Muutke küpsiste eelistusi

CompTIA Securityplus Certification Kit: Exam SY0401 4th Edition [Pehme köide]

  • Formaat: Paperback / softback, 1096 pages, kõrgus x laius x paksus: 236x193x59 mm, kaal: 1814 g
  • Ilmumisaeg: 22-Dec-2014
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 1119050952
  • ISBN-13: 9781119050957
Teised raamatud teemal:
  • Pehme köide
  • Hind: 118,00 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 1096 pages, kõrgus x laius x paksus: 236x193x59 mm, kaal: 1814 g
  • Ilmumisaeg: 22-Dec-2014
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 1119050952
  • ISBN-13: 9781119050957
Teised raamatud teemal:
The most complete, up-to-date Security+ prep kit, with 100% exam coverage

CompTIA Security+ Certification Kit, 4th Edition is the ideal study tool for the price-savvy Security+ candidate.

The most complete, up-to-date Security+ prep kit, with 100% exam coverage

CompTIA Security+ Certification Kit, 4th Edition is the ideal study tool for the price-savvy Security+ candidate. By combining the CompTIA Deluxe Security+ Study Guide, 3rd Edition and the CompTIA Security+ Review Guide, 3rd Edition into a single bundle, this kit provides everything you need to go into the exam fully prepared. This new edition has been updated to align with the latest version of the Security+ exam (SY0-401), and covers 100% of the exam objectives including communications, infrastructure, operational and organizational security, and much more. Practical examples drawn from real-world topics demonstrate how these concepts are applied on the job, and authoritative coverage and clear, concise explanations help deepen your understanding of these crucial security topics. The DVD includes instructional videos, electronic flashcards, software, and a test bank that allows you to test your knowledge and correct weak areas in advance, so you can approach the exam with confidence.

  • Study 100% of the Security+ exam objectives
  • See key topics demonstrated in over an hour of instructional videos
  • Understand real-world applications through practical examples
  • Try out Kali Linux, designed for security auditing, digital forensics, and penetration testing, andSecurity Onion for intrusion detection, network security monitoring, and log management
  • Test your knowledge with leading-edge exam prep software

With complete exam coverage and practical insight, CompTIA Security+ Certification Kit, 4th Edition gives you the confidence you need on exam day.

Foreword xxvii
Introduction xxix
Chapter 1 Measuring and Weighing Risk
1(44)
Risk Assessment
3(16)
Computing Risk Assessment
4(5)
Acting on Your Risk Assessment
9(8)
Risks Associated with Cloud Computing
17(2)
Risks Associated with Visualization
19(1)
Developing Policies, Standards, and Guidelines
19(20)
Implementing Policies
20(6)
Understanding Control Types and False Positives/Negatives
26(2)
Risk Management Best Practices
28(8)
Disaster Recovery
36(3)
Tabletop Exercise
39(1)
Summary
39(1)
Exam Essentials
39(2)
Review Questions
41(4)
Chapter 2 Monitoring and Diagnosing Networks
45(26)
Monitoring Networks
46(6)
Network Monitors
46(6)
Understanding Hardening
52(8)
Working with Services
52(4)
Patches
56(1)
User Account Control
57(1)
Filesystems
58(2)
Securing the Network
60(1)
Security Posture
61(2)
Continuous Security Monitoring
61(1)
Setting a Remediation Policy
62(1)
Reporting Security Issues
63(1)
Alarms
63(1)
Alerts
63(1)
Trends
63(1)
Differentiating between Detection Controls and Prevention Controls
64(1)
Summary
65(1)
Exam Essentials
66(1)
Review Questions
67(4)
Chapter 3 Understanding Devices and Infrastructure
71(58)
Mastering TCP/IP
73(14)
OSI Relevance
74(1)
Working with the TCP/IP Suite
74(4)
IPv4 and IPv6
78(1)
Understanding Encapsulation
79(1)
Working with Protocols and Services
80(7)
Designing a Secure Network
87(8)
Demilitarized Zones
87(2)
Subnetting
89(1)
Virtual Local Area Networks
89(3)
Remote Access
92(1)
Network Address Translation
93(1)
Telephony
94(1)
Network Access Control
95(1)
Understanding the Various Network Infrastructure Devices
95(27)
Firewalls
96(4)
Routers
100(2)
Switches
102(1)
Load Balancers
103(1)
Proxies
103(1)
Web Security Gateway
103(1)
VPNs and VPN Concentrators
103(2)
Intrusion Detection Systems
105(1)
Understanding Intrusion Detection Systems
106(4)
IDS vs. IPS
110(1)
Working with a Network-Based IDS
111(5)
Working with a Host-Based IDS
116(1)
Working with NIPSs
117(1)
Protocol Analyzers
118(1)
Spam Filters
118(1)
UTM Security Appliances
119(3)
Summary
122(1)
Exam Essentials
123(1)
Review Questions
124(5)
Chapter 4 Access Control, Authentication, and Authorization
129(38)
Understanding Access Control Basics
131(11)
Identification vs. Authentication
131(1)
Authentication (Single Factor) and Authorization
132(1)
Multifactor Authentication
133(1)
Layered Security and Defense in Depth
133(1)
Network Access Control
134(1)
Tokens
135(1)
Federations
135(1)
Potential Authentication and Access Problems
136(1)
Authentication Issues to Consider
137(2)
Authentication Protocols
139(1)
Account Policy Enforcement
139(2)
Users with Multiple Accounts/Roles
141(1)
Generic Account Prohibition
142(1)
Group-based and User-assigned Privileges
142(1)
Understanding Remote Access Connectivity
142(5)
Using the Point-to-Point Protocol
143(1)
Working with Tunneling Protocols
144(1)
Working with RADIUS
145(1)
TACACS/TACACS+/XTACACS
146(1)
VLAN Management
146(1)
SAML
147(1)
Understanding Authentication Services
147(3)
LDAP
147(1)
Kerberos
148(1)
Single Sign-On Initiatives
149(1)
Understanding Access Control
150(2)
Mandatory Access Control
151(1)
Discretionary Access Control
151(1)
Role-Based Access Control
152(1)
Rule-Based Access Control
152(1)
Implementing Access Controlling Best Practices
152(9)
Least Privileges
153(1)
Separation of Duties
153(1)
Time of Day Restrictions
153(1)
User Access Review
154(1)
Smart Cards
154(2)
Access Control Lists
156(1)
Port Security
157(1)
Working with 802.1X
158(1)
Flood Guards and Loop Protection
158(1)
Preventing Network Bridging
158(1)
Log Analysis
159(1)
Trusted OS
159(1)
Secure Router Configuration
160(1)
Summary
161(1)
Exam Essentials
161(2)
Review Questions
163(4)
Chapter 5 Protecting Wireless Networks
167(28)
Working with Wireless Systems
169(5)
IEEE 802.11x Wireless Protocols
169(2)
WEP/WAP/WPA/WPA2
171(2)
Wireless Transport Layer Security
173(1)
Understanding Wireless Devices
174(9)
Wireless Access Points
175(6)
Extensible Authentication Protocol
181(1)
Lightweight Extensible Authentication Protocol
182(1)
Protected Extensible Authentication Protocol
182(1)
Wireless Vulnerabilities to Know
183(5)
Wireless Attack Analogy
187(1)
Summary
188(1)
Exam Essentials
189(1)
Review Questions
190(5)
Chapter 6 Securing the Cloud
195(18)
Working with Cloud Computing
196(5)
Software as a Service (SaaS)
197(1)
Platform as a Service (PaaS)
198(1)
Infrastructure as a Service (IaaS)
199(1)
Private Cloud
200(1)
Public Cloud
200(1)
Community Cloud
200(1)
Hybrid Cloud
201(1)
Working with Virtualization
201(4)
Snapshots
203(1)
Patch Compatibility
203(1)
Host Availability/Elasticity
204(1)
Security Control Testing
204(1)
Sandboxing
204(1)
Security and the Cloud
205(2)
Cloud Storage
206(1)
Summary
207(1)
Exam Essentials
207(1)
Review Questions
208(5)
Chapter 7 Host, Data, and Application Security
213(30)
Application Hardening
215(5)
Databases and Technologies
215(3)
Fuzzing
218(1)
Secure Coding
218(1)
Application Configuration Baselining
219(1)
Operating System Patch Management
220(1)
Application Patch Management
220(1)
Host Security
220(13)
Permissions
220(1)
Access Control Lists
221(1)
Antimalware
221(5)
Host Software Baselining
226(1)
Hardening Web Servers
227(1)
Hardening Email Servers
228(1)
Hardening FTP Servers
229(1)
Hardening DNS Servers
230(1)
Hardening DHCP Services
231(2)
Protecting Data Through Fault Tolerance
233(2)
Backups
233(1)
RAID
234(1)
Clustering and Load Balancing
235(1)
Application Security
235(1)
Best Practices for Security
236(2)
Data Loss Prevention
236(1)
Hardware-Based Encryption Devices
237(1)
Summary
238(1)
Exam Essentials
238(1)
Review Questions
239(4)
Chapter 8 Cryptography
243(54)
An Overview of Cryptography
245(4)
Historical Cryptography
245(4)
Modern Cryptography
249(9)
Working with Symmetric Algorithms
249(2)
Working with Asymmetric Algorithms
251(3)
What Cryptography Should You Use?
254(1)
Hashing Algorithms
255(1)
Rainbow Tables and Salt
256(1)
Key Stretching
256(1)
Understanding Quantum Cryptography
257(1)
Cryptanalysis Methods
257(1)
Wi-Fi Encryption
258(1)
Using Cryptographic Systems
258(5)
Confidentiality and Strength
259(1)
Integrity
259(2)
Digital Signatures
261(1)
Authentication
261(1)
Nonrepudiation
262(1)
Key Features
262(1)
Understanding Cryptography Standards and Protocols
263(15)
The Origins of Encryption Standards
263(3)
Public-Key Infrastructure X.509 /Public-Key Cryptography Standards
266(1)
X.509
267(1)
SSL and TLS
268(2)
Certificate Management Protocols
270(1)
Secure Multipurpose Internet Mail Extensions
270(1)
Secure Electronic Transaction
270(1)
Secure Shell
271(1)
Pretty Good Privacy
272(2)
HTTP Secure
274(1)
Secure HTTP
274(1)
IP Security
274(3)
Tunneling Protocols
277(1)
Federal Information Processing Standard
278(1)
Using Public-Key Infrastructure
278(13)
Using a Certificate Authority
279(1)
Working with Registration Authorities and Local Registration Authorities
280(1)
Implementing Certificates
281(4)
Understanding Certificate Revocation
285(1)
Implementing Trust Models
285(5)
Hardware-Based Encryption Devices
290(1)
Data Encryption
290(1)
Summary
291(1)
Exam Essentials
291(2)
Review Questions
293(4)
Chapter 9 Malware, Vulnerabilities, and Threats
297(56)
Understanding Malware
300(10)
Surviving Viruses
310(8)
Symptoms of a Virus Infection
311(1)
How Viruses Work
311(1)
Types of Viruses
312(4)
Managing Spam to Avoid Viruses
316(1)
Antivirus Software
317(1)
Understanding Various Types of Attacks
318(16)
Identifying Denial-of-Service and Distributed Denial-of-Service Attacks
319(2)
Spoofing Attacks
321(1)
Pharming Attacks
322(1)
Phishing, Spear Phishing, and Vishing
323(1)
Xmas Attack
324(1)
Man-in-the-Middle Attacks
324(1)
Replay Attacks
325(1)
Smurf Attacks
326(1)
Password Attacks
326(2)
Privilege Escalation
328(4)
Malicious Insider Threats
332(1)
Transitive Access
332(1)
Client-Side Attacks
333(1)
Typo Squatting and URL Hijacking
333(1)
Watering Hole Attack
334(1)
Identifying Types of Application Attacks
334(7)
Cross-Site Scripting and Forgery
334(1)
SQL Injection
335(1)
LDAP Injection
336(1)
XML Injection
337(1)
Directory Traversal/Command Injection
337(1)
Buffer Overflow
338(1)
Integer Overflow
338(1)
Zero-Day Exploits
338(1)
Cookies and Attachments
338(1)
Locally Shared Objects and Flash Cookies
339(1)
Malicious Add-Ons
339(1)
Session Hijacking
340(1)
Header Manipulation
340(1)
Arbitrary Code and Remote Code Execution
341(1)
Tools for Finding Threats
341(5)
Interpreting Assessment Results
341(1)
Tools to Know
342(2)
Risk Calculations and Assessment Types
344(2)
Summary
346(1)
Exam Essentials
346(2)
Review Questions
348(5)
Chapter 10 Social Engineering and Other Foes
353(42)
Understanding Social Engineering
355(11)
Types of Social Engineering Attacks
356(5)
What Motivates an Attack?
361(1)
The Principles Behind Social Engineering
362(1)
Social Engineering Attack Examples
363(3)
Understanding Physical Security
366(11)
Hardware Locks and Security
369(2)
Mantraps
371(1)
Video Surveillance
371(1)
Fencing
372(1)
Access List
373(1)
Proper Lighting
374(1)
Signs
374(1)
Guards
374(1)
Barricades
375(1)
Biometrics
375(1)
Protected Distribution
376(1)
Alarms
376(1)
Motion Detection
376(1)
Environmental Controls
377(7)
HVAC
378(1)
Fire Suppression
378(2)
EMI Shielding
380(2)
Hot and Cold Aisles
382(1)
Environmental Monitoring
383(1)
Temperature and Humidity Controls
383(1)
Control Types
384(1)
A Control Type Analogy
385(1)
Data Policies
385(4)
Destroying a Flash Drive
386(1)
Some Considerations
387(1)
Optical Discs
388(1)
Summary
389(1)
Exam Essentials
389(2)
Review Questions
391(4)
Chapter 11 Security Administration
395(34)
Third-Party Integration
397(2)
Transitioning
397(1)
Ongoing Operations
398(1)
Understanding Security Awareness and Training
399(10)
Communicating with Users to Raise Awareness
399(1)
Providing Education and Training
399(2)
Safety Topics
401(1)
Training Topics
402(7)
Classifying Information
409(4)
Public Information
410(1)
Private Information
411(2)
Information Access Controls
413(1)
Security Concepts
413(1)
Complying with Privacy and Security Regulations
414(4)
The Health Insurance Portability and Accountability Act
415(1)
The Gramm-Leach-Bliley Act
415(1)
The Computer Fraud and Abuse Act
416(1)
The Family Educational Rights and Privacy Act
416(1)
The Computer Security Act of 1987
416(1)
The Cyberspace Electronic Security Act
417(1)
The Cyber Security Enhancement Act
417(1)
The Patriot Act
417(1)
Familiarizing Yourself with International Efforts
418(1)
Mobile Devices
418(2)
BYOD Issues
419(1)
Alternative Methods to Mitigate Security Risks
420(2)
Summary
422(1)
Exam Essentials
422(2)
Review Questions
424(5)
Chapter 12 Disaster Recovery and Incident Response
429(38)
Issues Associated with Business Continuity
431(24)
Types of Storage Mechanisms
432(1)
Crafting a Disaster-Recovery Plan
433(12)
Incident Response Policies
445(1)
Understanding Incident Response
446(8)
Succession Planning
454(1)
Tabletop Exercises
454(1)
Reinforcing Vendor Support
455(3)
Service-Level Agreements
455(2)
Code Escrow Agreements
457(1)
Penetration Testing
458(2)
What Should You Test?
458(1)
Vulnerability Scanning
459(1)
Summary
460(1)
Exam Essentials
461(1)
Review Questions
462(5)
Appendix A Answers to Review Questions
467(16)
Chapter 1 Measuring and Weighing Risk
468(1)
Chapter 2 Monitoring and Diagnosing Networks
469(1)
Chapter 3 Understanding Devices and Infrastructure
470(1)
Chapter 4 Access Control, Authentication, and Authorization
471(2)
Chapter 5 Protecting Wireless Networks
473(1)
Chapter 6 Securing the Cloud
474(1)
Chapter 7 Host, Data, and Application Security
475(1)
Chapter 8 Cryptography
476(1)
Chapter 9 Malware, Vulnerabilities, and Threats
477(1)
Chapter 10 Social Engineering and Other Foes
478(2)
Chapter 11 Security Administration
480(1)
Chapter 12 Disaster Recovery and Incident Response
481(2)
Appendix B Labs, Questions, and Exam Preparation Miscellany
483(86)
The Challenges
485(32)
See Hidden Shares
485(1)
Choose Problem Reporting Defaults
485(1)
Open the Add/Remove Programs Applet
485(1)
Delete Cookies
485(1)
Remove All Currently Allowed Pop-ups
485(1)
Synchronize Files
486(1)
Configure the Crash File
486(1)
Limit Computer Time
486(1)
Hide Extensions
486(1)
Allow Remote Desktop Connections
487(1)
Display Statistics
488(1)
MISC: Fire Extinguisher Types
488(1)
Restore Connections
488(1)
Open the Security Center Applet
489(1)
Identify the Issue #1
489(1)
Display All Information
489(1)
MISC: Compute CIDR #1
490(1)
Turn On the Archive Bit
490(1)
Repair Damaged Files
490(1)
MISC: Identify the Tool #1
490(1)
Generate a System Health Report
491(1)
Change Permissions for a File
491(1)
Create a Legal Notice
492(1)
Open the System Configuration Utility
492(1)
Turn On the SmartScreen Filter
492(1)
Prevent Sites from Knowing Your Location
493(1)
Register with Websites
493(1)
Create a Restore Point
494(1)
Add Encrypted Files
494(1)
Renew a DHCP Address
494(1)
MISC: Algorithm Types
495(1)
Enable Encryption
495(1)
Identify the Issue #2
496(1)
View Configuration for a Service
496(1)
View Current Audit Policy
497(1)
Display Network Path
497(1)
MISC: Identify the Tool #2
497(1)
Change Ownership on a File
498(1)
Enable Drive Compression
498(1)
Configure Program Compatibility
498(1)
Configure Immediate Deletion
499(1)
Change the Registered Organization for Windows
499(1)
Display Disk Quota
499(1)
Allow Pop-Ups from a Site
499(1)
Turn On DEP
499(1)
Enable Protection
500(1)
Require Wake-Up Password
500(1)
Open a Port in Windows Firewall
501(1)
Open the User Accounts
501(1)
Identify the Issue #3
501(1)
Open the System Properties
502(1)
View Group Policy Settings
502(1)
MISC: Attack Types
502(1)
Secure the Database
502(1)
Call Up the Security Policy Manager
503(1)
MISC: Identify the Tool #3
503(1)
View Effective Permissions for a File
503(1)
Create a Quota on Disk Space
504(1)
Optimize a Folder
504(1)
Choose Firewall Notifications
504(1)
MISC: Identify the Tool #4
504(1)
Turn Off Windows Firewall
505(1)
Disable Toolbars
505(1)
Reinstall Windows
505(1)
Change UAC Settings
506(1)
Synchronize Time
506(1)
View All Processes Currently Running
507(1)
Configure a Firewall
507(1)
Display ARP Table
507(1)
Display Windows Version
507(1)
MISC: Compute CIDR #2
508(1)
Summon the Event Viewer
508(1)
Identify the Issue #4
508(1)
Enable ReadyBoost
508(1)
Encrypt Folder Contents
509(1)
Clear Index Scores
509(1)
Turn On BitLocker
509(1)
Turn Off All AutoPlay
509(1)
Choose Default Programs
510(1)
Enable Shutdown Without Login
510(1)
Open System Configuration Editor
510(1)
Override Cookie Handling
511(1)
Software Updates
511(1)
Prohibit Remote Desktop
511(1)
Uninstall
512(1)
Change Notification Settings
512(1)
Display Network Name
512(1)
Flush the Cache
512(1)
Backup and Recover Passwords
513(1)
MISC: Identify the Tool #5
513(1)
MISC: Identify the Tool #6
514(1)
Restart Windows
515(1)
Identify the Issue #5
515(1)
Reduce the Number of Recently Used Programs
515(1)
File Properties
516(1)
Audit Views of a File
516(1)
Configure Sharing of a Folder
516(1)
Don't Display Last User
516(1)
The Answers
517(52)
See Hidden Shares: Answer
517(1)
Choose Problem Reporting Defaults: Answer
517(1)
Open the Add/Remove Programs Applet: Answer
518(1)
Delete Cookies: Answer
518(1)
Remove All Currently Allowed Pop-ups: Answer
518(1)
Synchronize Files: Answer
519(1)
Configure the Crash File: Answer
519(1)
Limit Computer Time: Answer
520(1)
Hide Extensions: Answer
520(1)
Allow Remote Desktop Connections: Answer
521(1)
Display Statistics: Answer
522(1)
MISC: Fire Extinguisher Types: Answer
522(1)
Restore Connections: Answer
523(1)
Open the Security Center Applet: Answer
523(1)
Identify the Issue #1: Answer
523(1)
Display All Information: Answer
524(1)
MISC: Compute CIDR #1: Answer
524(1)
Turn On the Archive Bit: Answer
525(1)
Repair Damaged Files: Answer
525(1)
MISC: Identify the Tool #1: Answer
525(1)
Generate a System Health Report: Answer
526(1)
Change Permissions for a File: Answer
527(1)
Create a Legal Notice: Answer
528(1)
Open the System Configuration Utility: Answer
529(1)
Turn On the SmartScreen Filter: Answer
529(1)
Prevent Sites from Knowing Your Location: Answer
530(23)
MISC: Compute CIDR #2: Answer
553(1)
Summon the Event Viewer: Answer
553(1)
Identify the Issue #4: Answer
553(1)
Enable ReadyBoost: Answer
554(1)
Encrypt Folder Contents: Answer
555(1)
Clear Index Scores: Answer
555(1)
Turn On BitLocker: Answer
556(1)
Turn Off All AutoPlay: Answer
556(1)
Choose Default Programs: Answer
556(1)
Enable Shutdown Without Login: Answer
557(1)
Open System Configuration Editor: Answer
557(1)
Override Cookie Handling: Answer
558(1)
Software Updates: Answer
559(1)
Prohibit Remote Desktop: Answer
559(1)
Uninstall: Answer
560(1)
Change Notification Settings: Answer
560(1)
Display Network Name: Answer
561(1)
Flush the Cache: Answer
561(1)
Backup and Recover Passwords: Answer
561(1)
MISC: Identify the Tool #5: Answer
562(1)
MISC: Identify the Tool #6: Answer
563(1)
Restart Windows: Answer
564(1)
Identify the Issue #5: Answer
564(1)
Reduce the Number of Recently Used Programs: Answer
565(1)
File Properties: Answer
566(1)
Audit Views of a File: Answer
566(1)
Configure Sharing of a Folder: Answer
567(1)
Don't Display Last User: Answer
567(2)
Appendix C About the Companion CD
569
What You'll Find on the CD
570(1)
Test Engine
570(1)
Electronic Flashcards
570(1)
E-book in All Formats
570(1)
Videos
571(1)
PDF of Glossary of Terms
571(1)
Adobe Reader
571(1)
System Requirements
571(1)
Using the Study Tools
572(1)
Troubleshooting
572
Customer Care
572
Index 573
Introduction xxv
Chapter 1 Network Security
1(68)
1.1 Implement security configuration parameters on network devices and other technologies
5(17)
Firewalls
5(3)
Routers
8(1)
Switches
9(1)
Load balancers
10(1)
Proxies
11(1)
Web security gateways
11(1)
VPN concentrators
11(1)
NIDS and NIPS
12(6)
Protocol analyzers
18(1)
Spam filter
18(1)
All-in-one security appliances
19(1)
Web application firewall vs. network firewall
19(1)
Application aware devices
20(1)
Exam Essentials
20(2)
1.2 Given a scenario, use secure network administration principles
22(5)
Rule-based management
22(1)
Firewall rules
23(1)
VLAN management
23(1)
Secure router configuration
23(1)
Access control lists
24(1)
Port security
24(1)
802.1x
25(1)
Flood guards
25(1)
Loop protection
25(1)
Implicit deny
26(1)
Network separation
26(1)
Log analysis
26(1)
Unified Threat Management
27(1)
Exam Essentials
27(1)
1.3 Explain network design elements and components
27(13)
DMZ
27(2)
Subnetting
29(2)
VLAN
31(1)
NAT
32(1)
Remote access
33(2)
Telephony
35(1)
NAC
36(1)
Virtualization
37(1)
Cloud computing
37(2)
Layered security / Defense in depth
39(1)
Exam Essentials
39(1)
1.4 Given a scenario, implement common protocols and services
40(16)
Protocols
40(11)
Ports
51(1)
OSI relevance
52(1)
Exam Essentials
53(3)
1.5 Given a scenario, troubleshoot security issues related to wireless networking
56(13)
WPA
59(1)
WPA2
60(1)
WEP
60(1)
EAP
60(1)
PEAP
61(1)
LEAP
61(1)
MAC filter
61(1)
Disable SSID broadcast
61(1)
TKIP
61(1)
CCMP
62(1)
Antenna placement
62(1)
Power level controls
62(1)
Captive portals
63(1)
Antenna types
63(1)
Site surveys
63(1)
VPN (over open wireless)
64(1)
Exam Essentials
64(2)
Review Questions
66(3)
Chapter 2 Compliance and Operational Security
69(86)
2.1 Explain the importance of risk-related concepts
76(16)
Control types
77(1)
False positives
78(1)
False negatives
78(1)
Importance of policies in reducing risk
78(4)
Risk calculation
82(3)
Quantitative vs. qualitative
85(1)
Vulnerabilities
86(1)
Threat vectors
87(1)
Probability/threat likelihood
87(1)
Risk avoidance, transference, acceptance, mitigation, deterrence
87(2)
Risks associated with Cloud Computing and Virtualization
89(1)
Recovery time objective and recovery point objective
89(1)
Exam Essentials
90(2)
2.2 Summarize the security implications of integrating systems and data with third parties
92(4)
On-boarding/off-boarding business partners
92(1)
Social media networks and/or applications
93(1)
Interoperability agreements
93(1)
Privacy considerations
94(1)
Risk awareness
94(1)
Unauthorized data sharing
94(1)
Data ownership
94(1)
Data backups
95(1)
Follow security policy and procedures
95(1)
Review agreement requirements to verify compliance and performance standards
95(1)
Exam Essentials
95(1)
2.3 Given a scenario, implement appropriate risk-mitigation strategies
96(5)
Change management
96(2)
Incident management
98(1)
User rights and permissions reviews
99(1)
Perform routine audits
99(1)
Enforce policies and procedures to prevent data loss or theft
100(1)
Enforce technology controls
100(1)
Exam Essentials
101(1)
2.4 Given a scenario, implement basic forensic procedures
101(5)
Order of volatility
102(1)
Capture system image
102(1)
Network traffic and logs
103(1)
Capture video
103(1)
Record time offset
103(1)
Take hashes
104(1)
Screenshots
104(1)
Witnesses
104(1)
Track man hours and expense
104(1)
Chain of custody
105(1)
Big data analysis
105(1)
Exam Essentials
105(1)
2.5 Summarize common incident response procedures
106(5)
Preparation
106(1)
Incident identification
106(1)
Escalation and notification
107(1)
Mitigation steps
107(1)
Lessons learned
108(1)
Reporting
108(1)
Recovery/reconstitution procedures
108(1)
First responder
108(1)
Incident isolation
109(1)
Data breach
109(1)
Damage and loss control
110(1)
Exam Essentials
110(1)
2.6 Explain the importance of security-related awareness and training
111(12)
Security policy training and procedures
112(1)
Role-based training
113(1)
Personally identifiable information
113(1)
Information classification
113(4)
Data labeling, handling and disposal
117(1)
Compliance with laws, best practices, and standards
118(1)
User habits
118(2)
New threats and new security trends/alerts
120(1)
Use of social networking and P2P
121(1)
Follow up and gather training metrics to validate compliance and security posture
121(1)
Exam Essentials
122(1)
2.7 Compare and contrast physical security and environmental controls
123(12)
Environmental controls
123(1)
Physical security
124(8)
Control types
132(2)
Exam Essentials
134(1)
2.8 Summarize risk-management best practices
135(13)
Business continuity concepts
136(6)
Fault tolerance
142(2)
Disaster recovery concepts
144(2)
Exam Essentials
146(2)
2.9 Given a scenario, select the appropriate control to meet the goals of security
148(7)
Confidentiality
148(1)
Integrity
149(1)
Availability
150(1)
Safety
151(1)
Exam Essentials
152(1)
Review Questions
153(2)
Chapter 3 Threats and Vulnerabilities
155(70)
3.1 Explain types of malware
161(6)
Adware
161(1)
Virus
161(1)
Spyware
162(1)
Trojan
163(1)
Rootkits
163(1)
Backdoors
164(1)
Logic bomb
165(1)
Botnets
165(1)
Ransomware
166(1)
Polymorphic malware
166(1)
Armored virus
166(1)
Exam Essentials
166(1)
3.2 Summarize various types of attacks
167(17)
Man-in-the-middle
168(1)
DDoS
168(2)
DoS
170(2)
Replay
172(1)
Smurf attack
173(1)
Spoofing
173(1)
Spam
174(1)
Phishing
174(1)
Spim
175(1)
Vishing
175(1)
Spear phishing
175(1)
Xmas attack
175(1)
Pharming
176(1)
Privilege escalation
176(1)
Malicious insider threat
176(1)
DNS poisoning and ARP poisoning
177(2)
Transitive access
179(1)
Client-side attacks
179(1)
Password attacks
179(2)
Typo squatting/URL hijacking
181(1)
Watering hole attack
181(1)
Exam Essentials
182(2)
3.3 Summarize social engineering attacks and the associated effectiveness with each attack
184(4)
Shoulder surfing
185(1)
Dumpster diving
185(1)
Tailgating
186(1)
Impersonation
186(1)
Hoaxes
186(1)
Whaling
186(1)
Vishing
186(1)
Principles (reasons for effectiveness)
186(2)
Exam Essentials
188(1)
3.4 Explain types of wireless attacks
188(6)
Rogue access points
189(1)
Jamming/Interference
189(2)
Evil twin
191(1)
War driving
191(1)
Bluejacking
191(1)
Bluesnarfing
192(1)
War chalking
192(1)
IV attack
192(1)
Packet sniffing
193(1)
Near field communication
193(1)
Replay attacks
193(1)
WEP/WPA attacks
193(1)
WPS attacks
193(1)
Exam Essentials
194(1)
3.5 Explain types of application attacks
194(7)
Cross-site scripting
195(1)
SQL injection
195(1)
LDAP injection
196(1)
XML injection
196(1)
Directory traversal/command injection
197(1)
Buffer overflow
197(1)
Integer overflow
198(1)
Zero-day
198(1)
Cookies and attachments
198(1)
LSO (Locally Shared Objects)
199(1)
Flash Cookies
199(1)
Malicious add-ons
199(1)
Session hijacking
199(1)
Header manipulation
200(1)
Arbitrary code execution/remote code execution
200(1)
Exam Essentials
201(1)
3.6 Analyze a scenario and select the appropriate type of mitigation and deterrent techniques
201(10)
Monitoring system logs
201(1)
Hardening
202(4)
Network security
206(1)
Security posture
207(2)
Reporting
209(1)
Detection controls vs. prevention controls
210(1)
Exam Essentials
211(1)
3.7 Given a scenario, use appropriate tools and techniques to discover security threats and vulnerabilities
211(6)
Interpret results of security assessment tools
211(1)
Tools
212(3)
Risk calculations
215(1)
Assessment types
215(1)
Assessment technique
216(1)
Exam Essentials
217(1)
3.8 Explain the proper use of penetration testing versus vulnerability scanning
217(8)
Penetration testing
217(3)
Vulnerability scanning
220(1)
Black box
221(1)
White box
222(1)
Gray box
222(1)
Exam Essentials
222(1)
Review Questions
223(2)
Chapter 4 Application, Data, and Host Security
225(42)
4.1 Explain the importance of application security controls and techniques
229(6)
Fuzzing
229(1)
Secure coding concepts
229(1)
Cross-site scripting prevention
230(1)
Cross-site Request Forgery (XSRF) prevention
230(1)
Application configuration baseline (proper settings)
231(1)
Application hardening
231(1)
Application patch management
231(1)
NoSQL databases vs. SQL databases
232(2)
Server-side vs. Client-side validation
234(1)
Exam Essentials
234(1)
4.2 Summarize mobile security concepts and technologies
235(9)
Device security
236(3)
Application security
239(2)
BYOD concerns
241(3)
Exam Essentials
244(1)
4.3 Given a scenario, select the appropriate solution to establish host security
244(7)
Operating system security and settings
244(1)
OS hardening
245(1)
Anti-malware
245(1)
Patch management
246(1)
Whitelisting vs. blacklisting applications
246(1)
Trusted OS
246(1)
Host-based firewalls
246(1)
Host-based intrusion detection
247(1)
Hardware security
247(2)
Host software baselining
249(1)
Virtualization
249(1)
Exam Essentials
250(1)
4.4 Implement the appropriate controls to ensure data security
251(6)
Cloud storage
251(1)
SAN
251(1)
Handling big data
251(1)
Data encryption
251(3)
Hardware-based encryption devices
254(1)
Data in transit, Data at rest, Data in use
255(1)
Permissions/ACL
255(1)
Data policies
256(1)
Exam Essentials
257(1)
4.5 Compare and contrast alternative methods to mitigate security risks in static environments
257(10)
Environments
257(3)
Methods
260(2)
Exam Essentials
262(1)
Review Questions
263(4)
Chapter 5 Access Control and Identity Management
267(32)
5.1 Compare and contrast the function and purpose of authentication services
270(5)
RADIUS
270(1)
TACACS+
271(1)
Kerberos
271(2)
LDAP
273(1)
XTACACS
274(1)
SAML
274(1)
Secure LDAP
275(1)
Exam Essentials
275(1)
5.2 Given a scenario, select the appropriate authentication, authorization, or access control
275(14)
Identification vs. authentication vs. authorization
276(1)
Authorization
276(4)
Authentication
280(5)
Authentication factors
285(1)
Identification
285(2)
Federation
287(1)
Transitive trust/authentication
287(1)
Exam Essentials
287(2)
5.3 Install and configure security controls when performing account management, based on best practices
289(10)
Mitigate issues associated with users with multiple account/roles and/or shared accounts
290(1)
Account policy enforcement
291(3)
Group-based privileges
294(1)
User-assigned privileges
294(1)
User access reviews
294(1)
Continuous monitoring
294(1)
Exam Essentials
295(1)
Review Questions
296(3)
Chapter 6 Cryptography
299(60)
6.1 Given a scenario, utilize general cryptography concepts
302(29)
Symmetric vs. asymmetric
304(3)
Session keys
307(1)
In-band vs. out-of-band key exchange
308(1)
Fundamental differences and encryption methods
308(1)
Transport encryption
309(6)
Non-repudiation
315(1)
Hashing
315(4)
Key escrow
319(4)
Steganography
323(1)
Digital signatures
323(1)
Use of proven technologies
324(1)
Elliptic curve and quantum cryptography
325(1)
Ephemeral key
325(1)
Perfect forward secrecy
325(1)
Exam Essentials
326(5)
6.2 Given a scenario, use appropriate cryptographic methods
331(13)
WEP vs. WPA/WPA2 and preshared key
331(1)
MD5
331(1)
SHA
332(1)
RIPEMD
333(1)
AES
333(1)
DES
334(1)
3DES
335(1)
HMAC
336(1)
RSA
336(1)
Diffie-Hellman
336(1)
RC4
336(1)
One-time pads
337(1)
NTLM
337(1)
NTLMv2
338(1)
Blowfish
338(1)
PGP/GPG
338(1)
Twofish
338(1)
DHE
338(1)
ECDHE
339(1)
CHAP
339(1)
PAP
340(1)
Comparative strengths and performance of algorithms
340(1)
Use of algorithms/protocols with transport encryption
340(1)
Cipher suites
341(1)
Key stretching
342(1)
Exam Essentials
343(1)
6.3 Given a scenario, use appropriate PKI, certificate management, and associated components
344(15)
Certificate authorities and digital certificates
344(6)
PKI
350(1)
Recovery agent
350(1)
Public key
350(1)
Private key
350(1)
Registration
351(1)
Key escrow
351(1)
Trust models
351(2)
Exam Essentials
353(3)
Review Questions
356(3)
Appendix A Answers to Review Questions
359(8)
Chapter 1 Network Security
360(1)
Chapter 2 Compliance and Operational Security
360(1)
Chapter 3 Threats and Vulnerabilities
361(1)
Chapter 4 Application, Data, and Host Security
362(1)
Chapter 5 Access Control and Identity Management
363(1)
Chapter 6 Cryptography
364(3)
Appendix B About the Additional Study Tools
367(4)
Additional Study Tools
368(1)
Sybex Test Engine
368(1)
Electronic Flashcards
368(1)
PDF of Glossary of Terms
368(1)
Adobe Reader
368(1)
System Requirements
369(1)
Using the Study Tools
369(1)
Troubleshooting
369(2)
Customer Care
370(1)
Index 371