SKIP THE SHIPPING
Use code NOSHIP during checkout to save 40% on eligible eBooks, now through January 5. Shop now.
Register your product to gain access to bonus material or receive a coupon.
Adobe® Digital Editions software.
This eBook requires the freeBefore downloading this DRM-encrypted PDF, be sure to:
The Security+ certification is CompTIA's response to membership requests to develop a foundation-level certification for security workers. The IT industry is in agreement that there is a need to better train, staff, and empower those tasked with designing and implementing information security, and Security+ is an effort to meet this demand. The exam is under consideration by Microsoft as the baseline security certification for Microsoft's new security certification initiative.
The Security+ Training Guide is a comprehensive resource for those preparing to take this exam, covering everything in a format that maps to the exam objectives. The book has been subjected to a rigorous technical review, ensuring content is superior in both coverage and technical accuracy.
The accompanying CD features PrepLogic™ Practice Tests, Preview Edition. This product includes one complete PrepLogic Practice Test with approximately the same number of questions found on the actual vendor exam. Each question contains full, detailed explanations of the correct and incorrect answers. The engine offers two study modes, Practice Test and Flash Review, full exam customization, and a detailed score report.
Introduction.
How This Book Helps You. What the Security+ Exam Covers. Hardware and Software Youll Need. Advice on Taking the Exam. Que Certification.
Learning Styles. Study Tips. Exam Prep Tips. Final Considerations.
I: EXAM PREPARATION.
1. General Security Concepts.Introduction. A Brief History of Networks and Security. Basic Terminology. Access Control Techniques. Authentication Methods. Identifying Nonessential Services and Protocols. Attacks. Malicious Code. Social Engineering. Auditing.
2. Communication Security.Introduction. Recognizing and Administering Remote and Wireless Access. Recognizing and Administering Security ControlsEmail Communications. Recognizing and Administering Security ControlsWeb Presence. Recognizing and Administering Security ControlsDirectory. Recognizing and Administering Security ControlsFile Transfer. Recognizing and Administering Security ControlsWireless. Recognizing Vulnerabilities and Taking ActionInstant Messaging.
3. Devices, Media, and Topology Security.Introduction. Understanding the Basic Security Concepts of Network and System Devices. Understanding the Basic Security Concepts of Media. Understanding the Concepts of Security Topologies.
4. Intrusion Detection, Baselines, and Hardening.Introduction. Network-Based Intrusion Detection. Host-Based Intrusion Detection. Honeypots. Incident Response. Understanding Security Baselines.
5. Cryptography Algorithms.Introduction. Encryption Algorithms. Concepts of Using Encryption.
6. PKI and Key Management.Introduction. Digital Certificates. Revocation. Trust Models. Identifying and Differentiating Standards and Protocols. Understanding and Explaining Key Management/Certificate Lifecycle.
7. Physical Security, Disaster Recovery, and Business Continuity.Introduction. Physical Security. Disaster Recovery and Disaster Recovery Plans. Business Continuity.
8. Security Policy and Procedures.Introduction. Security Policy.
9. Security Management.Introduction. Privilege Management. Forensics. Risk Identification. Change Management. Awareness. Documentation.
II: FINAL REVIEW.
Fast Facts.Introductory Note: Learn Key Terms! General Security Concepts. Communications Security. Infrastructure Security. Basics of Cryptography. Operational/Organizational Security.
Practice Exam.Exam Questions. Answers to Exam Questions.
III: APPENDIXES.
Appendix A. Security Resources.