CompTIA Security+ All-in-One Exam Guide, Second Edition (Exam SY0-201)

Other Format
from $0.00

Author: Gregory B. White

ISBN-10: 0071601279

ISBN-13: 9780071601276

Category: Other Computer Certification

Search in google:

A CompTIA Security+ Exam Guide and An On-the-Job Reference—All-in-OneGet complete coverage of all the material included on the CompTIA Security+ exam inside this fully up-to-date, comprehensive resource. Written by network security experts, this authoritative exam guide features learning objectives at the beginning of each chapter, exam tips, practice questions, and in-depth explanations. Designed to help you pass the CompTIA Security+ exam with ease, this definitive volume also serves as an essential on-the-job reference. Get full details on all exam topics, including how to:Combat viruses, Trojan horses, spyware, logic bombs, and worms Defend against DDoS, spoofing, replay, TCP/IP hijacking, and other attacks Apply best practices for access control methodsImplement authentication using Kerberos, CHAP, biometrics, and other methods Use cryptography and PKI Secure remote access, wireless, and virtual private networks (VPNs) Harden networks, operating systems, and applications Manage incident response and follow forensic proceduresThe CD-ROM featuresOne full practice examComplete electronic book

Part I: Security ConceptsChapter 1. General Security Concepts Chapter 2. Operational Organizational Security Chapter 3. Legal Issues, Privacy, and EthicsPart II: Cryptography and ApplicationsChapter 4. Cryptography Chapter 5. Public Key Infrastructure Chapter 6. Standards and ProtocolsPart III: Security in the InfrastructureChapter 7. Physical Security Chapter 8. Infrastructure Security Chapter 9. Authentication and Remote Access Chapter 10. Wireless SecurityPart IV: Security in TransmissionsChapter 11. Intrusion Detection Systems Chapter 12. Security Baselines Chapter 13. Types of Attacks and Malicious Software Chapter 14. E-Mail and Instant Messaging Chapter 15. Web ComponentsPart V: Operational SecurityChapter 16. Disaster Recovery and Business Continuity Chapter 17. Risk Management Chapter 18. Change Management Chapter 19. Privilege Management Chapter 20. Computer ForensicsPart VI: AppendixesAppendix A. About the CD Appendix B. OSI Model and Internet ProtocolsGlossary IndexGreg White is an Associate Professor in the Department of Computer Science at the University of Texas at San Antonio. He is the author of the first edition of this book.Wm. Arthur Conklin, CompTIA Security+, is an Assistant Professor in the Information and Logistics Technology department at the University of Houston.