CompTIA security + certification guide: master IT security essentials and exam topics for CompTIA security + SY0-501 certification

Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributor -- Table of Contents -- Preface -- Chapter 1: Understanding Security Fundamentals -- CIA triad concept -- Identifying security controls -- Administrative controls -- Technical controls -- Physical controls -- Preventative co...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Neil, Ian (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Birmingham ; Mumbai Packt September 2018
Schlagworte:
Online-Zugang:UBY01
Zusammenfassung:Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributor -- Table of Contents -- Preface -- Chapter 1: Understanding Security Fundamentals -- CIA triad concept -- Identifying security controls -- Administrative controls -- Technical controls -- Physical controls -- Preventative controls -- Deterrent controls -- Detective controls -- Corrective controls -- Compensating controls -- Access controls -- Discretionary access control -- Least privilege -- Mandatory access control -- Linux permissions (not SELinux) -- Role-based access control -- Rule-based access control -- Attribute-based access control -- Group-based access -- Hashing and data integrity -- Hash practical -- Hash exercise -- Defense in depth model -- Review questions -- Answers and explanations -- Chapter 2: Conducting Risk Analysis -- Risk management -- Importance of policy, plans, and procedures -- Standard operating procedures -- Agreement types -- Personnel management-policies and procedures -- Role-based awareness training -- General security policies -- Business impact analysis concepts -- Privacy threshold assessment/privacy impact assessment -- Mission-essential functions/identification of critical systems -- Example -- Supply chain risk assessment -- Example -- Business impact analysis concepts -- Calculating loss -- Example -- Risk procedures and concepts -- Threat assessment -- Threat actors -- Risk treatment -- Risk register -- Qualitative/quantitative risk analysis -- Review questions -- Answers and explanations -- Chapter 3: Implementing Security Policies and Procedures -- Industry standard frameworks and reference architecture -- OSI reference model -- TCP/IP model -- Types of frameworks -- Benchmarks/secure configuration guides -- Policies and user guides -- Security configuration guides - web servers -- Network infrastructure device user guides
General purpose guides -- Implementing data security and privacy practices -- Destroying data and sanitizing media -- Data sensitivity labeling and handling -- Data retention - legal and compliance -- Data roles -- Practical - creating a baseline -- Review questions -- Answers and explanations -- Chapter 4: Delving into Identity and Access Management -- Understanding identity and access management concepts -- Passwords -- Default/administrator password -- Passwords-group policy -- Password recovery -- Authentication factors -- Number of factor examples -- Transitive trust -- Federation services -- Shibboleth -- Single sign-on -- Installing and configuring identity and access services -- LDAP -- Kerberos -- Internet-based open source authentication -- Authentication, authorization, and accounting (AAA) servers -- Authentication -- Learning about Identity and access management controls -- Biometrics -- Security tokens and devices -- Certification-based authentication -- Port-based authentication -- Common account management practices -- Account types -- Account creation -- Employees moving departments -- Disabling an account -- Account recertification -- Account maintenance -- Account monitoring -- Security Information and Event Management -- Group based access control -- Credential management -- User account reviews -- Practical exercise - password policy -- Review questions -- Answers and explanations -- Chapter 5: Understanding Network Components -- OSI - reference model -- Installing and configuring network components -- Firewall -- Router -- Access control list- network devices -- Intrusion-prevention system -- Intrusion-detection system -- Modes of detection -- Modes of operation -- Monitoring data -- Switch -- Layer 3 switch -- Proxy server -- Reverse proxy -- Remote access -- Virtual private network using L2TP/IPSec -- IPSec
IPSec - handshake -- VPN concentrator -- Site-to-site VPN -- VPN always on versus on-demand -- SSL VPN -- Split tunnelling -- Load balancer -- Clustering -- Data-loss prevention -- Security information and event management -- Mail gateway -- Cloud-based email -- Media gateway -- Hardware security module -- Software-defined network -- Secure network architecture concepts -- Network address translation -- Port address translation -- Network access control (NAC) -- Honeypot -- Secure Socket Layer accelerators -- SSL/TLS decryptor -- Sensor/collector -- Tap/port mirror -- DDoS mitigator -- Segregation/segmentation/isolation -- Security device/technology placement -- DMZ device placement -- LAN device placement -- Aggregation switches -- Implementing secure protocols -- Use case -- File transfer - use case -- Remote access - use case -- Email - use case -- Name resolution - use case -- Hostname -- DNSSEC -- NETBIOS -- Web - use case -- Voice and video - use case -- Network address allocation - use case -- IP version 4 -- IP version 4 - lease process -- IP version 4 lease process - troubleshooting -- IP version 6 addressing -- Subscription services - use case -- Routing - use case -- Time synchronization - use case -- Directory services - use case -- Active Directory -- Switching - use case -- Simple network management protocol - use case -- Implementing wireless security -- Wireless access points - controllers -- Securing access to your wireless access point -- Wireless bandwidth/band selection -- Wireless channels -- Wireless antenna types and signal strength -- Wireless coverage -- Wireless encryption -- Wireless - open system authentication -- Wireless - WPS -- Wireless - captive portal -- Wireless attacks -- Wireless authentication protocols -- Review questions -- Answers and explanations -- Chapter 6: Understanding Cloud Models and Virtualization
Beschreibung:1 Online-Ressource (ix, 505 Seiten) Illustrationen
ISBN:9781789346688

Es ist kein Print-Exemplar vorhanden.

Fernleihe Bestellen Achtung: Nicht im THWS-Bestand!