close menu
Bookswagon-24x7 online bookstore
close menu
My Account
43%
CompTIA Security+ Study Guide: Exam SY0–501

CompTIA Security+ Study Guide: Exam SY0–501

4.8       |  8 Reviews 
5
4
3
2
1

Out of Stock


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Notify me when this book is in stock
Add to Wishlist

About the Book

Some copies of CompTIA Security+ Study Guide: Exam SY0-501 (9781119416876) were printed without discount exam vouchers in the front of the books. If you did not receive a discount exam voucher with your book, please visit http://media.wiley.com/product_ancillary/5X/11194168/DOWNLOAD/CompTIA_Coupon.pdf to download one. Expert preparation covering 100% of Security+ exam SY0-501 objectives CompTIA Security+ Study Guide, Seventh Edition offers invaluable preparation for Exam SY0-501. Written by an expert author team, this book covers 100% of the exam objectives with clear, concise explanation. You'll learn how to handle threats, attacks, and vulnerabilities using industry-standard tools and technologies, while understanding the role of architecture and design. From everyday tasks like identity and access management to complex topics like risk management and cryptography, this study guide helps you consolidate your knowledge base in preparation for the Security+ exam. Practical examples illustrate how these processes play out in real-world scenarios, allowing you to immediately translate essential concepts to on-the-job application. You also gain access to the Sybex online learning environment, which features a robust toolkit for more thorough prep: flashcards, glossary of key terms, practice questions, and a pre-assessment exam equip you with everything you need to enter the exam confident in your skill set. This study guide is approved and endorsed by CompTIA, and has been fully updated to align with the latest version of the exam. Master essential security technologies, tools, and tasks Understand how Security+ concepts are applied in the real world Study on the go with electronic flashcards and more Test your knowledge along the way with hundreds of practice questions To an employer, the CompTIA Security+ certification proves that you have the knowledge base and skill set to secure applications, devices, and networks; analyze and respond to threats; participate in risk mitigation, and so much more. As data threats loom larger every day, the demand for qualified security professionals will only continue to grow. If you're ready to take the first step toward a rewarding career, CompTIA Security+ Study Guide, Seventh Edition is the ideal companion for thorough exam preparation.

Table of Contents:
Introduction xxiv Assessment Test xli Chapter 1 Managing Risk 1 Risk Terminology 3 Threat Assessment 6 Risk Assessment 6 Computing Risk Assessment 7 Assessing Privacy 12 Acting on Your Risk Assessment 12 Risks Associated with Cloud Computing 15 Risks Associated with Virtualization 16 Developing Policies, Standards, and Guidelines 17 Implementing Policies 17 Understanding Control Types and False Positives/Negatives 26 Risk Management Best Practices 28 Change Management 38 Summary 38 Exam Essentials 38 Review Questions 40 Chapter 2 Monitoring and Diagnosing Networks 45 Monitoring and Diagnosing Networks Terminology 47 Frameworks, Best Practices, and Configuration Guides 48 Industry-Standard Frameworks and Reference Architectures 48 National Institute of Standards and Technology (NIST) 51 Benchmarks/Secure Configuration Guides 54 Secure Network Architecture Concepts 57 Zones 57 Tunneling/VPN 63 Placing Security Devices 64 SDN 67 IDS vs. IPS 67 Secure Systems Design 68 Hardware and Firmware Security 68 Operating Systems 69 Peripherals 73 Secure Staging Deployment Concepts 73 Summary 74 Exam Essentials 74 Review Questions 76 Chapter 3 Understanding Devices and Infrastructure 79 Infrastructure Terminology 81 Designing with Security in Mind 84 Firewalls 84 VPNs and VPN Concentrators 89 Intrusion Detection Systems 91 Router 104 Switch 106 Proxy 107 Load Balancer 108 Access Point 108 SIEM 111 DLP 111 Network Access Control (NAC) 112 Mail Gateway 112 Bridge 113 SSL/TLS Accelerators 113 SSL Decryptors 113 Media Gateway 114 Hardware Security Module 114 Summary 115 Exam Essentials 115 Review Questions 116 Chapter 4 Identity and Access Management 121 Using Tools to Assess Your Network 125 Protocol Analyzer 125 Network Scanners 127 Password Cracker 130 Vulnerability Scanners 131 Command-Line Tools 135 Additional Tools 142 Troubleshooting Common Security Issues 143 Access Issues 144 Configuration Issues 145 Security Technologies 147 Intrusion Detection Systems 147 Antimalware 148 Firewalls and Related Devices 149 Other Systems 150 Identity and Access Management Concepts 151 Identification vs. Authentication 151 Authentication (Single Factor) and Authorization 152 Multifactor Authentication 153 Biometrics 153 Federations 154 Potential Authentication and Access Problems 154 LDAP 155 PAP, SPAP, and CHAP 155 Kerberos 156 Working with RADIUS 157 TACACS, TACACS+, XTACACS 158 OATH 158 One-Time Passwords 158 SAML 159 Install and Configure Identity and Access Services 159 Mandatory Access Control 159 Discretionary Access Control 160 Role-Based Access Control 160 Rule-Based Access Control 160 ABAC 161 Smartcards 161 Tokens 162 File and Database Security 163 Summary 163 Exam Essentials 164 Review Questions 165 Chapter 5 Wireless Network Threats 169 Wireless Threat Terminology 170 Wireless Vulnerabilities to Know 171 Replay 172 Rogue APs and Evil Twins 174 Jamming 174 WPS 175 Bluejacking 175 Bluesnarfing 175 NFC and RFID 176 Disassociation 176 Wireless Commonsense 176 Wireless Attack Analogy 176 Summary 177 Exam Essentials 178 Review Questions 179 Chapter 6 Securing the Cloud 183 Cloud-Related Terminology 184 Working with Cloud Computing 186 Software as a Service (SaaS) 186 Platform as a Service (PaaS) 186 Infrastructure as a Service (IaaS) 188 Private Cloud 189 Public Cloud 189 Community Cloud 189 Hybrid Cloud 190 Working with Virtualization 190 Understanding Hypervisors 190 Understanding Containers and Application Cells 192 VDI/VDE 192 On-Premise vs. Hosted vs. Cloud 192 VM Escape Protection 193 VM Sprawl Avoidance 193 Security and the Cloud 194 Cloud Access Security Brokers 195 Cloud Storage 195 Security as a Service 195 Summary 196 Exam Essentials 196 Review Questions 197 Chapter 7 Host, Data, and Application Security 201 Threat Actors and Attributes 204 Script Kiddies 205 Hacktivist 206 Organized Crime 207 Nation-States/APT 207 Insiders 207 Competitors 207 Use of Open Source Intelligence 208 Types of Vulnerabilities 211 Configuration Issues 211 User Issues 212 Zero-Day Exploits 212 Other Issues 214 Embedded Systems Security 214 Application Vulnerabilities 216 Input Vulnerabilities 216 Memory Vulnerabilities 217 Secure Programming 217 Programming Models 218 Software Testing 218 Specific Types of Testing 219 Secure Coding Standards 220 Application Configuration Baselining 221 Operating System Patch Management 221 Application Patch Management 222 Other Application Security Issues 222 Databases and Technologies 222 Database Security 225 Secure Configurations 225 Code Issues 225 Summary 226 Exam Essentials 226 Review Questions 227 Chapter 8 Cryptography 231 An Overview of Cryptography 234 Historical Cryptography 234 Modern Cryptography 238 Working with Symmetric Algorithms 239 Working with Asymmetric Algorithms 243 Cryptography Concepts 246 Hashing Algorithms 247 Rainbow Tables and Salt 249 Key Stretching 249 Cryptanalysis Methods 250 Wi-Fi Encryption 252 Using Cryptographic Systems 254 Confidentiality and Strength 254 Integrity 254 When to Encrypt 255 Digital Signatures 256 Authentication 257 Nonrepudiation 257 Key Features 258 Understanding Cryptography Standards and Protocols 258 The Origins of Encryption Standards 259 Public Key Infrastructure X.509/Public Key Cryptography Standards 261 X.509 262 Public Key Infrastructure 264 Pretty Good Privacy 264 SSL and TLS 266 Using Public Key Infrastructure 269 Hardware-Based Encryption Devices 269 Data Encryption 269 Authentication 270 Summary 271 Exam Essentials 271 Review Questions 273 Chapter 9 Threats, Attacks, and Vulnerabilities 277 Threat and Attack Terminology 278 Living in a World of Viruses 282 Symptoms of a Virus Infection 282 How Viruses Work 283 Types of Viruses 284 Managing Spam to Avoid Viruses 286 Antivirus Software 287 Malware and Crypto-Malware 288 Understanding Various Types of Application/Service Attacks 296 Identifying Denial-of-Service and Distributed Denial-of-Service Attacks 296 Man-in-the-Middle Attacks 298 Buffer Overflow 299 Injection 299 Cross-Site Scripting and Request Forgery 302 Privilege Escalation 303 ARP Poisoning 304 Amplification 304 DNS Poisoning 304 Domain Hijacking 304 Man-in-the-Browser 305 Zero-Day Exploits 305 Replay Attacks 305 Pass the Hash 306 Hijacking and Related Attacks 306 Driver Manipulation 307 MAC and IP Spoofing Attacks 308 Summary 309 Exam Essentials 309 Review Questions 311 Chapter 10 Social Engineering and Other Foes 315 Social Engineering and Physical Security Terminology 316 Understanding Social Engineering 318 Types of Social Engineering Attacks 319 What Motivates an Attack? 325 The Principles Behind Social Engineering 326 Social Engineering Attack Examples 327 Understanding Physical Security 330 Lighting 331 Signs 331 Fencing, Gates, and Cages 332 Security Guards 333 Alarms 333 Safe 334 Secure Cabinets and Enclosures 334 Protected Distribution 335 Protected Cabling 336 Airgap 336 Mantrap 336 Faraday Cage 337 Lock Types 337 Biometrics 338 Barricades/Bollards 339 Tokens/Cards 339 Environmental Controls 339 Cable Locks 345 Screen Filters 346 Cameras 346 Motion Detection 347 Logs 347 Infrared Detection 348 Key Management 348 Various Control Types 348 An Analogy of Control Types 349 Data Security and Privacy Practices 350 Data Destruction and Media Sanitation 350 Data Sensitivity Labeling and Handling 352 Data Roles 355 Data Retention 355 Legal and Compliance 356 Summary 356 Exam Essentials 356 Review Questions 358 Chapter 11 Security Administration 363 Connection Types 365 Cellular 365 Bluetooth 365 Wi-Fi 366 Infrared 368 SATCOM 369 Mobile Devices 369 BYOD Issues 371 Enforcement 373 Account Management Concepts 374 Account Types 375 General Concepts 376 Summary 378 Exam Essentials 378 Review Questions 379 Chapter 12 Disaster Recovery and Incident Response 383 Disaster and Incident Related Terminology 385 Penetration Testing 387 What Should You Test? 387 Vulnerability Scanning 388 Issues Associated with Business Continuity 389 Types of Storage Mechanisms 390 Crafting a Disaster-Recovery Plan 392 Incident Response Procedures 403 Understanding Incident Response 404 Tabletop Exercises 412 Summary 412 Exam Essentials 413 Review Questions 414 Appendix Answers to Review Questions 419 Chapter 1: Managing Risk 420 Chapter 2: Monitoring and Diagnosing Networks 421 Chapter 3: Understanding Devices and Infrastructure 422 Chapter 4: Identity and Access Management 423 Chapter 5: Wireless Network Threats 425 Chapter 6: Securing the Cloud 426 Chapter 7: Host, Data, and Application Security 427 Chapter 8: Cryptography 428 Chapter 9: Threats, Attacks, and Vulnerabilities 429 Chapter 10: Social Engineering and Other Foes 430 Chapter 11: Security Administration 431 Chapter 12: Disaster Recovery and Incident Response 432 Index 435 Table of Exercises Exercise 1.1 Risk Assessment Computations 8 Exercise 3.1 Verifying the Presence of a TPM Chip in Windows 114 Exercise 5.1 Configuring a Wireless Connection Not Broadcasting an SSID 172 Exercise 8.1 Encrypting a Filesystem in Linux 238 Exercise 8.2 TLS Settings in Windows Server 2016 268 Exercise 9.1 Viewing Running Processes on a Windows-Based Machine 290 Exercise 9.2 Viewing Running Processes on a Linux-Based Machine 291 Exercise 10.1 Test Social Engineering 328 Exercise 10.2 Security Zones in the Physical Environment 347 Exercise 12.1 Creating a Backup in SUSE Linux 396


Best Seller

| | See All


Product Details
  • ISBN-13: 9781119416876
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: John Wiley & Sons Inc
  • Edition: 7th Edition
  • Language: English
  • Returnable: N
  • Sub Title: Exam SY0–501
  • Width: 189 mm
  • ISBN-10: 1119416876
  • Publisher Date: 23 Oct 2017
  • Binding: Paperback
  • Height: 233 mm
  • No of Pages: 528
  • Spine Width: 25 mm
  • Weight: 864 gr


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

4.8       |  8 Reviews 
out of (%) reviewers recommend this product
Top Reviews
Rating Snapshot
Select a row below to filter reviews.
5
4
3
2
1
Average Customer Ratings
4.8       |  8 Reviews 
00 of 0 Reviews
Sort by :
Active Filters

00 of 0 Reviews
SEARCH RESULTS
1–2 of 2 Reviews
    BoxerLover2 - 5 Days ago
    A Thrilling But Totally Believable Murder Mystery

    Read this in one evening. I had planned to do other things with my day, but it was impossible to put down. Every time I tried, I was drawn back to it in less than 5 minutes. I sobbed my eyes out the entire last 100 pages. Highly recommend!

    BoxerLover2 - 5 Days ago
    A Thrilling But Totally Believable Murder Mystery

    Read this in one evening. I had planned to do other things with my day, but it was impossible to put down. Every time I tried, I was drawn back to it in less than 5 minutes. I sobbed my eyes out the entire last 100 pages. Highly recommend!


Sample text
Photo of
    Media Viewer

    Sample text
    Reviews
    Reader Type:
    BoxerLover2
    00 of 0 review

    Your review was submitted!
    CompTIA Security+ Study Guide: Exam SY0–501
    John Wiley & Sons Inc -
    CompTIA Security+ Study Guide: Exam SY0–501
    Writing guidlines
    We want to publish your review, so please:
    • keep your review on the product. Review's that defame author's character will be rejected.
    • Keep your review focused on the product.
    • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
    • Refrain from mentioning competitors or the specific price you paid for the product.
    • Do not include any personally identifiable information, such as full names.

    CompTIA Security+ Study Guide: Exam SY0–501

    Required fields are marked with *

    Review Title*
    Review
      Add Photo Add up to 6 photos
      Would you recommend this product to a friend?
      Tag this Book
      Read more
      Does your review contain spoilers?
      What type of reader best describes you?
      I agree to the terms & conditions
      You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

      CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

      These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


      By submitting any content to Bookswagon, you guarantee that:
      • You are the sole author and owner of the intellectual property rights in the content;
      • All "moral rights" that you may have in such content have been voluntarily waived by you;
      • All content that you post is accurate;
      • You are at least 13 years old;
      • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
      You further agree that you may not submit any content:
      • That is known by you to be false, inaccurate or misleading;
      • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
      • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
      • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
      • For which you were compensated or granted any consideration by any unapproved third party;
      • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
      • That contains any computer viruses, worms or other potentially damaging computer programs or files.
      You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


      For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


      All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

      Accept

      New Arrivals

      | | See All


      Inspired by your browsing history


      Your review has been submitted!

      You've already reviewed this product!
      ASK VIDYA