Home Page Icon
Home Page
Table of Contents for
Cover
Close
Cover
by Michael Gregg, David R. Miller
Security Administrator Street Smarts: A Real World Guide to CompTIA Security+™ Skills, Third Edition
Cover
Contents
Title
Copyright
Dedication
Acknowledgments
About the Authors
Introduction
Phase 1: The Grunt Work of Security
Task 1.1: Performing an Initial Risk Assessment
Task 1.2: Determining Which Security Policy Is Most Important
Task 1.3: Establishing a User-Awareness Program
Task 1.4: Reviewing a Physical-Security Checklist
Task 1.5: Understanding the Value of Documents
Phase 2: Hardening Systems
Task 2.1: Managing Services
Task 2.2: Managing Ports
Task 2.3: Patching the Operating System
Task 2.4: Security Templates
Task 2.5: Securing Autoruns
Task 2.6: Securing Hardware Devices
Task 2.7: Virtualization
Task 2.8: Locking the Computer Using an Idle Time-out
Phase 3: Malicious Software
Task 3.1: Installing, Updating, and Running Antivirus Software
Task 3.2: Using a Rootkit Checker
Task 3.3: Adware
Task 3.4: Using a Spyware Checker
Task 3.5: Malicious Software Removal Tool
Task 3.6: McAfee Site Advisor
Task 3.7: ARP Poisoning with Cain & Abel
Task 3.8: Attacking Authentication with Firesheep
Phase 4: Secure Storage
Task 4.1: The Encrypting File System
Task 4.2: EFS Data Recovery
Task 4.3: Implementing Syskey
Task 4.4: Converting FAT to NTFS
Task 4.5: Implementing Disk Fault Tolerance with RAID
Task 4.6: Backing Up Data
Task 4.7: Restoring Data from a Backup
Task 4.8: Securing Shares
Task 4.9: BitLocker Drive Encryption
Task 4.10: Securing Data to Satisfy FIPS 140-2 Using PGP Desktop
Phase 5: Managing User Accounts
Task 5.1: Creating User Accounts
Task 5.2: Implementing the Password Policy
Task 5.3: Auditing Logons
Task 5.4: Securing the Default User Accounts
Task 5.5: Implementing a Deny Group
Phase 6: Network Security
Task 6.2: Configuring the VPN Server
Task 6.3: Configuring the VPN Client
Task 6.4: Implementing Secure Remote Administration
Task 6.5: Secure Administration Using Run As
Task 6.6: Configuring a Packet Filter
Task 6.7: Implementing 802.11 Wireless Security
Task 6.8: Implementing an IPSec VPN Using AES
Task 6.9: Implementing a Personal Firewall
Phase 7: Securing Internet Activity
Task 7.1: Configuring Internet Access
Task 7.2: Using Internet Explorer Security Zones
Task 7.3: Configuring IE for Secure Use of Cookies
Task 7.4: Using Internet Connection Sharing
Task 7.5: Securing Email
Task 7.6: Spam Management
Task 7.7: Installing and Using a Digital Certificate
Task 7.8: Certificate Backup and Management
Task 7.9: Performing Secure File Exchange
Task 7.10: Validating Downloads and Checking the Hash
Task 7.11: Logging and Recording Internet Activity
Task 7.12: Using HTTPS to Encrypt Web Traffic
Task 7.13: Using Force-TLS to Add Security to Web Browsing
Phase 8: Security Testing
Task 8.2: Penetration Testing with Retina
Task 8.4: Performing Security Assessments with IT Shavlik
Task 8.5: Performing Internet Vulnerability Profiling
Task 8.6: Tracking Hostile IPs
Task 8.7: Investigating Netcat
Task 8.8: Exploiting Vulnerabilities with Metasploit
Phase 9: Investigating Incidents
Task 9.1: Configuring an Audit Policy for Object Access
Task 9.3: Forcing a Memory Dump
Task 9.4: Capturing Packets with the Packet Analyzer: Wireshark
Task 9.5: Recovering Previous Versions of Files
Task 9.6: Recovering Deleted Content from the File System
Phase 10: Security Troubleshooting
Task 10.1: Booting into Safe Mode
Task 10.2: Implementing Last Known Good Configuration
Task 10.3: Using System Restore
Task 10.4: Sanitizing Media
Task 10.5: Implementing a Host-Based Intrusion Detection System
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Contents
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset