Home > Computing and Information Technology > Computer certification > CompTIA Security+ SY0-501 Cert Guide: (Certification Guide)
10%
CompTIA Security+ SY0-501 Cert Guide: (Certification Guide)

CompTIA Security+ SY0-501 Cert Guide: (Certification Guide)

          
5
4
3
2
1

International Edition


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist

About the Book

Learn, prepare, and practice for CompTIA Security+ SY0-501 exam success with this CompTIA approved Cert Guide from Pearson IT Certification, a leader in IT certification learning and a CompTIA Authorized Platinum Partner. ·         Master CompTIA Security+ SY0-501 exam topics ·         Assess your knowledge with chapter-ending quizzes ·         Review key concepts with exam preparation tasks ·         Practice with realistic exam questions CompTIA Security+ SY0-501 Cert Guide is a best-of-breed exam study guide. Best-selling author and expert instructor David L. Prowse shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.   The book presents you with an organized test-preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending chapter review activities help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your final study plan.   The companion website contains the powerful Pearson Test Prep practice test software, complete with hundreds of exam-realistic questions. The assessment software offers you a wealth of customization options and reporting features, laying out a complete assessment of your knowledge to help you focus your study where it is needed most.   Well regarded for its level of detail, assessment features, and challenging review questions and exercises, this CompTIA approved study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time.   The CompTIA approved study guide helps you master all the topics on the Security+ exam, including ·         Core computer system security ·         OS hardening and virtualization ·         Application security ·         Network design elements ·         Networking ports, protocols, and threats ·         Network perimeter security ·         Physical security and authentication models ·         Access control ·         Vulnerability and risk assessment ·         Monitoring and auditing ·         Cryptography, including PKI ·         Redundancy and disaster recovery ·         Social Engineering ·         Policies and procedures  

Table of Contents:
Introduction xxiv Chapter 1 Introduction to Security 3 Foundation Topics 4 Security 101 4     The CIA of Computer Security 4     The Basics of Information Security 6 Think Like a Hacker 9 Threat Actor Types and Attributes 10 Chapter Review Activities 12     Review Key Topics 12     Define Key Terms 12     Review Questions 13     Answers and Explanations 15 Chapter 2 Computer Systems Security Part I 19 Foundation Topics 19 Malicious Software Types 19     Viruses 20     Worms 21     Trojan Horses 22     Ransomware 22     Spyware 23     Rootkits 24     Spam 25     Summary of Malware Threats 25 Delivery of Malware 26     Via Software, Messaging, and Media 26     Botnets and Zombies 28     Active Interception 28     Privilege Escalation 29     Backdoors 29     Logic Bombs 29 Preventing and Troubleshooting Malware 30     Preventing and Troubleshooting Viruses 31     Preventing and Troubleshooting Worms and Trojans 35     Preventing and Troubleshooting Spyware 35     Preventing and Troubleshooting Rootkits 38     Preventing and Troubleshooting Spam 38     You Can’t Save Every Computer from Malware! 40     Summary of Malware Prevention Techniques 40 Chapter Summary 41 Chapter Review Activities 42     Review Key Topics 42     Define Key Terms 42     Complete the Real-World Scenarios 43     Review Questions 43     Answers and Explanations 48 Chapter 3 Computer Systems Security Part II 53 Foundation Topics 53 Implementing Security Applications 53     Personal Software Firewalls 53     Host-Based Intrusion Detection Systems 55     Pop-Up Blockers 57     Data Loss Prevention Systems 59 Securing Computer Hardware and Peripherals 59     Securing the BIOS 60     Securing Storage Devices 62         Removable Storage 62         Network Attached Storage 63         Whole Disk Encryption 64         Hardware Security Modules 65     Securing Wireless Peripherals 66 Securing Mobile Devices 66     Malware 67     Botnet Activity 68     SIM Cloning and Carrier Unlocking 68     Wireless Attacks 69     Theft 70     Application Security 71     BYOD Concerns 74 Chapter Summary 78 Chapter Review Activities 79     Review Key Topics 79     Define Key Terms 79     Complete the Real-World Scenarios 80     Review Questions 80     Answers and Explanations 83 Chapter 4 OS Hardening and Virtualization 89 Foundation Topics 89 Hardening Operating Systems 89     Removing Unnecessary Applications and Services 90     Windows Update, Patches, and Hotfixes 97         Patches and Hotfixes 99         Patch Management 101     Group Policies, Security Templates, and Configuration Baselines 102     Hardening File Systems and Hard Drives 105 Virtualization Technology 109     Types of Virtualization and Their Purposes 110     Hypervisor 111     Securing Virtual Machines 113 Chapter Summary 115 Chapter Review Activities 117     Review Key Topics 117     Define Key Terms 118     Complete the Real-World Scenarios 118     Review Questions 118     Answers and Explanations 122 Chapter 5 Application Security 127 Foundation Topics 127 Securing the Browser 127     General Browser Security Procedures 129         Implement Policies 129         Train Your Users 133         Use a Proxy and Content Filter 133         Secure Against Malicious Code 135     Web Browser Concerns and Security Methods 135         Basic Browser Security 135         Cookies 136         LSOs 137         Add-ons 137         Advanced Browser Security 138 Securing Other Applications 140 Secure Programming 144     Software Development Life Cycle 145     Core SDLC and DevOps Principles 146     Programming Testing Methods 149         White-box and Black-box Testing 149         Compile-Time Errors Versus Runtime Errors 150         Input Validation 150         Static and Dynamic Code Analysis 151         Fuzz Testing 152     Programming Vulnerabilities and Attacks 152         Backdoors 153         Memory/Buffer Vulnerabilities 153         Arbitrary Code Execution/Remote Code Execution 155         XSS and XSRF 155         More Code Injection Examples 156         Directory Traversal 158         Zero Day Attack 158 Chapter Summary 160 Chapter Review Activities 161     Review Key Topics 161     Define Key Terms 162     Complete the Real-World Scenarios 162     Review Questions 162     Answers and Explanations 167 Chapter 6 Network Design Elements 173 Foundation Topics 173 Network Design 173     The OSI Model 173     Network Devices 175         Switch 175         Bridge 178         Router 178     Network Address Translation, and Private Versus Public IP 180     Network Zones and Interconnections 182         LAN Versus WAN 182         Internet 183         Demilitarized Zone (DMZ) 183         Intranets and Extranets 184     Network Access Control (NAC) 185     Subnetting 186     Virtual Local Area Network (VLAN) 188     Telephony 190         Modems 190         PBX Equipment 191         VoIP 191 Cloud Security and Server Defense 192     Cloud Computing 192     Cloud Security 195     Server Defense 198         File Servers 198         Network Controllers 199         E-mail Servers 199         Web Servers 200         FTP Server 202 Chapter Summary 203 Chapter Review Activities 205     Review Key Topics 205     Define Key Terms 205     Complete the Real-World Scenarios 205     Review Questions 206     Answers and Explanations 210 Chapter 7 Networking Protocols and Threats 217 Foundation Topics 