Home > General > Comptia Security+ Study Guide, 6Th Ed, Exam Sy0-401
24%
Comptia Security+ Study Guide, 6Th Ed, Exam Sy0-401

Comptia Security+ Study Guide, 6Th Ed, Exam Sy0-401

          
5
4
3
2
1

Available


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Add to Wishlist

About the Book

Building on the popular Sybex Study Guide approach, this book provides 100% coverage of the Security+ exam objectives. The book contains clear and concise information on crucial security topics. It includes practical examples and insights drawn from real-world experience.

·Measuring and Weighing Risk
·Monitoring and Diagnosing Networks
·Understanding Devices and Infrastructure
·Access Control, Authentication and Authorization
·Protecting Wireless Networks
·Securing the Cloud
·Host, Data and Application Security
·Cryptography
·Malware, Vulnerabilities and Threats
·Social Engineering and Other Foes
·Security Administration
·Disaster Recovery and Incident Response

About the Author

Emmett Dulaney is an Assistant Professor at Anderson University. He has written several certification books on Windows, Security, IT project management and UNIX, and was co-author of two of Sybex's leading certification titles: CompTIA Security+ Study Guide and CompTIA A+ Complete Study Guide. Chuck Easttom is CEO and Chief Trainer for CEC-Security, which specializes in IT security training and CISP and Security+ exam preparation. He has over 18 years in the IT industry, over 10 years teaching/training. He has authored 15 published books, including IT security.



