“Do I Know This Already?” Quiz
Foundation Topics
Endpoint Protection
Antimalware
Next-Generation Firewall
Host-based Intrusion Prevention System
Host-based Intrusion Detection System
Host-based Firewall
Boot Integrity
Database
Application Security
Hardening
Self-Encrypting Drive/Full-Disk Encryption
Hardware Root of Trust
Trusted Platform Module
Sandboxing
Chapter Review Activities
Review Key Topics
Define Key Terms
Review Questions
Chapter 19. Implementing Secure Network Designs
“Do I Know This Already?” Quiz
Foundation Topics
Load Balancing
Network Segmentation
Virtual Private Network
DNS
Network Access Control
Out-of-Band Management
Port Security
Network Appliances
Access Control List
Route Security
Quality of Service
Implications of IPv6
Port Spanning/Port Mirroring
Monitoring Services
File Integrity Monitors
Chapter Review Activities
Review Key Topics
Define Key Terms
Review Questions
Chapter 20. Installing and Configuring Wireless Security Settings
“Do I Know This Already?” Quiz
Foundation Topics
Cryptographic Protocols
Authentication Protocols
Methods
Installation Considerations
Chapter Review Activities
Review Key Topics
Define Key Terms
Review Questions
Chapter 21. Implementing Secure Mobile Solutions
“Do I Know This Already?” Quiz
Foundation Topics
Connection Methods and Receivers
Mobile Device Management
Mobile Device Management Enforcement and Monitoring
Mobile Devices
Deployment Models
Chapter Review Activities
Review Key Topics
Define Key Terms
Review Questions
Chapter 22. Applying Cybersecurity Solutions to the Cloud
“Do I Know This Already?” Quiz
Foundation Topics
Cloud Security Controls
Solutions
Cloud Native Controls vs. Third-Party Solutions
Chapter Review Activities
Review Key Topics
Define Key Terms
Review Questions
Chapter 23. Implementing Identity and Account Management Controls
“Do I Know This Already?” Quiz
Foundation Topics
Identity
Account Types
Account Policies
Chapter Review Activities
Review Key Topics
Define Key Terms
Review Questions
Chapter 24. Implementing Authentication and Authorization Solutions
“Do I Know This Already?” Quiz
Foundation Topics
Authentication Management
Authentication/Authorization
Access Control Schemes
Chapter Review Activities
Review Key Topics
Define Key Terms
Review Questions
Chapter 25. Implementing Public Key Infrastructure
“Do I Know This Already?” Quiz
Foundation Topics
Public Key Infrastructure
Types of Certificates
Certificate Formats
PKI Concepts
Chapter Review Activities
Review Key Topics
Define Key Terms
Review Questions
Part IV: Operations and Incident Response
Chapter 26. Using the Appropriate Tool to Assess Organizational Security
“Do I Know This Already?” Quiz
Foundation Topics
Network Reconnaissance and Discovery
File Manipulation
Shell and Script Environments
Packet Capture and Replay
Forensics
Exploitation Frameworks
Password Crackers
Data Sanitization
Chapter Review Activities
Review Key Topics
Define Key Terms
Review Questions
Chapter 27. Summarizing the Importance of Policies, Processes, and Procedures for Incident Response
“Do I Know This Already?” Quiz
Foundation Topics
Incident Response Plans
Incident Response Process
Exercises
Attack Frameworks
Stakeholder Management
Communication Plan
Disaster Recovery Plan
Business Continuity Plan
Continuity of Operations Planning (COOP)
Incident Response Team
Retention Policies
Chapter Review Activities
Review Key Topics
Define Key Terms
Review Questions
Chapter 28. Using Appropriate Data Sources to Support an Investigation
“Do I Know This Already?” Quiz
Foundation Topics
Vulnerability Scan Output
SIEM Dashboards
Log Files
syslog/rsyslog/syslog-ng
journalctl
NXLog
Bandwidth Monitors
Metadata
NetFlow/sFlow
Protocol Analyzer Output
Chapter Review Activities
Review Key Topics
Define Key Terms
Review Questions
Chapter 29. Applying Mitigation Techniques or Controls to Secure an Environment
“Do I Know This Already?” Quiz
Foundation Topics
Reconfigure Endpoint Security Solutions
Configuration Changes
Isolation
Containment
Segmentation
SOAR
Chapter Review Activities
Review Key Topics
Define Key Terms
Review Questions
Chapter 30. Understanding the Key Aspects of Digital Forensics
“Do I Know This Already?” Quiz
Foundation Topics
Documentation/Evidence
Acquisition
On-premises vs. Cloud
Integrity
Preservation
E-discovery
Data Recovery
Nonrepudiation
Strategic Intelligence/Counterintelligence
Chapter Review Activities
Review Key Topics
Define Key Terms
Review Questions
Part V: Governance, Risk, and Compliance
Chapter 31. Comparing and contrasting the Various Types of Controls
“Do I Know This Already?” Quiz
Foundation Topics
Control Category
Control Types
Chapter Review Activities
Review Key Topics
Define Key Terms
Review Questions
Chapter 32. Understanding the Importance of Applicable Regulations, Standards, or Frameworks That Impact Organizational Security Posture
“Do I Know This Already?” Quiz
Foundation Topics
Regulations, Standards, and Legislation
Key Frameworks
Benchmarks and Secure Configuration Guides
Chapter Review Activities
Review Key Topics
Define Key Terms
Review Questions
Chapter 33. Understanding the Importance of Policies to Organizational Security
“Do I Know This Already?” Quiz
Foundation Topics
Personnel Policies
Diversity of Training Techniques
Third-Party Risk Management
Data Concepts
Credential Policies
Organizational Policies
Chapter Review Activities
Review Key Topics
Define Key Terms
Review Questions
Chapter 34. Summarizing Risk Management Processes and Concepts
“Do I Know This Already?” Quiz
Foundation Topics
Risk Types
Risk Management Strategies
Risk Analysis
Disaster Analysis
Business Impact Analysis
Chapter Review Activities
Review Key Topics
Define Key Terms
Review Questions
Chapter 35. Understanding Privacy and Sensitive Data Concepts in Relation to Security
“Do I Know This Already?” Quiz
Foundation Topics
Organizational Consequences of Privacy and Data Breaches
Notifications of Breaches
Data Types and Asset Classification
PII
PHI
Privacy Enhancing Technologies
Roles and Responsibilities
Information Lifecycle
Impact Assessment
Terms of Agreement
Privacy Notice
Chapter Review Activities
Review Key Topics
Define Key Terms
Review Questions
Part VI: Final Preparation
Chapter 36. Final Preparation
Hands-on Activities
Suggested Plan for Final Review and Study
Summary
Glossary of Key Terms
Appendix A. Answers to the “Do I Know This Already?” Quizzes and Review Questions
Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8
Chapter 9
Chapter 10
Chapter 11
Chapter 12
Chapter 13
Chapter 14
Chapter 15
Chapter 16
Chapter 17
Chapter 18
Chapter 19
Chapter 20
Chapter 21
Chapter 22
Chapter 23
Chapter 24
Chapter 25
Chapter 26
Chapter 27
Chapter 28
Chapter 29
Chapter 30
Chapter 31
Chapter 32
Chapter 33
Chapter 34
Chapter 35
Appendix B. CompTIA Security+ (SY0-601) Cert Guide Exam Updates
Always Get the Latest at the Book’s Product Page
Technical Content
Index
Appendix C. Study Planner
Where are the companion content files? - Register
Inside Front Cover
Inside Back Cover
Code Snippets
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Chapter 16. Summarizing the Basics of Cryptographic Concepts
Next
Next Chapter
Chapter 17. Implementing Secure Protocols
Part III: Implementation
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset