Acknowledgments |
|
xix | |
Introduction |
|
xxi | |
|
Chapter 1 Risk Management |
|
|
1 | (76) |
|
|
2 | (14) |
|
|
2 | (1) |
|
|
3 | (1) |
|
|
3 | (2) |
|
|
5 | (1) |
|
Circling Back to the Risk Definition |
|
|
6 | (1) |
|
|
6 | (1) |
|
|
7 | (9) |
|
Module 1-2 Risk Management Concepts |
|
|
16 | (9) |
|
|
16 | (2) |
|
|
18 | (1) |
|
Risk Management Frameworks |
|
|
18 | (7) |
|
Module 1-3 Security Controls |
|
|
25 | (2) |
|
|
25 | (1) |
|
|
25 | (2) |
|
Module 1-4 Risk Assessment |
|
|
27 | (13) |
|
Risk Assessment Processes and Concepts |
|
|
28 | (5) |
|
Quantitative Risk Assessment |
|
|
33 | (3) |
|
Qualitative Risk Assessment |
|
|
36 | (1) |
|
Putting It All Together: Risk Analysis |
|
|
37 | (1) |
|
|
38 | (2) |
|
Module 1-5 Business Impact Analysis |
|
|
40 | (7) |
|
|
41 | (2) |
|
|
43 | (2) |
|
Locating Critical Resources |
|
|
45 | (1) |
|
|
45 | (1) |
|
|
46 | (1) |
|
Module 1-6 Data Security and Data Protection |
|
|
47 | (13) |
|
|
48 | (3) |
|
|
51 | (5) |
|
|
56 | (2) |
|
|
58 | (2) |
|
Module 1-7 Personnel Risk and Policies |
|
|
60 | (8) |
|
|
60 | (1) |
|
|
60 | (1) |
|
Personnel Management Policies |
|
|
61 | (2) |
|
|
63 | (2) |
|
|
65 | (1) |
|
|
65 | (2) |
|
|
67 | (1) |
|
Module 1-8 Third-Party Risk and Policies |
|
|
68 | (9) |
|
Third-Party Risk Management |
|
|
68 | (3) |
|
|
71 | (3) |
|
|
74 | (2) |
|
|
76 | (1) |
|
|
77 | (76) |
|
Module 2-1 Cryptography Basics |
|
|
78 | (12) |
|
Essential Building Blocks |
|
|
78 | (3) |
|
|
81 | (4) |
|
|
85 | (5) |
|
Module 2-2 Cryptographic Methods |
|
|
90 | (8) |
|
|
90 | (3) |
|
|
93 | (1) |
|
|
94 | (2) |
|
Limitations in Symmetric vs. Asymmetric Cryptography |
|
|
96 | (1) |
|
|
97 | (1) |
|
|
97 | (1) |
|
Module 2-3 Symmetric Cryptosystems |
|
|
98 | (5) |
|
|
98 | (3) |
|
|
101 | (1) |
|
|
101 | (1) |
|
|
102 | (1) |
|
|
102 | (1) |
|
|
102 | (1) |
|
Summary of Symmetric Algorithm Characteristics |
|
|
102 | (1) |
|
Module 2-4 Asymmetric Cryptosystems |
|
|
103 | (4) |
|
|
103 | (2) |
|
|
105 | (1) |
|
|
106 | (1) |
|
|
106 | (1) |
|
|
106 | (1) |
|
Module 2-5 Hashing Algorithms |
|
|
107 | (3) |
|
|
107 | (2) |
|
|
109 | (1) |
|
|
109 | (1) |
|
|
110 | (1) |
|
|
110 | (1) |
|
Module 2-6 Digital Signatures and Certificates |
|
|
110 | (10) |
|
|
111 | (2) |
|
|
113 | (7) |
|
Module 2-7 Public Key Infrastructure |
|
|
120 | (13) |
|
Keys, Algorithms, and Standards |
|
|
121 | (2) |
|
|
123 | (1) |
|
Digital Certificates and PKI Structure |
|
|
124 | (7) |
|
|
131 | (1) |
|
|
132 | (1) |
|
Module 2-8 Cryptographic Attacks |
|
|
133 | (15) |
|
|
133 | (2) |
|
|
135 | (2) |
|
|
137 | (8) |
|
Defending Password Storage |
|
|
145 | (1) |
|
|
146 | (2) |
|
Module 2-9 Other Cryptosystems |
|
|
148 | (5) |
|
|
149 | (1) |
|
|
149 | (1) |
|
|
150 | (1) |
|
|
150 | (2) |
|
|
152 | (1) |
|
Chapter 3 Identity and Account Management |
|
|
153 | (64) |
|
Module 3-1 Understanding Authentication |
|
|
155 | (12) |
|
|
155 | (1) |
|
Identification and Authentication |
|
|
156 | (6) |
|
|
162 | (2) |
|
|
164 | (1) |
|
|
165 | (2) |
|
Module 3-2 Authentication Methods and Access Controls |
|
|
167 | (15) |
|
|
168 | (7) |
|
|
175 | (4) |
|
Authorization and Access Control Schemes/Models |
|
|
179 | (3) |
|
Module 3-3 Account Management |
|
|
182 | (19) |
|
|
183 | (7) |
|
|
190 | (9) |
|
|
199 | (2) |
|
Module 3-4 Point-to-Point Authentication |
|
|
201 | (4) |
|
|
202 | (1) |
|
|
202 | (1) |
|
Remote Access Connection and Authentication Services |
|
|
203 | (2) |
|
Module 3-5 Network Authentication |
|
|
205 | (6) |
|
The Challenge of LAN Access Management |
|
|
205 | (2) |
|
|
207 | (3) |
|
|
210 | (1) |
|
Module 3-6 Identity Management Systems |
|
|
211 | (6) |
|
|
212 | (1) |
|
Shared Authentication Schemes |
|
|
213 | (1) |
|
|
214 | (2) |
|
|
216 | (1) |
|
Chapter 4 Tools of the Trade |
|
|
217 | (50) |
|
Module 4-1 Operating System Utilities |
|
|
217 | (20) |
|
Network Reconnaissance and Discovery |
|
|
218 | (13) |
|
|
231 | (4) |
|
Shell and Script Environments |
|
|
235 | (2) |
|
Module 4-2 Network Scanners |
|
|
237 | (9) |
|
|
239 | (1) |
|
|
239 | (1) |
|
|
239 | (7) |
|
Module 4-3 Protocol Analyzers |
|
|
246 | (6) |
|
|
247 | (1) |
|
|
248 | (3) |
|
|
251 | (1) |
|
Module 4-4 Monitoring Networks |
|
|
252 | (15) |
|
|
253 | (4) |
|
|
257 | (2) |
|
Security Information and Event Management |
|
|
259 | (3) |
|
|
262 | (1) |
|
|
263 | (1) |
|
|
264 | (3) |
|
Chapter 5 Securing Individual Systems |
|
|
267 | (60) |
|
Module 5-1 Types of System Attacks |
|
|
269 | (10) |
|
|
270 | (6) |
|
|
276 | (1) |
|
Malicious Code or Script Execution |
|
|
277 | (2) |
|
|
279 | (9) |
|
|
280 | (1) |
|
|
281 | (1) |
|
|
282 | (1) |
|
|
283 | (1) |
|
Potentially Unwanted Programs |
|
|
283 | (2) |
|
|
285 | (1) |
|
|
286 | (1) |
|
|
286 | (1) |
|
|
287 | (1) |
|
|
288 | (1) |
|
|
288 | (1) |
|
Module 5-3 Cybersecurity Resilience |
|
|
288 | (12) |
|
|
289 | (6) |
|
|
295 | (5) |
|
|
300 | (1) |
|
Module 5-4 Securing Hardware |
|
|
300 | (10) |
|
|
301 | (2) |
|
|
303 | (2) |
|
|
305 | (5) |
|
Module 5-5 Securing Endpoints |
|
|
310 | (11) |
|
Hardening Operating Systems |
|
|
310 | (7) |
|
|
317 | (2) |
|
Data Execution Prevention |
|
|
319 | (1) |
|
|
319 | (1) |
|
|
320 | (1) |
|
Module 5-6 System Recycling |
|
|
321 | (6) |
|
|
321 | (2) |
|
|
323 | (1) |
|
|
324 | (1) |
|
|
324 | (2) |
|
|
326 | (1) |
|
|
327 | (44) |
|
Module 6-1 Layer 2 LAN Attacks |
|
|
327 | (7) |
|
|
328 | (2) |
|
Man-in-the-Middle Attacks |
|
|
330 | (2) |
|
|
332 | (1) |
|
|
333 | (1) |
|
Module 6-2 Organizing LANs |
|
|
334 | (9) |
|
|
335 | (3) |
|
|
338 | (4) |
|
|
342 | (1) |
|
Module 6-3 Implementing Secure Network Designs |
|
|
343 | (14) |
|
|
343 | (4) |
|
Internet Connection Firewalls |
|
|
347 | (7) |
|
|
354 | (3) |
|
Module 6-4 Virtual Private Networks |
|
|
357 | (5) |
|
|
358 | (2) |
|
|
360 | (1) |
|
|
360 | (1) |
|
|
361 | (1) |
|
Module 6-5 Network-Based Intrusion Detection/Prevention |
|
|
362 | (9) |
|
|
362 | (1) |
|
|
362 | (2) |
|
Configuring Network-Based IDS/IPS |
|
|
364 | (2) |
|
|
366 | (1) |
|
Endpoint Detection and Response |
|
|
367 | (1) |
|
|
367 | (2) |
|
|
369 | (2) |
|
Chapter 7 Securing Wireless LANs |
|
|
371 | (30) |
|
Module 7-1 Networking with 802.11 |
|
|
371 | (9) |
|
Wireless Cryptographic Protocols |
|
|
372 | (5) |
|
Wireless Authentication Protocols |
|
|
377 | (3) |
|
Module 7-2 Attacking 802.11 |
|
|
380 | (9) |
|
|
380 | (1) |
|
|
381 | (1) |
|
|
381 | (1) |
|
|
382 | (1) |
|
|
383 | (2) |
|
|
385 | (1) |
|
|
385 | (1) |
|
|
386 | (1) |
|
|
387 | (1) |
|
|
387 | (1) |
|
|
388 | (1) |
|
|
388 | (1) |
|
Module 7-3 Securing 802.11 |
|
|
389 | (12) |
|
Installation Considerations |
|
|
389 | (4) |
|
|
393 | (4) |
|
Security Posture Assessment |
|
|
397 | (1) |
|
|
398 | (2) |
|
|
400 | (1) |
|
Chapter 8 Securing Public Servers |
|
|
401 | (34) |
|
Module 8-1 Attacking and Defending Public Servers |
|
|
401 | (5) |
|
Distributed Denial-of-Service |
|
|
402 | (2) |
|
|
404 | (1) |
|
|
404 | (1) |
|
|
404 | (2) |
|
Module 8-2 Visualization Security |
|
|
406 | (8) |
|
Visualization Architecture |
|
|
407 | (3) |
|
|
410 | (1) |
|
|
411 | (1) |
|
Using Visualization for Security |
|
|
412 | (2) |
|
Module 8-3 Cloud Deployment |
|
|
414 | (12) |
|
|
416 | (3) |
|
|
419 | (3) |
|
Cloud Architecture Models |
|
|
422 | (2) |
|
|
424 | (2) |
|
Module 8-4 Securing the Cloud |
|
|
426 | (9) |
|
|
426 | (6) |
|
Unique Cloud Security Solutions |
|
|
432 | (1) |
|
|
432 | (2) |
|
|
434 | (1) |
|
Chapter 9 Securing Dedicated Systems |
|
|
435 | (44) |
|
Module 9-1 Embedded, Specialized, and Mobile Systems |
|
|
436 | (12) |
|
|
436 | (3) |
|
|
439 | (1) |
|
|
440 | (1) |
|
|
441 | (6) |
|
|
447 | (1) |
|
Module 9-2 Connecting to Dedicated Systems |
|
|
448 | (5) |
|
Common Communication Technologies |
|
|
448 | (3) |
|
IoT-Specific Communication Technologies |
|
|
451 | (2) |
|
Module 9-3 Security Constraints for Dedicated Systems |
|
|
453 | (3) |
|
|
453 | (1) |
|
|
453 | (2) |
|
|
455 | (1) |
|
Module 9-4 Implementing Secure Mobile Solutions |
|
|
456 | (23) |
|
|
458 | (1) |
|
|
459 | (3) |
|
Inventory Control and Asset Tracking |
|
|
462 | (4) |
|
Application Management and Security |
|
|
466 | (1) |
|
Encryption and Authentication |
|
|
467 | (1) |
|
Enforcement and Monitoring for Device Security |
|
|
468 | (7) |
|
|
475 | (2) |
|
|
477 | (2) |
|
Chapter 10 Physical Security |
|
|
479 | (24) |
|
Module 10-1 Physical Security Controls |
|
|
479 | (15) |
|
Passive Defensive Systems and Perimeter Controls |
|
|
480 | (8) |
|
|
488 | (1) |
|
|
489 | (5) |
|
Module 10-2 Environmental Controls |
|
|
494 | (9) |
|
|
494 | (1) |
|
|
495 | (3) |
|
|
498 | (1) |
|
Temperature and Humidity Controls |
|
|
498 | (1) |
|
|
499 | (1) |
|
|
500 | (1) |
|
|
500 | (2) |
|
|
502 | (1) |
|
Chapter 11 Secure Protocols and Applications |
|
|
503 | (54) |
|
Module 11-1 Secure Internet Protocols |
|
|
504 | (5) |
|
|
505 | (1) |
|
|
506 | (1) |
|
|
507 | (1) |
|
|
508 | (1) |
|
|
509 | (1) |
|
Module 11-2 Secure Web and E-mail |
|
|
509 | (8) |
|
|
509 | (1) |
|
|
510 | (3) |
|
|
513 | (4) |
|
Module 11-3 Web Application Attacks |
|
|
517 | (9) |
|
|
517 | (3) |
|
Hijacking and Related Attacks |
|
|
520 | (3) |
|
Other Web Application Attacks |
|
|
523 | (3) |
|
Module 11-4 Application Security |
|
|
526 | (16) |
|
|
527 | (8) |
|
|
535 | (2) |
|
|
537 | (1) |
|
|
537 | (1) |
|
|
538 | (1) |
|
|
538 | (4) |
|
Module 11-5 Certificates in Security |
|
|
542 | (15) |
|
Certificate Concepts and Components |
|
|
542 | (1) |
|
|
542 | (3) |
|
|
545 | (2) |
|
|
547 | (1) |
|
|
548 | (4) |
|
|
552 | (2) |
|
|
554 | (1) |
|
|
554 | (2) |
|
|
556 | (1) |
|
Chapter 12 Testing Infrastructure |
|
|
557 | (44) |
|
Module 12-1 Vulnerability Impact |
|
|
557 | (6) |
|
Device/Hardware Vulnerabilities |
|
|
558 | (1) |
|
Configuration Vulnerabilities |
|
|
559 | (3) |
|
Management/Design Vulnerabilities |
|
|
562 | (1) |
|
Module 12-2 Social Engineering |
|
|
563 | (14) |
|
|
564 | (3) |
|
|
567 | (3) |
|
|
570 | (7) |
|
Module 12-3 Artificial Intelligence |
|
|
577 | (2) |
|
Understanding Artificial Intelligence |
|
|
577 | (1) |
|
Machine Learning Essentials |
|
|
577 | (1) |
|
|
578 | (1) |
|
Adversarial Artificial Intelligence |
|
|
579 | (1) |
|
Module 12-4 Security Assessment |
|
|
579 | (11) |
|
|
580 | (1) |
|
|
581 | (3) |
|
|
584 | (6) |
|
Module 12-5 Assessment Tools |
|
|
590 | (11) |
|
|
591 | (1) |
|
|
591 | (2) |
|
|
593 | (1) |
|
Configuration Compliance Scanner |
|
|
594 | (1) |
|
Penetration Testing with Metasploit |
|
|
594 | (1) |
|
Specific Tools Mentioned by CompTIA |
|
|
595 | (1) |
|
Interpreting Security Assessment Tool Results |
|
|
596 | (1) |
|
|
597 | (2) |
|
|
599 | (2) |
|
Chapter 13 Dealing with Incidents |
|
|
601 | (60) |
|
Module 13-1 Incident Response |
|
|
601 | (19) |
|
Incident Response Concepts |
|
|
602 | (2) |
|
Incident Response Procedures |
|
|
604 | (13) |
|
Scenarios: Mitigation During and After an Incident |
|
|
617 | (3) |
|
Module 13-2 Digital Forensics |
|
|
620 | (17) |
|
Digital Forensics Concepts |
|
|
620 | (3) |
|
|
623 | (4) |
|
Critical Forensics Practices |
|
|
627 | (5) |
|
|
632 | (3) |
|
|
635 | (2) |
|
Module 13-3 Continuity of Operations and Disaster Recovery |
|
|
637 | (24) |
|
Risk Management Best Practices |
|
|
637 | (4) |
|
Contingency Planning and Resilience |
|
|
641 | (2) |
|
Functional Recovery Plans |
|
|
643 | (2) |
|
Backup and Restore Plans and Policies |
|
|
645 | (12) |
|
|
657 | (2) |
|
|
659 | (2) |
|
Appendix A Exam Objective Map |
|
|
661 | (38) |
|
|
661 | (38) |
|
Appendix B About the Online Content |
|
|
699 | (4) |
|
|
699 | (1) |
|
Your Total Seminars Training Hub Account |
|
|
699 | (1) |
|
|
699 | (1) |
|
Single User License Terms and Conditions |
|
|
699 | (2) |
|
|
701 | (1) |
|
|
701 | (1) |
|
Video Training from Mike Meyers |
|
|
701 | (1) |
|
|
702 | (1) |
|
|
702 | (1) |
|
|
702 | (1) |
Glossary |
|
703 | (66) |
Index |
|
769 | |