217 Ports and Protocols 217     Port Ranges, Inbound Versus Outbound, and Common Ports 217     Protocols That Can Cause Anxiety on the Exam 225 Malicious Attacks 226     DoS 226     DDoS 229     Sinkholes and Blackholes 230     Spoofing 231     Session Hijacking 232     Replay 234     Null Sessions 235     Transitive Access and Client-Side Attacks 236     DNS Poisoning and Other DNS Attacks 236     ARP Poisoning 238     Summary of Network Attacks 238 Chapter Summary 242 Chapter Review Activities 243     Review Key Topics 243     Define Key Terms 243     Complete the Real-World Scenarios 243     Review Questions 244     Answers and Explanations 250 Chapter 8 Network Perimeter Security 255 Foundation Topics 256 Firewalls and Network Security 256     Firewalls 256     Proxy Servers 263     Honeypots and Honeynets 266     Data Loss Prevention (DLP) 267 NIDS Versus NIPS 268     NIDS 268     NIPS 269     Summary of NIDS Versus NIPS 271     The Protocol Analyzer’s Role in NIDS and NIPS 271     Unified Threat Management 272 Chapter Summary 273 Chapter Review Activities 274     Review Key Topics 274     Define Key Terms 274     Complete the Real-World Scenarios 274     Review Questions 275     Answers and Explanations 280 Chapter 9 Securing Network Media and Devices 285 Foundation Topics 285 Securing Wired Networks and Devices 285     Network Device Vulnerabilities 285         Default Accounts 286         Weak Passwords 286         Privilege Escalation 287         Back Doors 288         Network Attacks 289         Other Network Device Considerations 289     Cable Media Vulnerabilities 289         Interference 290         Crosstalk 291         Data Emanation 292         Tapping into Data and Conversations 293 Securing Wireless Networks 295     Wireless Access Point Vulnerabilities 295         The Administration Interface 295         SSID Broadcast 296         Rogue Access Points 296         Evil Twin 297         Weak Encryption 297         Wi-Fi Protected Setup 299         Ad Hoc Networks 299         VPN over Open Wireless 300     Wireless Access Point Security Strategies 300     Wireless Transmission Vulnerabilities 304     Bluetooth and Other Wireless Technology Vulnerabilities 305         Bluejacking 306         Bluesnarfing 306         RFID and NFC 307         More Wireless Technologies 308 Chapter Summary 310 Chapter Review Activities 312     Review Key Topics 312     Define Key Terms 312     Complete the Real-World Scenarios 312     Review Questions 313     Answers and Explanations 317 Chapter 10 Physical Security and Authentication Models 321 Foundation Topics 322 Physical Security 322     General Building and Server Room Security 323     Door Access 324     Biometric Readers 326 Authentication Models and Components 327     Authentication Models 327     Localized Authentication Technologies 329         802.1X and EAP 330         LDAP 333         Kerberos and Mutual Authentication 334         Remote Desktop Services 336     Remote Authentication Technologies 337         Remote Access Service 337         Virtual Private Networks 340         RADIUS Versus TACACS 343 Chapter Summary 345 Chapter Review Activities 346     Review Key Topics 346     Define Key Terms 347     Complete the Real-World Scenarios 347     Review Questions 347     Answers and Explanations 355 Chapter 11 Access Control Methods and Models 361 Foundation Topic 361 Access Control Models Defined 361     Discretionary Access Control 361     Mandatory Access Control 363     Role-Based Access Control (RBAC) 364     Attribute-based Access Control (ABAC) 365     Access Control Wise Practices 366 Rights, Permissions, and Policies 369     Users, Groups, and Permissions 369     Permission Inheritance and Propagation 374     Moving and Copying Folders and Files 376     Usernames and Passwords 376     Policies 379     User Account Control (UAC) 383 Chapter Summary 384 Chapter Review Activities 385     Review Key Topics 385     Define Key Terms 386     Complete the Real-World Scenarios 386     Review Questions 386     Answers and Explanations 392 Chapter 12 Vulnerability and Risk Assessment 397 Foundation Topics 397 Conducting Risk Assessments 397     Qualitative Risk Assessment 399     Quantitative Risk Assessment 400     Security Analysis Methodologies 402     Security Controls 404     Vulnerability Management 405         Penetration Testing 407         OVAL 408         Additional Vulnerabilities 409 Assessing Vulnerability with Security Tools 410     Network Mapping 411     Vulnerability Scanning 412     Network Sniffing 415     Password Analysis 417 Chapter Summary 420 Chapter Review Activities 421     Review Key Topics 421     Define Key Terms 422     Complete the Real-World Scenarios 422     Review Questions 422     Answers and Explanations 428 Chapter 13 Monitoring and Auditing 435 Foundation Topics 435 Monitoring Methodologies 435     Signature-Based Monitoring 435     Anomaly-Based Monitoring 436     Behavior-Based Monitoring 436 Using Tools to Monitor Systems and Networks 437     Performance Baselining 438     Protocol Analyzers 440         Wireshark 441     SNMP 443     Analytical Tools 445     Use Static and Dynamic Tools 447 Conducting Audits 448     Auditing Files 448     Logging 451     Log File Maintenance and Security 455     Auditing System Security Settings 457     SIEM 460 Chapter Summary 461 Chapter Review Activities 462     Review Key Topics 462     Define Key Terms 463     Complete the Real-World Scenarios 463     Review Questions 463     Answers and Explanations 470 Chapter 14 Encryption and Hashing Concepts 477 Foundation Topics 477 Cryptography Concepts 477     Symmetric Versus Asymmetric Key Algorithms 481         Symmetric Key Algorithms 481     Asymmetric Key Algorithms 483     Public Key Cryptography 483     Key Management 484     Steganography 485 Encryption Algorithms 486     DES and 3DES 486     AES 487     RC 488     Blowfish and Twofish 489     Summary of Symmetric Algorithms 489     RSA 490     Diffie-Hellman 491     Elliptic Curve 492     More Encryption Types 493         One-Time Pad 493         PGP 494         Pseudorandom Number Generators 495 Hashing Basics 496     Cryptographic Hash Functions 498         MD5 498         SHA 498         RIPEMD and HMAC 499     LANMAN, NTLM, and NTLMv2 500         LANMAN 500         NTLM and NTLMv2 501     Hashing Attacks 502         Pass the Hash 502         Happy Birthday! 503     Additional Password Hashing Concepts 503 Chapter Summary 505 Chapter Review Activities 507     Review Key Topics 507     Define Key Terms 507     Complete the Real-World Scenarios 508     Review Questions 508     Answers and Explanations 515 Chapter 15 PKI and Encryption Protocols 521 Foundation Topics 521 Public Key Infrastructure 521     Certificates 522         SSL Certificate Types 522         Single-Sided and Dual-Sided Certificates 523         Certificate Chain of Trust 523         Certificate Formats 523     Certificate Authorities 525     Web of Trust 529 Security Protocols 529     S/MIME 530     SSL/TLS 531     SSH 532     PPTP, L2TP, and IPsec 533         PPTP 533         L2TP 534         IPsec 534 Chapter Summary 535 Chapter Review Activities 536     Review Key Topics 536     Define Key Terms 536     Complete the Real-World Scenarios 537     Review Questions 537     Answers and Explanations 542 Chapter 16 Redundancy and Disaster Recovery 547 Foundation Topics 547 Redundancy Planning 547     Redundant Power 549     Redundant Power Supplies 551     Uninterruptible Power Supplies 551     Backup Generators 553     Redundant Data 555     Redundant Networking 558     Redundant Servers 560     Redundant Sites 561     Redundant People 562 Disaster Recovery Planning and Procedures 562     Data Backup 562     DR Planning 567 Chapter Summary 571 Chapter Review Activities 572     Review Key Topics 572     Define Key Terms 572     Complete the Real-World Scenarios 573     Review Questions 573     Answers and Explanations 577 Chapter 17 Social Engineering, User Education, and Facilities Security 583 Foundation Topics 583 Social Engineering 583     Pretexting 584     Malicious Insider 585     Diversion Theft 586     Phishing 586     Hoaxes 587     Shoulder Surfing 588     Eavesdropping 588     Dumpster Diving 588     Baiting 589     Piggybacking/Tailgating 589     Watering Hole Attack 589     Summary of Social Engineering Types 590 User Education 591 Facilities Security 593     Fire Suppression 594         Fire Extinguishers 594         Sprinkler Systems 595         Special Hazard Protection Systems 596     HVAC 597     Shielding 598     Vehicles 600 Chapter Summary 602 Chapter Review Activities 603     Review Key Topics 603     Define Key Terms 603     Complete the Real-World Scenarios 603     Review Questions 604     Answers and Explanations 608 Chapter 18 Policies and Procedures 613 Foundation Topics 614 Legislative and Organizational Policies 614     Data Sensitivity and Classification of Information 615     Personnel Security Policies 617         Privacy Policies 618         Acceptable Use 618         Change Management 619         Separation of Duties/Job Rotation 619         Mandatory Vacations 620         Onboarding and Offboarding 620         Due Diligence 621         Due Care 621         Due Process 621         User Education and Awareness Training 621         Summary of Personnel Security Policies 622     How to Deal with Vendors 623     How to Dispose of Computers and Other IT Equipment Securely 625 Incident Response Procedures 627 IT Security Frameworks 633 Chapter Summary 635 Chapter Review Activities 636     Review Key Topics 636     Define Key Terms 636     Complete the Real-World Scenarios 637     Review Questions 637     Answers and Explanations 641 Chapter 19 Taking the Real Exam 647 Getting Ready and the Exam Preparation Checklist 647 Tips for Taking the Real Exam 651 Beyond the CompTIA Security+ Certification 655 Practice Exam 1: SY0-501 657 Answers to Practice Exam 1 679 Answers with Explanations 680 Glossary 718     Elements Available Online View Recommended Resources Real-World Scenarios     9780789758996   TOC   9/19/2017  


Best Sellers


Product Details
  • ISBN-13: 9780134780948
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Pearson It Certification
  • Language: English
  • Series Title: Certification Guide
  • ISBN-10: 0134780949
  • Publisher Date: 18 Oct 2017
  • Binding: Digital download
  • No of Pages: 848


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
CompTIA Security+ SY0-501 Cert Guide: (Certification Guide)
Pearson Education (US) -
CompTIA Security+ SY0-501 Cert Guide: (Certification Guide)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

CompTIA Security+ SY0-501 Cert Guide: (Certification Guide)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA