Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Title Page Copyright Page Dedication Contents at a Glance Contents Acknowledgments Check-In I Mission Assurance
1 Organizational Security and Compliance
Objective 1.01 Explain Risk Management Processes and Concepts
Risk Control Types
Administrative Technical Physical
Risk Assessment
Asset Identification Risk Analysis Risk Likelihood and Impact Solutions and Countermeasures
Risk Register Risk Management Options False Positives and Negatives Using Organizational Policies to Reduce Risk
Security Policies Network Security Policies Human Resources Policies
Objective 1.02 Implement Appropriate Risk Mitigation Strategies
Change Management Policy Incident Management and Response Policy Perform Routine Audits Develop Standard Operating Procedures User Rights and Permissions Reviews Data Loss Prevention and Regulatory Compliance
Objective 1.03 Integrate with Third Parties
Interoperability Agreements
Service Level Agreements Business Partnership Agreements Memorandums of Agreement/Understanding Interconnection Security Agreement
Privacy Considerations Risk Awareness Unauthorized Data Sharing Data Ownerships Data Backup Verification of Adherence CHECKPOINT REVIEW QUESTIONS REVIEW ANSWERS
2 Security Training and Incident Response
Objective 2.01 Explain the Importance of Security-Related Awareness and Training
Effective Security Training and Awareness
Onboarding Nondisclosure Agreements Awareness Training Continual Education Threat Awareness Recurring Training Security Metrics
Data and Documentation Policies
Standards and Guidelines Data Retention Policy Hardware Disposal and Data Destruction Policy IT Documentation
Best Practices for User Habits
Password Policy Clean Desk Policy Personally Owned Devices Workstation Locking and Access Tailgating Data Handling Instant Messaging P2P Applications Social Networking/Media Compliance with Laws, Regulations, Best Practices, and Standards
Objective 2.02 Analyze and Differentiate Among Types of Social Engineering Attacks
Phishing Whaling Shoulder Surfing Tailgating Pharming Spim Vishing Spam Hoaxes
Objective 2.03 Execute Appropriate Incident Response Procedures
Preparation Incident Identification First Responders Incident Containment Damage and Loss Control
Data Breaches
Escalation Policy Reporting and Notification Mitigation and Recovery Steps Lessons Learned
Objective 2.04 Implement Basic Forensic Procedures
Data Acquisition and Preservation
Order of Volatility Capture a System Image Network and System Logs Time Offsets Use Hashing to Protect Evidence Integrity Take Screenshots Capture Video Chain of Custody Interview Witnesses Track Resources Expended Big Data Analysis
CHECKPOINT REVIEW QUESTIONS REVIEW ANSWERS
3 Business Continuity and Disaster Recovery
Objective 3.01 Explain Concepts of Business Continuity and Disaster Recovery
Select the Appropriate Control to Meet the Goals of Security Types of Disasters
Natural Human Error and Sabotage Network and Hacking Attacks Viruses
Recovery Plans
Disaster Recovery Team Risk Analysis Business Impact Analysis Privacy Impact Assessment Disaster Recovery and IT Contingency Plans Documentation Testing After-Action Reporting
Objective 3.02 Execute Disaster Recovery and Continuity of Operations Plans and Procedures
High Availability and Redundancy Planning
Service Levels Reliability Factors Spare Equipment Redundancy Alternate Site Redundancy Alternate Business Practices
Fault Tolerance
Hard Drives Power Supplies Network Interface Cards CPU Uninterruptible Power Supply Backups Planning Backup Hardware Backup Types Media Rotation and Retention Backup Documentation Restoration Offsite Storage Online Backup
Objective 3.03 Explain the Impact and Proper Use of Environmental Controls
Facility Construction Issues
Location Planning Facility Construction Computer Room Construction
Environmental Issues
Temperature Humidity Ventilation Monitoring Electrical Power
Cable Shielding
Coaxial Twisted Pair Fiber Optic Wireless Networks and Cells
