48%
Security Fundamentals

Security Fundamentals

          
5
4
3
2
1

International Edition


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist

About the Book

A Sybex guide to Windows Security concepts, perfect for IT beginners Security is one of the most important components to every company’s computer network. That’s why the Security Fundamentals MTA Certification is so highly sought after. Filling IT positions is a top problem in today’s businesses, so this certification could be your first step toward a stable and lucrative IT career. Security Fundamentals is your guide to developing a strong foundational understanding of Windows security, so you can take your IT career to the next level and feel confident going into the certification exam. Security Fundamentals features approachable discussion of core security concepts and topics, and includes additional learning tutorials and tools. This book covers everything you need to know about security layers, authentication, authorization, security policies, and protecting your server and client. Each chapter closes with a quiz so you can test your knowledge before moving to the next section. Learn everything you need for the Security Fundamentals MTA Certification Understand core security principles, including security layers and network security Learn essential concepts in physical security, internet security, and wireless security Identify the different types of hardware firewalls and their characteristics Test your knowledge and practice for the exam with quiz questions in every chapter IT professionals looking to understand more about networking will gain the knowledge to effectively secure a client and server, and to confidently explain basic security concepts. Thanks to the tools and tips in this Sybex title, you will be able to apply your new IT security skills in real world situations and on exam day.

Table of Contents:
Introduction xix Lesson 1 Understanding Security Layers 1 Introducing Core Security Principles 3 Understanding Confidentiality 4 Understanding Integrity 4 Understanding Availability 5 Understanding the Principle of Least Privilege 7 Understanding Separation of Duties 9 Understanding an Attack Surface 10 Performing an Attack Surface Analysis 10 Understanding Social Engineering 12 Linking Cost with Security 13 Understanding Physical Security as the First Line of Defense 14 Understanding Site Security 14 Understanding Computer Security 19 Performing Threat Modeling 23 Skill Summary 25 Knowledge Assessment 27 Multiple Choice 27 Fill in the Blank 29 Matching and Identification 29 Build List 30 Business Case Scenarios 30 Scenario 1-1: Designing a Physical Security Solution 30 Scenario 1-2: Securing a Mobile Device 30 Scenario 1-3: Understanding Confidentiality, Integrity, and Availability 30 Scenario 1-4: Managing Social Engineering 30 Lesson 2 Understanding Authentication, Authorization, and Accounting 33 Starting Security with Authentication 35 Configuring Multifactor Authentication 36 Authentication Based on What a User Owns or Possesses 38 Authentication Based on a User’s Physical Traits 38 Introducing RADIUS and TACACS+ 39 Running Programs as an Administrator 40 Introducing Directory Services with Active Directory 41 Understanding Domain Controllers 42 Understanding NTLM 43 Understanding Kerberos 44 Using Organizational Units 44 Understanding Objects 46 Using Groups 49 Understanding Web Server Authentication 52 Comparing Rights and Permissions 52 Understanding NTFS 54 Using NTFS Permissions 54 Understanding Effective NTFS Permissions 56 Understanding Inheritance 60 Copying and Moving Files 62 Using Folder and File Owners 62 Sharing Drives and Folders 64 Share a Folder 64 Understanding Special Shares and Administrative Shares 66 Introducing the Registry 67 Access Registry Permissions 70 Using Encryption to Protect Data 70 Types of Encryption 71 Introducing Public Key Infrastructure (PKI) 72 Encrypting Email 78 Encrypting Files with EFS 79 Encrypting Disks in Windows 82 Understanding IPsec 87 Encrypting with VPN Technology 89 Introducing Smart Cards 92 Set Up a Virtual TPM Smart Card Environment 93 Create a Certificate Template 93 Create a TPM Virtual Smart Card 94 Enroll for the Certificate on the TPM Virtual Smart Card 94 Configuring Biometrics, Windows Hello, and Microsoft Passport 95 Set Up Windows Hello Facial Recognition 96 Set Up Windows Hello Fingerprint Reader 96 Using Auditing to Complete the Security Picture 97 Audit Files and Folders 100 Skill Summary 101 Knowledge Assessment 105 Multiple Choice 105 Fill in the Blank 107 Business Case Scenarios 108 Scenario 2-1: Understanding Biometrics 108 Scenario 2-2: Limiting Auditing 108 Scenario 2-3: Assigning NTFS Permissions 108 Scenario 2-4: Using EFS 108 Lesson 3 Understanding Security Policies 111 Using Password Policies to Enhance Security 113 Using Password Complexity to Make a Stronger Password 113 Using Account Lockout to Prevent Hacking 114 Examining Password Length 115 Using Password History to Enforce Security 115 Setting Time Between Password Changes 116 Using Password Group Policies to Enforce Password Security 118 Configuring and Applying Password Settings Objects 119 Establishing Password Procedures 121 Understanding Common Attack Methods 122 Protecting Domain User Account Passwords 125 Install Hyper-V and Isolated User Mode on Windows 10 126 Enable Device Guard and Credential Guard 126 Skill Summary 127 Knowledge Assessment 129 Multiple Choice 129 Fill in the Blank 131 Business Case Scenarios 131 Scenario 3-1: Understanding Long Passwords 131 Scenario 3-2: Using Keys and Passwords 132 Scenario 3-3: Managing User Accounts 132 Scenario 3-4: Configuring a Local Security Policy 132 Lesson 4 Understanding Network Security 133 Using Dedicated Firewalls to Protect a Network 135 Understanding the OSI Model 136 Types of Hardware Firewalls and Their Characteristics 140 Understanding When to Use a Hardware Firewall Instead of a Software Firewall 143 Understanding Stateful Inspection and Stateless Inspection 145 Using Isolation to Protect the Network 146 Understanding VLANs 146 Understanding Routing 148 Understanding Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) 154 Understanding Honeypots 155 Understanding DMZ 156 Understanding NAT 159 Understanding VPN 160 Understanding Other VPN Protocols 162 Understanding Server and Domain Isolation 164 Protecting Data with Protocol Security 165 Understanding Tunneling 166 Understanding DNS Security Extensions (DNSSEC) 167 Understanding Protocol Spoofing 168 Understanding Network Sniffing 168 Understanding Common Attack Methods 170 Understanding Denial-of-Service (DoS) Attacks 173 Securing the Wireless Network 175 Understanding Service Set IDentifier (SSID) 176 Understanding Keys 176 Understanding MAC Filters 178 Understanding the Advantages and Disadvantages of Specific Security Types 178 Skill Summary 179 Knowledge Assessment 182 Multiple Choice 182 Fill in the Blank 184 Business Case Scenarios 185 Scenario 4-1: Using Windows Firewall 185 Scenario 4-2: Using a Routing Table 185 Scenario 4-3: Using Ports 185 Scenario 4-4: Accessing and Configuring Wireless Settings 185 Lesson 5 Protecting the Server and Client 187 Protecting the Client Computer 189 Protecting Your Computer from Malware 189 Configuring Windows Updates 196 Understanding User Account Control (UAC) 200 Using Windows Firewall 203 Using Offline Files 207 Locking Down a Client Computer 207 Managing Client Security Using Windows Defender 208 Remove a Quarantined Item 210 Schedule a Windows Defender Scan 212 Protecting Your Email 213 Managing Spam 214 Email Spoofing 215 Relaying Email 216 Securing Internet Explorer 216 Understanding Cookies and Privacy Settings 216 Using Content Zones 219 Understanding Phishing and Pharming 222 Understanding Secure Sockets Layer (SSL) and Certificates 223 Configuring Microsoft Edge 223 Protecting Your Server 225 Separating Services 225 Using a Read-Only Domain Controller (RODC) 226 Hardening Servers 226 Understanding Secure Dynamic DNS 227 Using Security Baselines 227 Using Security Templates 228 Using Security Compliance Manager 232 Locking Down Devices to Run Only Trusted Applications 235 Access AppLocker 236 Create and Test an AppLocker Rule 238 Export the Local Policy 240 Import the Local Policy 240 Managing Windows Store Apps 241 Configuring the Windows Store 242 Implementing Windows Store Apps 244 Implementing Windows Store for Business 246 Skill Summary 248 Knowledge Assessment 251 Multiple Choice 251 Fill in the Blank 254 Business Case Scenarios 255 Scenario 5-1: Enforcing Physical Security 255 Scenario 5-2: Programming Backdoors 255 Scenario 5-3: Configuring a Windows Defender Quarantine 255 Scenario 5-4: Protecting Your Resources 255 Scenario 5-5: Reviewing Windows Updates 255 Appendix Answer Key 257 Lesson 1: Understanding Security Layers 258 Answers to Knowledge Assessment 258 Answers to Business Case Scenarios 259 Lesson 2: Understanding Authentication, Authorization, and Accounting 260 Answers to Knowledge Assessment 260 Answers to Business Case Scenarios 261 Lesson 3: Understanding Security Policies 263 Answers to Knowledge Assessment 263 Answers to Business Case Scenarios 264 Lesson 4: Understanding Network Security 266 Answers to Knowledge Assessment 266 Answers to Business Case Scenarios 267 Lesson 5: Protecting the Server and Client 270 Answers to Knowledge Assessment 270 Answers to Business Case Scenarios 271 Index 273


Best Sellers


Product Details
  • ISBN-13: 9781119650669
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: Sybex Inc.,U.S.
  • Height: 234 mm
  • No of Pages: 304
  • Spine Width: 23 mm
  • Width: 188 mm
  • ISBN-10: 1119650666
  • Publisher Date: 12 Dec 2019
  • Binding: Paperback
  • Language: English
  • Returnable: N
  • Weight: 454 gr


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Security Fundamentals
John Wiley & Sons Inc -
Security Fundamentals
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Security Fundamentals

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA