7print.bg = 1 принтиране + 2 плотиране + 3 подвързване + 4 чаши + 5 тениски + 6 книгоиздаване + 7 рекламни м-ли 088 682 47 47
Категории
CompTIA Security + Get Certified Get Ahead

CompTIA Security + Get Certified Get Ahead

Сумата се прибавя директно в кошницата
45.00лв


Table of Contents
 
Dedication
Acknowledgments About the Author
 
Introduction
 
Who This Book Is For About This Book How to Use This Book Conventions Remember This Vendor Neutral Free Online Resources Additional Web Resources Assumptions Set a Goal
 
About the Exam
 
Passing Score Exam Prerequisites Beta Questions Exam Format Question Types Multiple Choice Performance-Based Questions Question Complexity Video
 
Exam Test Provider Voucher Code for 10 Percent Off Exam Domains Objective to Chapter Map
 
1.0 Threats, Attacks and Vulnerabilities 21%
 
2.0 Technologies and Tools 22%
 
3.0 Architecture and Design 15%
 
4.0 Identity and Access Management 16%
5.0 Risk Management 14%
 
6.0 Cryptography and PKI 12%
 
Recertification Requirements Pre-Assessment Exam Assessment Exam Answers Chapter 1 Mastering Security Basics
 
Understanding Core Security Goals
 
What Is a Use Case?
 
Ensure Confidentiality Encryption Access Controls Steganography and Obfuscation Provide Integrity Hashing
 
Digital Signatures. Certificates, and Non-Repudiation Increase Availability Redundancy and Fault Tolerance Patching
 
Resource Versus Security Constraints
 
Introducing Basic Risk Concepts
 
Understanding Control Types
 
Technical Controls Administrative Controls Physical Controls Control Goals Preventive Controls Detective Controls
 
Comparing Detection and Prevention Controls Corrective Controls Deterrent Controls Compensating Controls Combining Control Types and Goals
 
Implementing Virtualization
 
Comparing Hypervisors
 
Application Cell or Container Virtualization

Secure Network Architecture Snapshots

VDI/VDE and Non-Persistence VMs as Files

Risks Associated with Virtualization Running Kali Linux in a VM

Using Command-Line Tools

Windows Command Line Linux Terminal

Understanding Switches and Getting Help

Understanding Case

Ping

Using Ping to Check Name Resolution Beware of Firewalls Using Ping to Check Security Posture Ipconfig, ifconfig, and ip Netstat Tracert Arp

Chapter 1 Exam Topic Review

Chapter 1 Practice Questions

Chapter 1 Practice Question Answers

Chapter 2 Understanding Identity and Access Management

Exploring Authentication Concepts

Comparing Identification and AAA Comparing Authentication Factors Something You Know Something You Have Something You Are Somewhere You Are

Dual-Factor and Multifactor Authentication Summarizing Identification Methods Troubleshooting Authentication Issues

Comparing Authentication Services

Kerberos

NTLM

LDAP and LDAPS Single Sign-On

Managing Accounts

Least Privilege Need to Know Account Types

Require Administrators to Use Two Accounts Standard Naming Convention Prohibiting Shared and Generic Accounts Disablement Policies Recovering Accounts Time-of-Day Restrictions Expiring Accounts and Recertification Account Maintenance Credential Management

Comparing Access Control Models

Role-Based Access Control Using Roles Based on Jobs and Functions Documenting Roles with a Matrix Establishing Access with Group-Based Privileges Rule-Based Access Control Discretionary Access Control STDs and DACLs The Owner Establishes Access Beware of Trojans Mandatory Access Control Labels and Lattice Establishing Access Attribute-Based Access Control

Chapter 2 Exam Topic Review

Chapter 2 Practice Questions

Chapter 2 Practice Question Answers

Chapter 3 Exploring Network Technologies and Tools

Reviewing Basic Networking Concepts

Basic Networking Protocols Implementing Protocols for Use Cases

`