Fire Suppression
Water Chemical-Based Fire Suppression
CHECKPOINT REVIEW QUESTIONS REVIEW ANSWERS
II Cryptography and PKI
4 Cryptography and Encryption Basics
Objective 4.01 Utilize the Concepts of Cryptography
Information Assurance
Confidentiality Integrity Authentication Nonrepudiation Obfuscation
Algorithms
Symmetric Keys Asymmetric Keys In-Band/Out-of-Band Key Exchange Ephemeral Keys Perfect Forward Secrecy Random/Pseudo-Random Numbers and Inputs
Steganography Digital Signatures Basic Hashing Concepts Message Digest Hashing
Message Digest 5 (MD5)
Secure Hash Algorithm (SHA) RIPEMD HMAC
Objective 4.02 Use and Apply Appropriate Cryptographic Tools and Products
Symmetric Encryption Algorithms
DES and 3DES AES Blowfish Twofish IDEA RC4
Asymmetric Encryption Algorithms
RSA Elliptic Curve Cryptography Diffie–Hellman DSA
One-Time Pad Quantum Cryptography Implementing Encryption Protocols
Wireless Encryption Protocol Pretty Good Privacy GNU Privacy Guard (GPG) S/MIME SSL and TLS HTTPS IPSec SSH Key Stretching
Decision Making
Data States Choosing and Implementing the Best Method
CHECKPOINT REVIEW QUESTIONS REVIEW ANSWERS
5 Public Key Infrastructure
Objective 5.01 Explain the Fundamentals of Public Key Infrastructure
Digital Certificates Certificate Authorities Trust Models
Web of Trust Third-Party (Single Authority) Trust Hierarchical Model
Key Management and Storage
Centralized vs. Decentralized Storage Key Storage and Protection Key Escrow Key Recovery Multiple Key Pairs Key History
Objective 5.02 Implementing PKI Concepts to Promote Trust
Certificate Life Cycle
Certificate Requested, Issued, Published, and Received Certificate Suspension and Revocation Certificate Expiration Key Destruction
Certificate Renewal CHECKPOINT REVIEW QUESTIONS REVIEW ANSWERS
III Identity and Access Management
6 Access Control
Objective 6.01 Explain the Fundamental Concepts and Best Practices Related to Authentication, Authorization, and Access Control
Users and Resources
Levels of Security Access Security Grouping
Access Control Best Practices
Separation of Duties Rotation of Job Duties Mandatory Vacations Implicit Deny Explicit Deny Least Privilege
Access Control Models
Mandatory Access Control Discretionary Access Control Role-Based Access Control Rule-Based Access Control Attribute-Based Access Control
Objective 6.02 Implement Appropriate Security Controls When Performing Account Management
Account Maintenance
Using Appropriate Naming Conventions Limiting Logon Attempts Setting Account Expiry Dates Disabling Unused Accounts Setting Time Restrictions Setting Machine Restrictions Using Tokens Restricting Multiple/Shared/Guest/Generic Accounts
User Access Reviews Credential Management
Password Policies Domain Accounts and Single Sign-On Federation
Security Roles and Privileges
User Group Role
File and Print Security Controls
File and Print ACLs
Objective 6.03 Analyze and Differentiate Among Types of Mitigation and Deterrent Techniques
Physical Barriers Lighting Video Surveillance Locks
Hardware Locks
Man-Trap Security Guards Access Logs Personal Identification Verification Card Smart Card Common Access Card CHECKPOINT REVIEW QUESTIONS REVIEW ANSWERS
7 Authentication and Identity Management
Objective 7.01 Explain the Fundamental Concepts and Best Practices Related to Authentication, Authorization, and Access Services
Authentication Models
Single-Factor Authentication Two-Factor Authentication Multifactor Authentication Single Sign-On
Authentication Methods
Remote Access Authentication Remote Access Applications Remote Access Protocols VPN Protocols
Objective 7.02 Explain the Function and Purpose of Authentication Services
PAP CHAP LANMAN NTLM and NTLMv2 Extensible Authentication Protocol RADIUS LDAP SAML TACACS Kerberos OAuth and OpenID Connect 802.1X Certificates (Mutual Authentication) HOTP/TOTP Biometrics CHECKPOINT REVIEW QUESTIONS REVIEW ANSWERS
IV Network Security
8 Securing Networks
Objective 8.01 Implement Security Functionality on Network Devices and Other Technologies
