You are previewing CompTIA Security+ SY0-401 In Depth.
O'Reilly logo
CompTIA Security+ SY0-401 In Depth

Book Description

COMPTIA SECURITY+ SY0-401 IN DEPTH will prepare you to pass CompTIA's new Security+ certification exam and earn this important credential in the field of computer security. This book offers in-depth coverage of all relevant topics, from handling malware to advanced cryptography, wireless and mobile security, and much more. Using the proven In Depth certification training method, this comprehensive, up-to-date, user-friendly test-prep guide covers exam objectives for the new Security+ SY0-401 certification exam; features end-of-chapter quizzes to test your mastery of each new skill you're learning; maps completely to the Security+ SY0-401 exam objectives; and includes a full glossary and helpful appendixes. Computer and network security is a crucially important and ever-growing field, and IT professionals must keep up with the latest challenges and technologies. The CompTIA Security+ SY0-401 certification exam validates the knowledge and best practices required of professionals responsible for securing computer networks and managing risk. The coaching and test-prep resources contained in COMPTIA SECURITY+ SY0-401 IN DEPTH will give you the skills and confidence you'll need to succeed on exam day.

Table of Contents

  1. Title Page
  2. Copyright Page
  3. Brief Contents
  4. Table of Contents
  5. INTRODUCTION
  6. CHAPTER 1 Introduction to Security
    1. Challenges of Securing Information
      1. Today’s Security Attacks
      2. Difficulties in Defending Against Attacks
    2. What Is Information Security?
      1. Understanding Security
      2. Defining Information Security
      3. Information Security Terminology
      4. Understanding the Importance of Information Security
    3. Who Are the Attackers?
      1. Cybercriminals
      2. Script Kiddies
      3. Brokers
      4. Insiders
      5. Cyberterrorists
      6. Hactivists
      7. State-Sponsored Attackers
    4. Attacks and Defenses
      1. Steps of an Attack
      2. Defenses Against Attacks
    5. Chapter Summary
    6. Key Terms
    7. Review Questions
  7. PART I Threats
    1. CHAPTER 2 Malware and Social Engineering Attacks
      1. Attacks Using Malware
        1. Circulation/Infection
        2. Concealment
        3. Payload Capabilities
      2. Social Engineering Attacks
        1. Psychological Approaches
        2. Physical Procedures
      3. Chapter Summary
      4. Key Terms
      5. Review Questions
    2. CHAPTER 3 Application and Networking-Based Attacks
      1. Application Attacks
        1. Server-Side Web Application Attacks
        2. Client-Side Application Attacks
        3. Impartial Overflow Attacks
      2. Networking-Based Attacks
        1. Denial of Service (DoS)
        2. Interception
        3. Poisoning
        4. Attacks on Access Rights
      3. Chapter Summary
      4. Key Terms
      5. Review Questions
  8. PART II Application, Data, and Host Security
    1. CHAPTER 4 Host, Application, and Data Security
      1. Securing the Host
        1. Securing Devices
        2. Securing the Operating System Software
        3. Securing with Antimalware
      2. Securing Static Environments
      3. Application Security
        1. Application Development Security
        2. Application Hardening and Patch Management
      4. Securing Data
      5. Chapter Summary
      6. Key Terms
      7. Review Questions
  9. PART III Cryptography
    1. CHAPTER 5 Basic Cryptography
      1. Defining Cryptography
        1. What Is Cryptography?
        2. Cryptography and Security
      2. Cryptographic Algorithms
        1. Hash Algorithms
        2. Symmetric Cryptographic Algorithms
        3. Asymmetric Cryptographic Algorithms
      3. Using Cryptography
        1. Encryption Through Software
        2. Hardware Encryption
      4. Chapter Summary
      5. Key Terms
      6. Review Questions
    2. CHAPTER 6 Advanced Cryptography
      1. Digital Certificates
        1. Defining Digital Certificates
        2. Managing Digital Certificates
        3. Types of Digital Certificates
      2. Public Key Infrastructure (PKI)
        1. What Is Public Key Infrastructure (PKI)?
        2. Public Key Cryptography Standards (PKCS)
        3. Trust Models
        4. Managing PKI
      3. Key Management
        1. Key Storage
        2. Key Usage
        3. Key Handling Procedures
      4. Cryptographic Transport Protocols
        1. Secure Sockets Layer (SSL)
        2. Transport Layer Security (TLS)
        3. Secure Shell (SSH)
        4. Hypertext Transport Protocol Secure (HTTPS)
        5. IP Security (IPsec)
      5. Chapter Summary
      6. Key Terms
      7. Review Questions
  10. PART IV Network Security
    1. CHAPTER 7 Network Security Fundamentals
      1. Security Through Network Devices
        1. Standard Network Devices
        2. Network Security Hardware
      2. Security Through Network Technologies
        1. Network Address Translation (NAT)
        2. Network Access Control (NAC)
      3. Security Through Network Design Elements
        1. Demilitarized Zone (DMZ)
        2. Subnetting
        3. Virtual LANs (VLANs)
        4. Remote Access
      4. Chapter Summary
      5. Key Terms
      6. Review Questions
    2. CHAPTER 8 Administering a Secure Network
      1. Common Network Protocols
        1. Internet Control Message Protocol (ICMP)
        2. Simple Network Management Protocol (SNMP)
        3. Domain Name System (DNS)
        4. File Transfer Protocols
        5. Storage Protocols
        6. NetBIOS
        7. Telnet
        8. IPv6
      2. Network Administration Principles
        1. Device Security
        2. Monitoring and Analyzing Logs
        3. Network Design Management
        4. Port Security
      3. Securing Network Applications and Platforms
        1. IP Telephony
        2. Virtualization
        3. Cloud Computing
      4. Chapter Summary
      5. Key Terms
      6. Review Questions
  11. PART V Mobile Security
    1. CHAPTER 9 Wireless Network Security
      1. Wireless Attacks
        1. Bluetooth Attacks
        2. Near Field Communication (NFC) Attacks
        3. Wireless Local Area Network (WLAN) Attacks
      2. Vulnerabilities of IEEE Wireless Security
        1. Wired Equivalent Privacy (WEP)
        2. Wi-Fi Protected Setup (WPS)
        3. MAC Address Filtering
        4. Disabling SSID Broadcasts
      3. Wireless Security Solutions
        1. Wi-Fi Protected Access (WPA)
        2. Wi-Fi Protected Access 2 (WPA2)
        3. Additional Wireless Security Protections
      4. Chapter Summary
      5. Key Terms
      6. Review Questions
    2. CHAPTER 10 Mobile Device Security
      1. Types of Mobile Devices
        1. Portable Computers
        2. Tablets
        3. Smartphones
        4. Wearable Technology
        5. Legacy Devices
        6. Mobile Device Removable Storage
      2. Mobile Device Risks
        1. Limited Physical Security
        2. Connecting to Public Networks
        3. Location Tracking
        4. Installing Unsecured Applications
        5. Accessing Untrusted Content
        6. Bring Your Own Device (BYOD) Risks
      3. Securing Mobile Devices
        1. Device Setup
        2. Device and App Management
        3. Device Loss or Theft
      4. Mobile Device App Security
      5. BYOD Security
      6. Chapter Summary
      7. Key Terms
      8. Review Questions
  12. PART VI Access Control and Identity Management
    1. CHAPTER 11 Access Control Fundamentals
      1. What Is Access Control?
        1. Access Control Terminology
        2. Access Control Models
        3. Best Practices for Access Control
      2. Implementing Access Control
        1. Access Control Lists (ACLs)
        2. Group Policies
        3. Account Restrictions
      3. Authentication Services
        1. RADIUS
        2. Kerberos
        3. Terminal Access Control Access Control System (TACACS)
        4. Lightweight Directory Access Protocol (LDAP)
        5. Security Assertion Markup Language (SAML)
      4. Chapter Summary
      5. Key Terms
      6. Review Questions
    2. CHAPTER 12 Authentication and Account Management
      1. Authentication Credentials
        1. What You Know: Passwords
        2. What You Have: Tokens, Cards, and Cell Phones
        3. What You Are: Biometrics
        4. What You Do: Behavioral Biometrics
        5. Where You Are: Geolocation
      2. Single Sign-On
        1. Microsoft Account
        2. OpenID
        3. Open Authorization (OAuth)
      3. Account Management
      4. Chapter Summary
      5. Key Terms
      6. Review Questions
  13. PART VII Compliance and Operational Security
    1. CHAPTER 13 Business Continuity
      1. What Is Business Continuity?
      2. Disaster Recovery
        1. Disaster Recovery Plan (DRP)
        2. Redundancy and Fault Tolerance
        3. Data Backups
      3. Environmental Controls
        1. Fire Suppression
        2. Electromagnetic Interference (EMI) Shielding
        3. HVAC
      4. Incident Response
        1. Forensics
        2. Incident Response Procedures
      5. Chapter Summary
      6. Key Terms
      7. Review Questions
    2. CHAPTER 14 Risk Mitigation
      1. Controlling Risk
        1. Privilege Management
        2. Change Management
        3. Incident Management
        4. Risk Calculation
      2. Reducing Risk Through Policies
        1. What Is a Security Policy?
        2. Balancing Trust and Control
        3. Designing a Security Policy
        4. Types of Security Policies
      3. Awareness and Training
        1. Compliance
        2. User Practices
        3. Threat Awareness
        4. Training Techniques
      4. Chapter Summary
      5. Key Terms
      6. Review Questions
    3. CHAPTER 15 Vulnerability Assessment
      1. Assessing Vulnerabilities
        1. What Is Vulnerability Assessment?
        2. Assessment Techniques
        3. Assessment Tools
      2. Vulnerability Scanning vs. Penetration Testing
        1. Vulnerability Scanning
        2. Penetration Testing
      3. Third-Party Integration
      4. Mitigating and Deterring Attacks
        1. Creating a Security Posture
        2. Selecting Appropriate Controls
        3. Configuring Controls
        4. Hardening
        5. Reporting
      5. Chapter Summary
      6. Key Terms
      7. Review Questions
  14. APPENDIX A CompTIA SY0-401 Certification Exam Objectives
  15. APPENDIX B Answers to Chapter Review Questions
  16. APPENDIX C Security Websites
    1. Security Organizations
    2. Vendor Security Websites
    3. Threat Analysis
    4. Standards Organizations and Regulatory Agencies
    5. Laws Protecting Private Information
    6. Blogs
  17. APPENDIX D Selected TCP/IP Ports and Their Threats
  18. APPENDIX E References
  19. GLOSSARY
  20. INDEX