CompTIA Security+ SY0-401 Cert Guide, Deluxe Edition / Edition 3

CompTIA Security+ SY0-401 Cert Guide, Deluxe Edition / Edition 3

by Dave Prowse
ISBN-10:
0789753332
ISBN-13:
9780789753335
Pub. Date:
07/16/2014
Publisher:
Pearson Education
ISBN-10:
0789753332
ISBN-13:
9780789753335
Pub. Date:
07/16/2014
Publisher:
Pearson Education
CompTIA Security+ SY0-401 Cert Guide, Deluxe Edition / Edition 3

CompTIA Security+ SY0-401 Cert Guide, Deluxe Edition / Edition 3

by Dave Prowse

Other Format

$49.99
Current price is , Original price is $49.99. You
$49.99 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores
  • SHIP THIS ITEM

    Temporarily Out of Stock Online

    Please check back later for updated availability.


Overview

DVD Features Three Complete Practice Exams, 31 videos, and 31 Interactive Exercises

  • Master every topic on CompTIA’s new Security+ SY0-401 exam
  • Assess your knowledge and focus your learning
  • Review key concepts with chapter-ending activities

CompTIA Security+ SY0-401 Authorized Cert Guide,Deluxe Edition, Third Edition, is a best-of-breed exam study guide. Best-selling author and expert instructor David L. Prowse shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.

The book presents you with an organized test preparation routine through the use of proven series elements and techniques. Chapter-ending review activities help you drill on key concepts you must know thoroughly. Practice exam questions help you assess your knowledge, and a final preparation chapter sets you on the path to passing the exam.

The companion DVD contains the powerful Pearson IT Certification Practice Test engine, complete with hundreds of exam-realistic questions. The assessment engine offers you a wealth of customization options and reporting features, laying out a complete assessment of your knowledge to help you focus your study where it is needed most. The DVD also includes video solutions and interactive exercises to the Case Studies in the book.

Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this authorized study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time.

The authorized study guide helps you master all the topics on the Security+ exam, including

  • Core computer system security
  • OS hardening and virtualization
  • Application security
  • Network design elements
  • Networking ports, protocols, and threats
  • Perimeter security
  • Network media and devices security
  • Physical security and authentication models
  • Access control
  • Vulnerability and risk assessment
  • Monitoring and auditing
  • Cryptography, including PKI
  • Redundancy and disaster recovery
  • Policies and procedures

Companion DVD

Your purchase includes three free, complete practice exams as well as video solutions and interactive exercises to the Case Studies in the book.

Includes Exclusive Offer for 70% Off Premium Edition eBook and Practice Test

Pearson IT Certification Practice Test minimum system requirements:

Windows XP (SP3), Windows Vista (SP2), Windows 7, or Windows 8; Microsoft .NET Framework 4.0 Client; Pentium class 1 GHz processor (or equivalent); 512MB RAM; 65


Product Details

ISBN-13: 9780789753335
Publisher: Pearson Education
Publication date: 07/16/2014
Series: Cert Guide Series
Pages: 800
Product dimensions: 7.60(w) x 9.20(h) x 1.80(d)

About the Author

David L. Prowse is an author, a computer network specialist, and a technical trainer. Over the past several years he has authored several titles for Pearson Education, including the well-received CompTIA A+ Exam Cram . As a consultant, he installs and secures the latest in computer and networking technology. Over the past decade he has also taught CompTIA A+, Network+, and Security+ certification courses, both in the classroom and via the Internet.

He runs the website www.davidlprowse.com , where he gladly answers questions from students and readers.

Table of Contents

Introduction xxii

Chapter 1 Introduction to Security 3

Foundation Topics 3

Security 101 3

The CIA of Computer Security 3

The Basics of Information Security 5

Think Like a Hacker 8

Chapter Review Activities 10

Review Key Topics 10

Define Key Terms 11

Review Questions 11

Answers and Explanations 13

Chapter 2 Computer Systems Security 17

Foundation Topics 17

Computer Systems Security Threats 17

Malicious Software 18

Viruses 18

Worms 19

Trojan Horses 20

Ransomware 20

Spyware 21

Rootkits 22

Spam 22

Summary of Malware Threats 23

Ways to Deliver Malicious Software 24

Via Software, Messaging, and Media 24

Botnets and Zombies 25

Active Interception 26

Privilege Escalation 26

Backdoors 26

Logic Bombs 27

Preventing and Troubleshooting Malware 28

Preventing and Troubleshooting Viruses 28

Preventing and Troubleshooting Worms and Trojans 32

Preventing and Troubleshooting Spyware 33

Preventing and Troubleshooting Rootkits 35

Preventing and Troubleshooting Spam 36

You Can’t Save Every Computer from Malware! 38

Summary of Malware Prevention Techniques 38

Implementing Security Applications 39

Personal Software Firewalls 39

Host-Based Intrusion Detection Systems 41

Pop-Up Blockers 43

Data Loss Prevention Systems 45

Securing Computer Hardware, Peripherals, and Mobile Devices 45

Securing the BIOS 46

Securing Storage Devices 47

Removable Storage 47

Network Attached Storage 48

Whole Disk Encryption 48

Hardware Security Modules 50

Securing Mobile Devices 50

Malware 51

Botnet Activity 52

SIM Cloning 52

Wireless Attacks 53

Theft 53

Application Security 54

BYOD Concerns 57

Chapter Summary 60

Chapter Review Activities 62

Review Key Topics 62

Define Key Terms 62

Review Questions 63

Answers and Explanations 71

Case Studies for Chapter 2 77

Case Study Solutions 79

Chapter 3 OS Hardening and Virtualization 83

Foundation Topics 83

Hardening Operating Systems 83

Removing Unnecessary Applications and Services 84

Service Packs 92

Windows Update, Patches, and Hotfixes 95

Patches and Hotfixes 96

Patch Management 99

Group Policies, Security Templates, and Configuration Baselines 100

Hardening File Systems and Hard Drives 103

Virtualization Technology 107

Types of Virtualization and Their Purposes 107

Hypervisor 109

Securing Virtual Machines 110

Chapter Summary 112

Chapter Review Activities 113

Review Key Topics 113

Define Key Terms 114

Review Questions 114

Answers and Explanations 118

Case Studies for Chapter 3 121

Case Study Solutions 123

Chapter 4 Application Security 127

Foundation Topics 127

Securing the Browser 127

General Browser Security Procedures 129

Implement Policies 129

Train Your Users 132

Use a Proxy and Content Filter 133

Secure Against Malicious Code 135

Securing Internet Explorer 135

Securing Firefox 141

Securing Other Browsers 145

Securing Other Applications 147

Secure Programming 151

Systems Development Life Cycle 151

Programming Testing Methods 154

Programming Vulnerabilities and Attacks 156

Backdoors 157

Buffer Overflows 157

Arbitrary Code Execution/Remote Code Execution 158

XSS and XSRF 159

More Code Injection Examples 159

Directory Traversal 161

Zero Day Attack 161

Chapter Summary 163

Chapter Review Activities 164

Review Key Topics 164

Define Key Terms 165

Review Questions 165

Answers and Explanations 170

Case Studies for Chapter 4 174

Case Study Solutions 175

Chapter 5 Network Design Elements 179

Foundation Topics 179

Network Design 179

The OSI Model 180

Network Devices 182

Hub 182

Switch 182

Router 184

Network Address Translation, and Private Versus Public IP 185

Network Zones and Interconnections 188

LAN Versus WAN 188

Internet 189

Demilitarized Zone (DMZ) 189

Intranets and Extranets 190

Network Access Control (NAC) 192

Subnetting 192

Virtual Local Area Network (VLAN) 194

Telephony Devices 196

Modems 196

PBX Equipment 197

VoIP 197

Cloud Security and Server Defense 198

Cloud Computing 198

Cloud Security 200

Server Defense 203

File Servers 203

Network Controllers 204

E-mail Servers 204

Web Servers 205

FTP Server 207

Chapter Summary 208

Chapter Review Activities 210

Review Key Topics 210

Define Key Terms 210

Review Questions 210

Answers and Explanations 215

Case Studies for Chapter 5 219

Case Study Solutions 220

Chapter 6 Networking Protocols and Threats 225

Foundation Topics 225

Ports and Protocols 225

Ports Ranges, Inbound Versus Outbound, and Common Ports 225

Protocols That Can Cause Anxiety on the Exam 235

Malicious Attacks 236

DoS 236

DDoS 239

Sinkholes and Blackholes 239

Spoofing 240

Session Hijacking 241

Replay 243

Null Sessions 244

Transitive Access and Client-Side Attacks 244

DNS Poisoning and Other DNS Attacks 245

ARP Poisoning 247

Summary of Network Attacks 247

Chapter Summary 251

Chapter Review Activities 252

Review Key Topics 252

Define Key Terms 252

Review Questions 252

Answers and Explanations 258

Case Studies for Chapter 6 262

Case Study Solutions 263

Chapter 7 Network Perimeter Security 267

Foundation Topics 268

Firewalls and Network Security 268

Firewalls 268

Proxy Servers 274

Honeypots and Honeynets 277

Data Loss Prevention (DLP) 278

NIDS Versus NIPS 279

NIDS 279

NIPS 280

Summary of NIDS Versus NIPS 282

The Protocol Analyzer’s Role in NIDS and NIPS 282

Unified Threat Management 283

Chapter Summary 283

Chapter Review Activities 284

Review Key Topics 284

Define Key Terms 285

Review Questions 285

Answers and Explanations 290

Case Studies for Chapter 7 294

Case Study Solutions 295

Chapter 8 Securing Network Media and Devices 299

Foundation Topics 299

Securing Wired Networks and Devices 299

Network Device Vulnerabilities 300

Default Accounts 300

Weak Passwords 300

Privilege Escalation 302

Back Doors 303

Network Attacks 303

Other Network Device Considerations 303

Cable Media Vulnerabilities 304

Interference 305

Crosstalk 305

Data Emanation 306

Tapping into Data and Conversations 307

Securing Wireless Networks 309

Wireless Access Point Vulnerabilities 309

The Administration Interface 310

SSID Broadcast 310

Rogue Access Points 311

Evil Twin 311

Weak Encryption 311

Wi-Fi Protected Setup 313

VPN over Open Wireless 314

Wireless Access Point Security Strategies 314

Wireless Transmission Vulnerabilities 317

Bluetooth Vulnerabilities 318

Bluejacking 319

Bluesnarfing 319

Chapter Summary 321

Chapter Review Activities 323

Review Key Topics 323

Define Key Terms 323

Review Questions 324

Answers and Explanations 328

Case Studies for Chapter 8 330

Case Study Solutions 333

Chapter 9 Physical Security and Authentication Models 339

Foundation Topics 340

Physical Security 340

General Building and Server Room Security 340

Door Access 342

Biometric Readers 344

Authentication Models and Components 345

Authentication Models 345

Localized Authentication Technologies 348

802.1X and EAP 348

LDAP 351

Kerberos and Mutual Authentication 352

Remote Desktop Services 354

Remote Authentication Technologies 356

Remote Access Service 356

Virtual Private Networks 358

RADIUS Versus TACACS 360

Chapter Summary 362

Chapter Review Activities 363

Review Key Topics 363

Define Key Terms 364

Review Questions 365

Answers and Explanations 372

Case Studies for Chapter 9 376

Case Study Solutions 379

Chapter 10 Access Control Methods and Models 383

Foundation Topics 383

Access Control Models Defined 383

Discretionary Access Control 384

Mandatory Access Control 386

Role-Based Access Control (RBAC) 387

Access Control Wise Practices 388

Rights, Permissions, and Policies 391

Users, Groups, and Permissions 391

Permission Inheritance and Propagation 396

Moving and Copying Folders and Files 397

Usernames and Passwords 397

Policies 400

User Account Control (UAC) 403

Chapter Summary 404

Chapter Review Activities 405

Review Key Topics 405

Define Key Terms 406

Review Questions 406

Answers and Explanations 412

Case Studies for Chapter 10 416

Case Study Solutions 417

Chapter 11 Vulnerability and Risk Assessment 423

Foundation Topics 423

Conducting Risk Assessments 423

Qualitative Risk Assessment 425

Quantitative Risk Assessment 426

Security Analysis Methodologies 429

Security Controls 430

Vulnerability Management 431

Penetration Testing 433

OVAL 434

Assessing Vulnerability with Security Tools 435

Network Mapping 435

Vulnerability Scanning 438

Network Sniffing 441

Password Analysis 443

Chapter Summary 446

Chapter Review Activities 447

Review Key Topics 447

Define Key Terms 448

Review Questions 448

Answers and Explanations 454

Case Studies for Chapter 11 459

Case Study Solutions 460

Chapter 12 Monitoring and Auditing 465

Foundation Topics 465

Monitoring Methodologies 465

Signature-Based Monitoring 466

Anomaly-Based Monitoring 466

Behavior-Based Monitoring 467

Using Tools to Monitor Systems and Networks 467

Performance Baselining 468

Protocol Analyzers 470

Wireshark 471

Network Monitor 472

SNMP 474

Analytical Tools 475

Conducting Audits 478

Auditing Files 478

Logging 481

Log File Maintenance and Security 485

Auditing System Security Settings 486

Chapter Summary 490

Chapter Review Activities 491

Review Key Topics 491

Define Key Terms 492

Review Questions 492

Answers and Explanations 498

Case Studies for Chapter 12 503

Case Study Solutions 504

Chapter 13 Encryption and Hashing Concepts 507

Foundation Topics 507

Cryptography Concepts 507

Symmetric Versus Asymmetric Key Algorithms 512

Symmetric Key Algorithms 512

Asymmetric Key Algorithms 513

Public Key Cryptography 513

Key Management 515

Steganography 515

Encryption Algorithms 516

DES and 3DES 516

AES 517

RC 518

Blowfish and Twofish 518

Summary of Symmetric Algorithms 519

RSA 519

Diffie-Hellman 521

Elliptic Curve 521

More Encryption Types 523

One-Time Pad 523

PGP 524

Hashing Basics 526

Cryptographic Hash Functions 527

MD5 527

SHA 527

RIPEMD and HMAC 528

Happy Birthday! 528

LANMAN, NTLM, and NTLMv2 529

LANMAN 529

NTLM and NTLMv2 531

Additional Password Hashing Concepts 531

Chapter Summary 533

Chapter Review Activities 534

Review Key Topics 534

Define Key Terms 535

Review Questions 535

Answers and Explanations 542

Case Studies for Chapter 13 546

Case Study Solutions 547

Chapter 14 PKI and Encryption Protocols 551

Foundation Topics 551

Public Key Infrastructure 551

Certificates 552

Certificate Authorities 552

Single-Sided and Dual-Sided Certificates 556

Web of Trust 556

Security Protocols 557

S/MIME 557

SSL/TLS 558

SSH 559

PPTP, L2TP, and IPsec 560

PPTP 560

L2TP 560

IPsec 561

Chapter Summary 561

Chapter Review Activities 562

Review Key Topics 562

Define Key Terms 563

Review Questions 563

Answers and Explanations 568

Case Studies for Chapter 14 571

Case Study Solutions 571

Chapter 15 Redundancy and Disaster Recovery 575

Foundation Topics 575

Redundancy Planning 575

Redundant Power 577

Redundant Power Supplies 579

Uninterruptible Power Supplies 579

Backup Generators 581

Redundant Data 582

Redundant Networking 586

Redundant Servers 587

Redundant Sites 588

Redundant People 589

Disaster Recovery Planning and Procedures 590

Data Backup 590

DR Planning 594

Chapter Summary 598

Chapter Review Activities 598

Review Key Topics 598

Define Key Terms 599

Review Questions 599

Answers and Explanations 604

Case Study for Chapter 15 607

Case Study Solution 607

Chapter 16 Policies, Procedures, and People 611

Foundation Topics 611

Environmental Controls 611

Fire Suppression 611

Fire Extinguishers 612

Sprinkler Systems 613

Special Hazard Protection Systems 614

HVAC 615

Shielding 616

Social Engineering 617

Pretexting 618

Malicious Insider 618

Diversion Theft 619

Phishing 619

Hoaxes 621

Shoulder Surfing 621

Eavesdropping 622

Dumpster Diving 622

Baiting 622

Piggybacking/Tailgating 622

Summary of Social Engineering Types 623

User Education and Awareness 624

Legislative and Organizational Policies 625

Data Sensitivity and Classification of Information 626

Personnel Security Policies 628

Privacy Policies 628

Acceptable Use 629

Change Management 629

Separation of Duties/Job Rotation 630

Mandatory Vacations 630

Onboarding and Offboarding 631

Due Diligence 631

Due Care 631

Due Process 632

User Education and Awareness Training 632

Summary of Personnel Security Policies 633

How to Deal with Vendors 633

How to Dispose of Computers and Other IT Equipment Securely 634

Incident Response Procedures 636

Chapter Summary 642

Chapter Review Activities 643

Review Key Topics 643

Review Questions 644

Answers and Explanations 653

Case Studies for Chapter 16 658

Case Study Solutions 659

Chapter 17 Taking the Real Exam 663

Getting Ready and the Exam Preparation Checklist 663

Tips for Taking the Real Exam 667

Beyond the CompTIA Security+ Certification 670

Case Study for Chapter 17 671

Case Study 17-1: Analyzing Test Questions 671

Practice Exam 1: SY0-401 673

Glossary 725

On the DVD:

APPENDIX A View Recommended Resources

APPENDIX B Master List of Key Topics

Acronyms

Case Studies

Case Study Solutions (Video and Simulations)

Table 6-2

TOC, 978078975335, 6/19/2014

From the B&N Reads Blog

Customer Reviews