CompTIA Security+ Certification Study Guide: Network Security Essentials
Prepare for the CompTIA Security+ certification exam that covers the skills required to perform core security functions and pursue a career in IT. You will learn the basic principles of network security.

Computer network vulnerabilities and threats are covered and you will learn how to safeguard computer networks. Network security planning, technology, and organization are discussed along with associated legal and ethical issues.

Lesson objectives and instruction succinctly review each major topic, including: network fundamentals, operational and organizational security, risk management, wireless security, change management, physical security, forensics, network attacks, and much more.


What You Will Learn



• Identify the concepts of confidentiality, integrity, and availability
• Implement secure network administration principles
• Apply appropriate risk mitigation strategies
• Explain the impact of physical security on computer and network security
• Use assessment tools to discover security threats and vulnerabilities
• Implement appropriate security controls when performing account management


Who This Book Is For

Security professionals looking to get this credential, including systems administrators, network administrators, security administrators, junior IT auditors and penetration testers, security specialists, security consultants, security engineers, and more

1137319170
CompTIA Security+ Certification Study Guide: Network Security Essentials
Prepare for the CompTIA Security+ certification exam that covers the skills required to perform core security functions and pursue a career in IT. You will learn the basic principles of network security.

Computer network vulnerabilities and threats are covered and you will learn how to safeguard computer networks. Network security planning, technology, and organization are discussed along with associated legal and ethical issues.

Lesson objectives and instruction succinctly review each major topic, including: network fundamentals, operational and organizational security, risk management, wireless security, change management, physical security, forensics, network attacks, and much more.


What You Will Learn



• Identify the concepts of confidentiality, integrity, and availability
• Implement secure network administration principles
• Apply appropriate risk mitigation strategies
• Explain the impact of physical security on computer and network security
• Use assessment tools to discover security threats and vulnerabilities
• Implement appropriate security controls when performing account management


Who This Book Is For

Security professionals looking to get this credential, including systems administrators, network administrators, security administrators, junior IT auditors and penetration testers, security specialists, security consultants, security engineers, and more

64.99 In Stock
CompTIA Security+ Certification Study Guide: Network Security Essentials

CompTIA Security+ Certification Study Guide: Network Security Essentials

by Ahmed F. Sheikh
CompTIA Security+ Certification Study Guide: Network Security Essentials

CompTIA Security+ Certification Study Guide: Network Security Essentials

by Ahmed F. Sheikh

Paperback(1st ed.)

$64.99 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

Prepare for the CompTIA Security+ certification exam that covers the skills required to perform core security functions and pursue a career in IT. You will learn the basic principles of network security.

Computer network vulnerabilities and threats are covered and you will learn how to safeguard computer networks. Network security planning, technology, and organization are discussed along with associated legal and ethical issues.

Lesson objectives and instruction succinctly review each major topic, including: network fundamentals, operational and organizational security, risk management, wireless security, change management, physical security, forensics, network attacks, and much more.


What You Will Learn



• Identify the concepts of confidentiality, integrity, and availability
• Implement secure network administration principles
• Apply appropriate risk mitigation strategies
• Explain the impact of physical security on computer and network security
• Use assessment tools to discover security threats and vulnerabilities
• Implement appropriate security controls when performing account management


Who This Book Is For

Security professionals looking to get this credential, including systems administrators, network administrators, security administrators, junior IT auditors and penetration testers, security specialists, security consultants, security engineers, and more


Product Details

ISBN-13: 9781484262337
Publisher: Apress
Publication date: 09/13/2020
Edition description: 1st ed.
Pages: 266
Sales rank: 470,910
Product dimensions: 7.01(w) x 10.00(h) x (d)

About the Author

Ahmed Sheikh is a Fulbright alumnus and has earned a master's degree in electrical engineering from Kansas State University, USA. He is a seasoned IT expert with a specialty in network security planning and skills in cloud computing. Currently, he is working as IT Expert Engineer at a leading IT electrical company.

Table of Contents

Chapter 1. General Concepts

Identify the concepts of confidentiality, integrity and availability.

Perform packet level analysis.

Chapter 2. Chapter 2. Network Fundamentals Infrastructure Security

Explain the security function and purpose of network devices and technologies.

Implement secure network administration principles.

Differentiate network design elements and compounds.

Use common prools to employ infrastructure security.

Identify commonly used default network ports.

Chapter 3. IDS Wireless Security

Explain the security function and purpose of network devices and technologies.

Apply secure network administration principles.

Implement a wireless network in a secure manner.

Chapter 4. Role of People in Security—Operational and Organizational Security

Explain the importance of security-related awareness and training.

Chapter 5. Risk Management

Explain risk related concepts.

Apply appropriate risk mitigation strategies.

Chapter 6. Change Management

Compare aspects of business continuity.

Execute disaster recovery plans and procedures.

Chapter 7. Physical Security

Explain the impact of physical security on computer and network security.

Explain the impact and proper use of environmental controls.

Chapter 8. Forensics, Legal Issues, Privacy

Apply appropriate incident response procedures.

Identify the various laws that affect cybersecurity.

Chapter 9. Attacks

Identify the different types of malware that exist.

Describe computer attacks.

Chapter 10. Network Attacks

Identify different types of network attacks.

Use assessment tools to discover security threats and vulnerabilities.

Chapter 11. Baseline Secure Software Development

Explain the importance of application security.

Carry out appropriate procedures to establish host security.

Explain the importance of data security.

Chapter 12. Email and IM Web Components

Describe security issues associated with Email and Instant Messaging.

Explain web applications, plug-ins, and related security issues.

Explain web-based application security issues.

Chapter 13. Authentication and Remote Access

Explain the function and purpose of authentication services.

Explain the fundamental concepts and best practices related to authentication.

Identify the methods and prools used for remote access to networks.

Chapter 14. Access Control and Privilege Management

Explain the fundamental concepts and best practices related to authorization and access control.

Implement appropriate security controls when performing account management.

Chapter 15. Cryptography

Summarize general cryptography concepts.

Apply appropriate cryptographic tools and products.

Chapter 16. Public Key Infrastructure

Explain the core concepts of public key infrastructure.

Implement Public Key Infrastructure (PKI), certificate management and associated components.

From the B&N Reads Blog

Customer Reviews