You are previewing Mike Meyers's CompTIA Security+ Certification Passport, Fourth Edition (Exam SY0-401).
O'Reilly logo
Mike Meyers's CompTIA Security+ Certification Passport, Fourth Edition  (Exam SY0-401)

Book Description

From the #1 Name in Professional Certification

Prepare for CompTIA Security+ Exam SY0-401 with McGraw-Hill Professional—a Platinum-Level CompTIA Authorized Partner offering Authorized CompTIA Approved Quality Content to give you the competitive edge on exam day.

Get on the fast track to becoming CompTIA Security+ certified with this affordable, portable study tool--fully revised for the latest exam release. Inside, certification training experts guide you on your career path, providing expert tips and sound advice along the way. With an intensive focus only on what you need to know to pass CompTIA Security+ Exam SY0-401, this certification passport is your ticket to success on exam day.

INSIDE:

  • Itineraries -- List of official exam objectives covered
  • ETAs -- Amount of time needed to complete each lesson
  • Travel Advisories -- Expert advice on critical topics
  • Local Lingo -- Concise definitions of key terms and concepts
  • Travel Assistance -- Recommended resources for more information
  • Exam Tips -- Common exam pitfalls and solutions
  • Checkpoints -- End-of-chapter questions, answers, and explanations
  • Career Flight Path -- Information on the exam and possible next steps

Electronic content includes:

  • 200 practice exam questions
  • PDF copy of the book

Table of Contents

  1. Cover 
  2. Title Page
  3. Copyright Page
  4. Contents 
  5. Acknowledgments
  6. Check-In
  7. Part I: Organizational Security
    1. Chapter 1: Organizational Security and Compliance
      1. Objective 1.01 Explain Risk-Related Concepts
        1. Risk Control Types
        2. Risk Assessment
        3. Risk Management Options
        4. False Positives and Negatives
        5. Use Organizational Policies to Reduce Risk
      2. Objective 1.02 Implement Appropriate Risk Mitigation Strategies
        1. Change Management Policy
        2. Incident Management and Response Policy
        3. Perform Routine Audits
        4. User Rights and Permissions Reviews
        5. Data Loss Prevention and Regulatory Compliance
      3. Objective 1.03 Integrate with Third Parties
        1. Interoperability Agreements
        2. Privacy Considerations
        3. Risk Awareness
        4. Unauthorized Data Sharing
        5. Data Ownerships
        6. Data Backup
        7. Verification of Adherence
    2. Chapter 2: Security Training and Incident Response
      1. Objective 2.01 Explain the Importance of Security-Related Awareness and Training
        1. Accessing Policy Documentation
        2. Data and Documentation Policies
        3. Best Practices for User Habits
      2. Objective 2.02 Analyze and Differentiate Among Types of Social Engineering Attacks
        1. Phishing
        2. Whaling
        3. Shoulder Surfing
        4. Tailgating
        5. Pharming
        6. Spim
        7. Vishing
        8. Spam
        9. Hoaxes
      3. Objective 2.03 Execute Appropriate Incident Response Procedures
        1. Preparation
        2. Incident Identification
        3. First Responders
        4. Incident Isolation
        5. Damage and Loss Control
        6. Escalation Policy
        7. Reporting and Notification
        8. Mitigation and Recovery Steps
        9. Lessons Learned
      4. Objective 2.04 Implement Basic Forensic Procedures
        1. Collection and Preservation of Evidence
    3. Chapter 3: Business Continuity and Disaster Recovery
      1. Objective 3.01 Compare and Contrast Aspects of Business Continuity
        1. Recovery Plans
      2. Objective 3.02 Execute Disaster Recovery Plans and Procedures
        1. High Availability and Redundancy Planning
        2. Fault Tolerance
      3. Objective 3.03 Select the Appropriate Control to Meet the Goals of Security
      4. Objective 3.04 Explain the Impact and Proper Use of Environmental Controls
        1. Facility Construction Issues
        2. Environmental Issues
        3. Cable Shielding
        4. Fire Suppression
  8. Part II: Cryptography
    1. Chapter 4: Cryptography and Encryption Basics
      1. Objective 4.01 Utilize the Concepts of Cryptography
        1. Information Assurance
        2. Algorithms
        3. Steganography
        4. Digital Signatures
      2. Basic Hashing Concepts
        1. Message Digest Hashing
        2. Secure Hash Algorithm (SHA)
        3. RIPEMD
        4. HMAC
      3. Objective 4.02 Use and Apply Appropriate Cryptographic Tools and Products
        1. Symmetric Encryption Algorithms
        2. Asymmetric Encryption Algorithms
        3. One-Time Pad
        4. Quantum Cryptography
      4. Implementing Encryption Protocols
        1. Wireless Encryption
    2. Chapter 5: Public Key Infrastructure
      1. Objective 5.01 Explain the Core Concepts of Public Key Infrastructure
        1. Digital Certificates
        2. Certificate Authorities
        3. Trust Models
        4. Key Management and Storage
      2. Objective 5.02 Implement PKI, Certificate Management, and Associated Components
        1. Certificate Lifecycle
        2. Certificate Renewal
  9. Part III: Access Control and Identity Management
    1. Chapter 6: Access Control
      1. Objective 6.01 Explain the Fundamental Concepts and Best Practices Related to Authentication, Authorization, and Access Control
        1. Users and Resources
        2. Access Control Best Practices
        3. Access Control Models
      2. Objective 6.02 Implement Appropriate Security Controls When Performing Account Management
        1. User Account Policies
        2. User Access Reviews
        3. Credential Management
        4. Security Roles and Privileges
        5. File and Print Security Controls
      3. Objective 6.03 Analyze and Differentiate Among Types of Mitigation and Deterrent Techniques
        1. Physical Barriers
        2. Lighting
        3. Video Surveillance
        4. Locks
        5. Man-Trap
        6. Security Guards
        7. Access Logs
        8. Personal Identification Verification Card
        9. Smart Card
        10. Common Access Card
    2. Chapter 7: Authentication and Identity Management
      1. Objective 7.01 Explain the Fundamental Concepts and Best Practices Related to Authentication, Authorization, and Access Control
        1. Authentication Models
        2. Authentication Methods
      2. Objective 7.02 Explain the Function and Purpose of Authentication Services
        1. PAP
        2. CHAP
        3. LANMAN
        4. NTLM and NTLMv2
        5. Extensible Authentication Protocol
        6. RADIUS
        7. LDAP
        8. SAML
        9. TACACS
        10. Kerberos
        11. 802.1X
        12. Certificates (Mutual Authentication)
        13. HOTP/TOTP
        14. Biometrics
  10. Part IV: Network Security
    1. Chapter 8: Securing Networks
      1. Objective 8.01 Implement Security Functionality on Network Devices and Other Technologies
        1. Firewalls
        2. Routers
        3. Switches
        4. Load Balancers
        5. Proxy Servers
        6. All-in-One Security Appliances
        7. Web Security Gateway
        8. Intrusion Detection and Prevention
        9. Application-Aware Devices
        10. Protocol Analyzers
      2. Objective 8.02 Explain Network Design Elements and Compounds
        1. Security Zones
        2. Network Security Techniques
        3. Remote Access
        4. Virtualization
        5. Cloud Computing
    2. Chapter 9: Secure Network Administration
      1. Objective 9.01 Understand the OSI Model
      2. Objective 9.02 Implement and Use Common Protocols
        1. TCP/IP
        2. ICMP
        3. HTTP and HTTPS
        4. Telnet
        5. SSH
        6. DNS
        7. SNMP
        8. IPSec
        9. NetBIOS
        10. iSCSI
        11. Fibre Channel
      3. Objective 9.03 Identify Commonly Used Default Network Ports
        1. TCP/IP Network Ports
      4. Objective 9.04 Analyze and Differentiate Among Types of Network Attacks
        1. Denial of Service
        2. Back Door
        3. NULL Sessions
        4. Spoofing
        5. Smurf Attack
        6. TCP/IP Hijacking
        7. Man-in-the-Middle
        8. Replay
        9. Xmas Attack
        10. DNS Poisoning
        11. ARP Poisoning
        12. Domain Kiting
        13. Typosquatting
        14. Client-side Attacks
        15. Watering Hole Attack
        16. Malicious Insider Threats
      5. Objective 9.05 Apply and Implement Secure Network Administration Principles
        1. Networking Device Configuration
        2. Network Separation
        3. Unified Threat Management
        4. Network Device Threats and Risks
        5. Network Device Hardening
    3. Chapter 10: Securing Wireless Networks
      1. Objective 10.01 Implement Wireless Networks in a Secure Manner
        1. Wireless LAN Technologies
        2. Wireless Access
        3. Wireless Protocols
      2. Securing Wireless Networks
        1. Access Point Security
        2. Service Set Identifier
        3. MAC Address Filtering
        4. Security
        5. WPA and WPA2 Security
        6. Wi-Fi Protected Setup
        7. Wireless Authentication Protocols
        8. VPN Wireless Access
        9. Personal Firewall
        10. Captive Portals
      3. Objective 10.02 Analyze and Differentiate Among Types of Wireless Attacks
        1. Data Emanation
        2. Bluetooth Vulnerabilities
        3. Near-Field Communication
        4. War Driving
        5. Access Points (Evil Twin)
        6. War Chalking
        7. Packet Sniffing and Eavesdropping
        8. Replay Attacks
        9. WPS Attacks
        10. WEP/WPA Attacks
  11. Part V: Application, Data, and Host Security
    1. Chapter 11: Securing Host Systems
      1. Objective 11.01 Analyze and Differentiate Among Types of Malware
        1. Viruses
        2. Trojan Horses
        3. Worms
        4. Adware and Spyware
        5. Ransomware
        6. Rootkits
        7. Botnets
      2. Objective 11.02 Carry Out Appropriate Procedures to Establish Host Security
        1. Physical Hardware Security
        2. Operating System Hardening
        3. Host Security Applications
        4. Virtualization
      3. Objective 11.03 Understand Mobile Security Concepts and Technologies
        1. Mobile Device Security
        2. Protection from Theft
        3. Protection from Users
        4. BYOD Concerns
    2. Chapter 12: Securing Applications and Data
      1. Objective 12.01 Analyze and Differentiate Among Types of Application Attacks
        1. Web Application Vulnerabilities
        2. Internet Server Vulnerabilities
      2. Objective 12.02 Explain the Importance of Application Security
        1. Secure Coding Concepts
        2. NoSQL vs. SQL Databases
        3. Application Hardening
      3. Objective 12.03 Explain the Importance of Data Security
        1. Data Loss Prevention
        2. Data Encryption
        3. Cloud Storage
        4. Storage Area Networks
        5. Handling Big Data
  12. Part VI: Threats and Vulnerabilities
    1. Chapter 13: Monitoring for Security Threats
      1. Objective 13.01 Analyze and Differentiate Among Types of Mitigation and Deterrent Techniques
        1. Security Posture
        2. Detecting Security-Related Anomalies
        3. Monitoring Logs
        4. System Auditing
        5. Hardening the System
        6. Network Security
        7. Mitigating Threats in Alternative Environments
    2. Chapter 14: Vulnerability Assessments
      1. Objective 14.01 Implement Assessment Tools and Techniques to Discover Security Threats and Vulnerabilities
        1. Vulnerability Assessment Tools
      2. Objective 14.02 Within the Realm of Vulnerability Assessments, Explain the Proper Use of Penetration Testing Versus Vulnerability Scanning
        1. White, Black, and Gray Box Testing
    3. Appendix A: A About the Download
      1. System Requirements
      2. Installing and Running Total Tester
        1. About Total Tester
      3. Technical Support
    4. Appendix B: Career Flight Path
      1. CompTIA Security+ Exam Format
      2. CompTIA Security+ and Beyond
      3. Getting the Latest Information on the CompTIA Security+ Exam
  13. Index