CompTIA Security+ Certification Study Guide: Exam SY0-201 3E
CompTIA Security+ Certification Study Guide: Exam SYO-201, Third Edition, offers a practical guide for those interested in pursuing CompTIA Security+ certification.
The book is organized into six parts. Part 1 deals with general security issues including security threats; hardware and peripheral security risks; the fundamentals of operating system (OS) hardening; implementing system security applications; and concepts of virtualization. Part 2 discusses the fundamentals of network security. Part 3 focuses on network access and network authentication. Part 4 explains the importance of risk assessments and risk mitigation, and how to conduct them. Part 5 reviews general cryptographic concepts and addresses the complex issues involved in planning a certificate-based public key infrastructure (PKI). Part 6 on organizational security discusses redundancy planning; environmental controls; implementing disaster recovery and incident response procedures; and the policies, procedures, and documentation upon which organizational computer security is based. Each chapter begins with Exam Objectives and concludes with Self-Test questions along with their corresponding answers.
*Complete exam-prep package includes full coverage of new Security+ objectives, flash cards, cram sheets, MP3s for exam-day study, PPT presentations, two complete practice exams, and certification e-book library
*Authored by a leading Microsoft security expert
*A good reference for both beginning security professionals and seasoned IT professionals
What people are saying - Write a review
We haven't found any reviews in the usual places.
Chapter 3 Application Security
Chapter 4 Implementing System Security Applications
Chapter 5 Virtualization Technologies
Part 2 Network Infrastructure
Chapter 7 Wireless Networks
Part 3 Access Control
Chapter 9 Network Authentication
Part 4 Assessments and Audits
Other editions - View all
access control subject Active Directory administrator adware algorithm allow Answers and Explanations antivirus antivirus software application attack authentication backup browser buffer overflow certificate client configuration connection cookies Correct Answer create cryptography database decrypt detection devices document domain downloaded e-mail employees encryption ensure exAm ObjecTIVeS exAm wARNINg example Figure hacker hard disk hardware hash host hypervisor implement incorrect installed Internet IP addresses IPSec Kerberos LDAP machine malicious malware method Microsoft monitor operating system option organization packet password perform physical port private key protect Protocol public key require rootkit scan Security+ exam server signature specific spyware storage stored TACACS tion traffic unauthorized user’s users virtual virus viruses VLANs vulnerabilities Windows Defender Windows Firewall Windows Server 2008 Windows Vista wireless networks worm