Mehr lesen
Informationen zum Autor T.J. Samuelle! CompTIA Network+! CompTIA Server+! CompTIA Security+! is an IT consultant and author of several computer books on CompTIA certifications. He served as a subject matter expert for CompTIA on the Network+ and Security+ exams. Klappentext 2nd edition! covering all the tricky topics! with a CD-ROM of practice questions. Inhaltsverzeichnis Check-In Part I: Systems Security Chapter 1. System Security Threats and Risks Objective 1.01 Differentiate Among Various Systems Security Threats Object 1.02 Explain System Hardware and Peripheral Risks Chapter 2. System Software Security Objective 2.01 Implement OS Hardening Practices Objective 2.02 Establish Application Security Objective 2.03 Implement Security Applications Objective 2.04 Explain Virtualization Technology Part II: Network Infrastructure Chapter 3. Network Security Objective 3.01 Network Ports and Protocol Threats Objective 3.02 Network Design Elements and Components Objective 3.03 Network Device Vulnerabilities Objective 3.04 Transmission Media Vulnerabilities Chapter 4. Network Security Tools and Wireless Security Objective 4.01 Determine and Apply Appropriate Network Security Tools Objective 4.02 Explain Wireless Networking Vulnerabilities and Implement Mitigations Part III: Access Control Chapter 5. Access Control Objective 5.01 Identify and Apply Access Control Methods Objective 5.02 Explain Common Access Control Models Objective 5.03 Organize Appropriate Security Groups! Roles! Rights! and Privileges Objective 5.04 Apply File and Print Security Controls Objective 5.05 Compare and Implement Logical Access Control Methods Chapter 6. Authentication Objective 6.01 Explain Identification and Authentication Objective 6.02 Identify Authentication Models Objective 6.03 Deploy Authentication Models Objective 6.04 Apply Physical Access Security Part IV: Assessments and Audits Chapter 7. Risk and Vulnerability Assessment Objective 7.01 Conduct Risk Assessments Objective 7.02 Perform Vulnerability Assessments Objective 7.03 Penetration Testing and Vulnerability Chapter 8. Monitoring and Auditing Objective 8.01 Monitor and Detect Security-Related Anomalies Objective 8.02 Compare Monitoring Methodologies Objective 8.03 Execute Proper Logging Procedures Objective 8.04 Conduct System Audits Part V: Cryptography Chapter 9. Cryptography and Encryption Overview Objective 9.01 Explain General Cryptography Concepts Objective 9.02 Explain Basic Hashing Concepts Objective 9.03 Explain Basic Encryption Concepts Objective 9.04 Explain and Implement Protocols Chapter 10. Public Key Cryptography Objective 10.01 Public Key Cryptography Objective 10.02 Certificate Management Part VI: Organizational Security Chapter 11. Redundancy and Environmental Planning Objective 11.01 Explain Redundancy Planning Objective 11.02 Explain Environmental Controls Chapter 12. Disaster Recovery and Incident Response Objective 12.01 Implement Disaster Recovery Procedures Objective 12.02 Execute Incident Response Procedures Chapter 13. Organizational Policies and Procedures Objective 13.01 Explain Legislation and Organizational Policies Objective 13.02 Reduce the Risks of Social Engineering Appendix A: About the CD-ROM Appendix B: Career Flight Path Index ...