Table of Contents:
Foreword Introduction Chapter 1 Measuring and Weighing Risk ·Risk Assessment ·Computing Risk Assessment ·Acting on Your Risk Assessment ·Risks Associated with Cloud Computing ·Risks Associated with Virtualization ·Developing Policies, Standards and Guidelines ·Implementing Policies ·Understanding Control Types and False Positives / Negatives ·Risk Management Best Practices ·Disaster Recovery ·Tabletop Exercise Chapter 2 Monitoring and Diagnosing Networks ·Monitoring Networks ·Network Monitors ·Understanding Hardening ·Working with Services ·Patches ·User Account Control ·File systems ·Securing the Network ·Security Posture ·Continuous Security Monitoring ·Setting a Remediation Policy ·Reporting Security Issues ·Alarms ·Alerts ·Trends ·Differentiating between Detection Controls and Prevention Controls Chapter 3 Understanding Devices and Infrastructure ·Mastering TCP / IP ·OSI Relevance ·Working with the TCP / IP Suite ·IPv4 and IPv6 ·Understanding Encapsulation ·Working with Protocols and Services ·Designing a Secure Network ·Demilitarized Zones ·Subnetting ·Virtual Local Area Networks ·Remote Access ·Network Address Translation ·Telephony ·Network Access Control ·Understanding the Various Network Infrastructure Devices ·Firewalls ·Routers ·Switches ·Load Balancers ·Proxies ·Web Security Gateway ·VPNs and VPN Concentrators ·Intrusion Detection Systems ·Understanding Intrusion Detection Systems ·IDS vs. IPS ·Working with a Network-Based IDS ·Working with a Host-Based IDS ·Working with NIPSs ·Protocol Analyzers ·Spam Filters ·UTM Security Appliances Chapter 4 Access Control, Authentication and Authorization ·Understanding Access Control Basics ·Identification vs. Authentication ·Authentication (Single Factor) and Authorization ·Multifactor Authentication ·Layered Security and Defense in Depth ·Network Access Control ·Tokens ·Federations ·Potential Authentication and Access Problems ·Authentication Issues to Consider ·Authentication Protocols ·Account Policy Enforcement ·Users with Multiple Accounts / Roles ·Generic Account Prohibition ·Group-based and User-assigned Privileges ·Understanding Remote Access Connectivity ·Using the Point-to-Point Protocol ·Working with Tunneling Protocols ·Working with RADIUS ·TACACS / TACACS+ / XTACACS ·VLAN Management ·SAML ·Understanding Authentication Services ·LDAP ·Kerberos ·Single Sign-On Initiatives ·Understanding Access Control ·Mandatory Access Control ·Discretionary Access Control ·Role-Based Access Control ·Rule-Based Access Control ·Implementing Access Controlling Best Practices ·Least Privileges ·Separation of Duties ·Time of Day Restrictions ·User Access Review ·Smart Cards ·Access Control Lists ·Port Security ·Working with 802.1X ·Flood Guards and Loop Protection ·Preventing Network Bridging ·Log Analysis ·Trusted OS ·Secure Router Configuration Chapter 5 Protecting Wireless Networks ·Working with Wireless Systems ·IEEE 802.11x Wireless Protocols ·WEP / WAP / WPA / WPA2 ·Wireless Transport Layer Security ·Understanding Wireless Devices ·Wireless Access Points ·Extensible Authentication Protocol ·Lightweight Extensible Authentication Protocol ·Protected Extensible Authentication Protocol ·Wireless Vulnerabilities to Know ·Wireless Attack Analogy Chapter 6 Securing the Cloud ·Working with Cloud Computing ·Software as a Service (SaaS) ·Platform as a Service (PaaS) ·Infrastructure as a Service (IaaS) ·Private Cloud ·Public Cloud ·Community Cloud ·Hybrid Cloud ·Working with Virtualization ·Snapshots ·Patch Compatibility ·Host Availability / Elasticity ·Security Control Testing ·Sandboxing ·Security and the Cloud ·Cloud Storage Chapter 7 Host, Data and Application Security ·Application Hardening ·Databases and Technologies ·Fuzzing ·Secure Coding ·Application Configuration Baselining ·Operating System Patch Management ·Application Patch Management ·Host Security ·Permissions ·Access Control Lists ·Antimalware ·Host Software Baselining ·Hardening Web Servers ·Hardening Email Servers ·Hardening FTP Servers ·Hardening DNS Servers ·Hardening DHCP Services ·Protecting Data Through Fault Tolerance ·Backups ·RAID ·Clustering and Load Balancing ·Application Security ·Best Practices for Security ·Data Loss Prevention ·Hardware-Based Encryption Devices Chapter 8 Cryptography ·An Overview of Cryptography ·Historical Cryptography ·Modern Cryptography ·Working with Symmetric Algorithms ·Working with Asymmetric Algorithms ·What Cryptography Should You Use? ·Hashing Algorithms ·Rainbow Tables and Salt ·Key Stretching ·Understanding Quantum Cryptography ·Cryptanalysis Methods ·Wi-Fi Encryption ·Using Cryptographic Systems ·Confidentiality and Strength ·Integrity ·Digital Signatures ·Authentication ·Nonrepudiation ·Key Features ·Understanding Cryptography Standards and Protocols ·The Origins of Encryption Standards ·Public-Key Infrastructure X.509 / Public-Key Cryptography Standards ·X.509 ·SSL and TLS ·Certificate Management Protocols ·Secure Multipurpose Internet Mail Extensions ·Secure Electronic Transaction ·Secure Shell ·Pretty Good Privacy ·HTTP Secure ·Secure HTTP ·IP Security ·Tunneling Protocols ·Federal Information Processing Standard ·Using Public-Key Infrastructure ·Using a Certificate Authority ·Working with Registration Authorities and Local Registration Authorities ·Implementing Certificates ·Understanding Certificate Revocation ·Implementing Trust Models ·Hardware-Based Encryption Devices ·Data Encryption Chapter 9 Malware, Vulnerabilities and Threats ·Understanding Malware ·Surviving Viruses ·Symptoms of a Virus Infection ·How Viruses Work ·Types of Viruses ·Managing Spam to Avoid Viruses ·Antivirus Software ·Understanding Various Types of Attacks ·Identifying Denial-of-Service and Distributed Denial-of-Service Attacks ·Spoofing Attacks ·Pharming Attacks ·Phishing, Spear Phishing and Vishing ·Xmas Attack ·Man-in-the-Middle Attacks ·Replay Attacks ·Smurf Attacks ·Password Attacks ·Privilege Escalation ·Malicious Insider Threats ·Transitive Access ·Client-Side Attacks ·Typo Squatting and URL Hijacking ·Watering Hole Attack ·Identifying Types of Application Attacks ·Cross-Site Scripting and Forgery ·SQL Injection ·LDAP Injection ·XML Injection ·Directory Traversal / Command Injection ·Buffer Overflow ·Integer Overflow ·Zero-Day Exploits ·Cookies and Attachments ·Locally Shared Objects and Flash Cookies ·Malicious Add-Ons ·Session Hijacking ·Header Manipulation ·Arbitrary Code and Remote Code Execution ·Tools for Finding Threats ·Interpreting Assessment Results ·Tools to Know ·Risk Calculations and Assessment Types Chapter 10 Social Engineering and Other Foes ·Understanding Social Engineering ·Types of Social Engineering Attacks ·What Motivates an Attack? ·The Principles Behind Social Engineering ·Social Engineering Attack Examples ·Understanding Physical Security ·Hardware Locks and Security ·Mantraps ·Video Surveillance ·Fencing ·Access List ·Proper Lighting ·Signs ·Guards ·Barricades ·Biometrics ·Protected Distribution ·Alarms ·Motion Detection ·Environmental Controls ·HVAC ·Fire Suppression ·EMI Shielding ·Hot and Cold Aisles ·Environmental Monitoring ·Temperature and Humidity Controls ·Control Types ·A Control Type Analogy ·Data Policies ·Destroying a Flash Drive ·Some Considerations ·Optical Discs Chapter 11 Security Administration ·Third-Party Integration ·Transitioning ·Ongoing Operations ·Understanding Security Awareness and Training ·Communicating with Users to Raise Awareness ·Providing Education and Training ·Safety Topics ·Training Topics ·Classifying Information ·Public Information ·Private Information ·Information Access Controls ·Security Concepts ·Complying with Privacy and Security Regulations ·The Health Insurance Portability and Accountability Act ·The Gramm-Leach-Bliley Act ·The Computer Fraud and Abuse Act ·The Family Educational Rights and Privacy Act ·The Computer Security Act of 1987 ·The Cyberspace Electronic Security Act ·The Cyber Security Enhancement Act ·The Patriot Act ·Familiarizing Yourself with International Efforts ·Mobile Devices ·BYOD Issues ·Alternative Methods to Mitigate Security Risks Chapter 12 Disaster Recovery and Incident Response ·Issues Associated with Business Continuity ·Types of Storage Mechanisms ·Crafting a Disaster-Recovery Plan ·Incident Response Policies ·Understanding Incident Response ·Succession Planning ·Tabletop Exercises ·Reinforcing Vendor Support ·Service-Level Agreements ·Code Escrow Agreements ·Penetration Testing ·What Should You Test? ·Vulnerability Scanning Appendix A Answers to Review Questions ·Chapter 1: Measuring and Weighing Risk ·Chapter 2: Monitoring and Diagnosing Networks ·Chapter 3: Understanding Devices and Infrastructure ·Chapter 4: Access Control, Authentication and Authorization ·Chapter 5: Protecting Wireless Networks ·Chapter 6: Securing the Cloud ·Chapter 7: Host, Data and Application Security ·Chapter 8: Cryptography ·Chapter 9: Malware, Vulnerabilities and Threats ·Chapter 10: Social Engineering and Other Foes ·Chapter 11: Security Administration ·Chapter 12: Disaster Recovery and Incident Response Appendix B About the Additional Study Tools ·Additional Study Tools ·Sybex Test Engine ·Electronic Flashcards ·PDF of Glossary of Terms ·Adobe Reader ·System Requirements ·Using the Study Tools ·Troubleshooting ·Customer Care Summary Exam Essentials Review Questions Index


Best Sellers



Product Details
  • ISBN-13: 9788126557370
  • Publisher: Wiley India Pvt Ltd
  • Binding: Paperback
  • No of Pages: 552
  • ISBN-10: 8126557370
  • Publisher Date: August'2015
  • Language: English

Related Categories

Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Comptia Security+ Study Guide, 6Th Ed, Exam Sy0-401
Wiley India Pvt Ltd -
Comptia Security+ Study Guide, 6Th Ed, Exam Sy0-401
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Comptia Security+ Study Guide, 6Th Ed, Exam Sy0-401

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals



    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!