Firewalls Routers Switches Load Balancers Proxy Servers All-in-One Security Appliances
Data Loss Prevention Malware Inspection Anti-spam Filter Content Filtering URL Filtering
Security Information and Event Management Web Security Gateway Intrusion Detection and Prevention
Active Detection Passive Detection Monitoring Methodologies
Application-Aware Devices Protocol Analyzers
Objective 8.02 Explain Network Design Elements and Compounds
Security Zones
DMZ Intranet Extranet
Network Security Techniques
NAC NAT Internal Network Addressing Subnetting VLAN
Remote Access
Modems VPN Telephony VoIP Media Gateway
Virtualization Cloud Computing
Everything as a Service Cloud Deployment
CHECKPOINT REVIEW QUESTIONS REVIEW ANSWERS
9 Secure Network Administration
Objective 9.01 Implement and Use Common Protocols
TCP/IP
IPv4 IPv6
ICMP HTTP and HTTPS Telnet SSH
FTP TFTP FTPS and SFTP SCP
DNS SNMP IPSec NetBIOS iSCSI Fibre Channel RTP
Objective 9.02 Identify Commonly Used Default Network Ports
TCP/IP Network Ports
Objective 9.03 Analyze and Differentiate Among Types of Network Attacks
Denial of Service
Distributed Denial of Service Ping Attack SYN Flood DNS Amplification Flood Protection
Back Door NULL Sessions Spoofing Smurf Attack TCP/IP Hijacking Man-in-the-Middle Replay Xmas Attack DNS Poisoning ARP Poisoning Domain Kiting Typosquatting Client-side Attacks Watering Hole Attack Zero-Day Attack Malicious Insider Threats
Objective 9.04 Apply and Implement Secure Network Administration Principles
Networking Device Configuration
Firewall Administration Router Administration ACL Rules
Network Separation Unified Threat Management Network Device Threats and Risks
Weak Passwords Default Accounts Transitive Access and Privilege Escalation Network Loops
Network Device Hardening
Secure Remote Access Device Placement Disable Unused Services Employ DDoS Mitigation Firmware/OS Updates Log Files
CHECKPOINT REVIEW QUESTIONS REVIEW ANSWERS
10 Securing Wireless Networks
Objective 10.01 Implement Wireless Networks in a Secure Manner
Wireless LAN Technologies
Narrowband Technology Spread-Spectrum Technology Infrared Technology
Wireless Access
Site Surveys WLAN Topologies
Wireless Protocols
Wireless Access Protocol Bluetooth 802.11
Securing Wireless Networks Access Point Security Service Set Identifier MAC Address Filtering Encryption WPA and WPA2 Security Wi-Fi Protected Setup 802.1X Wireless Authentication Protocols
EAP LEAP PEAP
VPN Wireless Access Personal Firewall Captive Portals
Objective 10.02 Analyze and Differentiate Among Types of Wireless Attacks
Data Emanation Jamming Bluetooth Vulnerabilities Near-Field Communication War Driving Access Points (Evil Twin) Deauthentication and Disassociation War Chalking Packet Sniffing and Eavesdropping Replay Attacks WPS Attacks WEP/WPA Attacks
IV Attack TKIP Attack WPA2 Attacks
CHECKPOINT REVIEW QUESTIONS REVIEW ANSWERS
V Host, Application, and Data Security
11 Securing Host Systems
Objective 11.01 Analyze and Differentiate Among Types of Malware
Viruses
Types of Viruses File Types That Commonly Carry Viruses Polymorphic Malware Metamorphic Malware
Keyloggers Trojan Horses
Remote Access Trojan
Logic Bombs Worms Adware and Spyware Ransomware Rootkits Botnets
Objective 11.02 Carry Out Appropriate Procedures to Establish Host Security
Physical Hardware Security
Supply Chain Risk
Host Software Security Baseline Operating System Hardening
Trusted Operating System Operating System Updates Patch Management BIOS and UEFI Security Services and OS Configuration File System Security System User Accounts and Password Threats Management Interface Security Host Internet Access Software Access and Privileges Peripherals
Host Security Applications
Whitelists or Blacklists Antivirus and Anti-spyware Software Virus Signature Files Anti-spam Software Host-Based Firewalls Web Browser Security Host-Based Intrusion Detection System Live Media
Virtualization
Hypervisors Virtualization Risks
Objective 11.03 Understand Mobile Security Concepts and Technologies
Mobile Device Security
Securing Your Connection
Deployment Models
BYOD CYOD COPE Corporate-Owned VDI
Deployment Concerns
Ownership Security Management Legal
Protection from Theft
Password/Screen Lock/Lockout Biometrics GPS Tracking Remote Wipe Full Device Encryption Voice Encryption
Protection from Users
Mobile Camera Security Mobile Device Management Asset Control Push Notification Technologies Storage Data Containerization
CHECKPOINT REVIEW QUESTIONS REVIEW ANSWERS
12 Securing Applications and Data
Objective 12.01 Analyze and Differentiate Among Types of Attacks and Vulnerabilities
Web Application Vulnerabilities
JavaScript ActiveX Buffer Overflows Resource Exhaustion Privilege Escalation Hijacking HTML Attachments Malicious Add-Ons CGI Scripts Cross-Site Scripting Cross-Site Request Forgery (XSRF) Header Manipulation Injection Directory Traversal Arbitrary Code Execution Zero-Day Attacks Race Conditions
Internet Server Vulnerabilities
FTP Servers DNS Servers DHCP Servers Database Servers LDAP and Directory Services E-mail Servers
General Considerations
Objective 12.02 Explain the Importance of Application Security
Development Life-Cycle Models
Waterfall Method Agile Method
Secure Coding Concepts
Secure Development Operations Change Management Input Validation Escaping Code Testing and Verification Error and Exception Handling Transitive Access Server-Side vs. Client-Side Validation Cross-Site Scripting Cross-Site Request Forgery Code Reuse and Third-Party Libraries Secure Deployment
NoSQL vs. SQL Databases Application Hardening
Application Configuration Baseline Application Patch Management
Objective 12.03 Explain the Importance of Data Security
Data Loss Prevention Data Encryption
Trusted Platform Module Hardware Security Module Full Disk Encryption Database Encryption Individual File Encryption Removable Media and Mobile Devices Data Destruction and Media Sanitization
Cloud Storage Storage Area Networks Handling Big Data CHECKPOINT REVIEW QUESTIONS REVIEW ANSWERS
VI Threats and Vulnerabilities
13 Monitoring for Security Threats
Objective 13.01 Analyze, Interpret, and Troubleshoot Different Types of Mitigation and Deterrent Techniques
Security Posture Detecting Security-Related Anomalies
System and Performance Monitoring Protocol Analyzers Network Monitor Intrusion Detection and Intrusion Prevention Systems Bypass of Security Equipment
Monitoring Logs
System Logs Performance Logs Access Logs DNS Logs Firewall Logs Antivirus Logs Security Logging Applications Reports and Trend Monitoring Alarms and Notifications
System Auditing
System Baselines Auditing Event Logs User Access Rights Review Reviewing Audit Information Auditing the Administrators Storage and Retention Policies
Hardening the System
Disable Unnecessary Services Protect Management Interfaces and Applications Utilize Password Protection Disable Unnecessary Accounts Improve Baseline Configurations Ensure Systems Are Up to Date Implement User Training
Network Security
Limit and Filter MAC Addresses 802.1X Disable Unused Interfaces and Ports Rogue Machine Detection
Mitigating Threats in Alternative Environments CHECKPOINT REVIEW QUESTIONS REVIEW ANSWERS
14 Vulnerability Assessments
Objective 14.01 Implement Assessment Tools and Techniques to Discover Security Threats and Vulnerabilities
Vulnerability Assessment Tools
Banner Grabbing Network Mappers Port Scanners Vulnerability Scanners Protocol Analyzers Password Crackers Honeypots and Honeynets Other Command-Line Tools OVAL Application Code Assessments
Objective 14.02 Implement Penetration Tests When Appropriate
White, Black, and Gray Box Testing
White Box Testing Black Box Testing Gray Box Testing
CHECKPOINT REVIEW QUESTIONS REVIEW ANSWERS
VII Appendixes
A Career Flight Path
CompTIA Security+ Exam Format CompTIA Security+ and Beyond Getting the Latest Information on the CompTIA Security+ Exam
B About the Download
System Requirements About Total Tester
Installing and Running Total Tester
Technical Support
Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion