๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

CompTIA Security+ Review Guide: Sy0-201

โœ Scribed by Stewart, James M.


Publisher
John Wiley & Sons
Year
2011
Tongue
English
Leaves
504
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


This review guide is broken into six parts, each one corresponding to one of the six domain areas of the Security+ exam: systems security, network infrastructure, access control, assessments and audits, cryptography, and organizational security. You'll find this book to be essential reading if you are studying for Security+ certification and want to get up to speed on the most recent security topics. The CD-ROM ย Read more...


Abstract: This review guide is broken into six parts, each one corresponding to one of the six domain areas of the Security+ exam: systems security, network infrastructure, access control, assessments and audits, cryptography, and organizational security. You'll find this book to be essential reading if you are studying for Security+ certification and want to get up to speed on the most recent security topics. The CD-ROM contains more than 120 review questions, two bonus exams, electronic flashcards, and a searchable key term database

โœฆ Table of Contents


Content: Cover
Title Page
Copyright
Publisher's Note
Dedication
Acknowledgments
About the Author
Introduction
Chapter 1: Systems Security
1.1 Differentiate among various systems security threats.
1.2 Explain the security risks pertaining to system hardware and peripherals.
1.3 Implement OS hardening practices and procedures to achieve workstation and server security.
1.4 Carry out the appropriate procedures to establish application security.
1.5 Implement security applications.
1.6 Explain the purpose and application of virtualization technology.
Review Questions. Answers to Review QuestionsChapter 2: Network Infrastructure
2.1 Differentiate between the different ports & protocols, their respective threats and mitigation techniques.
2.2 Distinguish between network design elements and components.
2.3 Determine the appropriate use of network security tools to facilitate network security.
2.4 Apply the appropriate network tools to facilitate network security.
2.5 Explain the vulnerabilities and mitigations associated with network devices.
2.6 Explain the vulnerabilities and mitigations associated with various transmission media. 2.7 Explain the vulnerabilities and implement mitigations associated with wireless networking. Review Questions
Answers to Review Questions
Chapter 3: Access Control
3.1 Identify and apply industry best practices for access control methods.
3.2 Explain common access control models and the differences between each.
3.3 Organize users and computers into appropriate security groups and roles while distinguishing between appropriate rights and privileges.
3.4 Apply appropriate security controls to file and print resources.
3.5 Compare and implement logical access control methods. 3.6 Summarize the various authentication models and identify the components of each. 3.7 Deploy various authentication models and identify the components of each.
3.8 Explain the difference between identification and authentication (identity proofing).
3.9 Explain and apply physical access security methods.
Review Questions
Answers to Review Questions
Chapter 4: Assessments and Audits
4.1 Conduct risk assessments and implement risk mitigation.
4.2 Carry out vulnerability assessments using common tools. 4.3 Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning. 4.4 Use monitoring tools on systems and networks and detect security-related anomalies.
4.5 Compare and contrast various types of monitoring methodologies.
4.6 Execute proper logging procedures and evaluate the results.
4.7 Conduct periodic audits of system security settings.
Review Questions
Answers to Review Questions
Chapter 5: Cryptography
5.1 Explain general cryptography concepts.

โœฆ Subjects


Computer networks;Examinations;Computer networks;Examinations;Study guides;Computer technicians;Certification;Computer technicians;Certification;Study guides;Electronic data processing personnel;Certification


๐Ÿ“œ SIMILAR VOLUMES


CompTIA Security+ Deluxe Study Guide: SY
โœ Emmett Dulaney ๐Ÿ“‚ Library ๐Ÿ“… 2008 ๐Ÿ› Sybex ๐ŸŒ English

I bought this book becuase I had used other Sybex titles to prepare for other exams. This book misses so much material it is not even funny! I ended up passing the exam but I just had to use reasoning on so many questions that weren't covered. I spent months reading the book and doing the practice e

CompTIA Security+ Deluxe Study Guide: SY
โœ Emmett Dulaney ๐Ÿ“‚ Library ๐Ÿ“… 2008 ๐Ÿ› Sybex ๐ŸŒ English

I bought this book becuase I had used other Sybex titles to prepare for other exams. This book misses so much material it is not even funny! I ended up passing the exam but I just had to use reasoning on so many questions that weren't covered. I spent months reading the book and doing the practice e

CompTIA Security+ Review Guide: Exam SY0
โœ Stewart, James ๐Ÿ“‚ Library ๐Ÿ“… 2014 ๐Ÿ› Wiley;Sybex ๐ŸŒ English

Focused review for the CompTIA Security+ certification exam The CompTIA Security+ certification offers tremendous opportunities for IT professionals. For those who want to take their careers to the next level, CompTIA Security+ Review Guide: Exam SY0-401 is here to serve as a great resource for cert

CompTIA Security+ Review Guide: Exam SY0
โœ James Michael Stewart ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› Sybex ๐ŸŒ English

<p><b>Learn the ins and outs of the IT security field and efficiently prepare for the CompTIA Security+ย Exam SY0-601 with oneย easy-to-followย resource</b>ย </p> <p><i>CompTIA Security+ Review Guide: Exam SY0-601, Fifth Edition</i>ย helpsย youย toย efficientlyย reviewย forย the leading IT security certificati