Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Title Page
Copyright Page
Dedication
Contents at a Glance
Contents
Acknowledgments
Check-In
I Mission Assurance
1 Organizational Security and Compliance
Objective 1.01 Explain Risk Management Processes and Concepts
Risk Control Types
Administrative
Technical
Physical
Risk Assessment
Asset Identification
Risk Analysis
Risk Likelihood and Impact
Solutions and Countermeasures
Risk Register
Risk Management Options
False Positives and Negatives
Using Organizational Policies to Reduce Risk
Security Policies
Network Security Policies
Human Resources Policies
Objective 1.02 Implement Appropriate Risk Mitigation Strategies
Change Management Policy
Incident Management and Response Policy
Perform Routine Audits
Develop Standard Operating Procedures
User Rights and Permissions Reviews
Data Loss Prevention and Regulatory Compliance
Objective 1.03 Integrate with Third Parties
Interoperability Agreements
Service Level Agreements
Business Partnership Agreements
Memorandums of Agreement/Understanding
Interconnection Security Agreement
Privacy Considerations
Risk Awareness
Unauthorized Data Sharing
Data Ownerships
Data Backup
Verification of Adherence
CHECKPOINT
REVIEW QUESTIONS
REVIEW ANSWERS
2 Security Training and Incident Response
Objective 2.01 Explain the Importance of Security-Related Awareness and Training
Effective Security Training and Awareness
Onboarding
Nondisclosure Agreements
Awareness Training
Continual Education
Threat Awareness
Recurring Training
Security Metrics
Data and Documentation Policies
Standards and Guidelines
Data Retention Policy
Hardware Disposal and Data Destruction Policy
IT Documentation
Best Practices for User Habits
Password Policy
Clean Desk Policy
Personally Owned Devices
Workstation Locking and Access Tailgating
Data Handling
Instant Messaging
P2P Applications
Social Networking/Media
Compliance with Laws, Regulations, Best Practices, and Standards
Objective 2.02 Analyze and Differentiate Among Types of Social Engineering Attacks
Phishing
Whaling
Shoulder Surfing
Tailgating
Pharming
Spim
Vishing
Spam
Hoaxes
Objective 2.03 Execute Appropriate Incident Response Procedures
Preparation
Incident Identification
First Responders
Incident Containment
Damage and Loss Control
Data Breaches
Escalation Policy
Reporting and Notification
Mitigation and Recovery Steps
Lessons Learned
Objective 2.04 Implement Basic Forensic Procedures
Data Acquisition and Preservation
Order of Volatility
Capture a System Image
Network and System Logs
Time Offsets
Use Hashing to Protect Evidence Integrity
Take Screenshots
Capture Video
Chain of Custody
Interview Witnesses
Track Resources Expended
Big Data Analysis
CHECKPOINT
REVIEW QUESTIONS
REVIEW ANSWERS
3 Business Continuity and Disaster Recovery
Objective 3.01 Explain Concepts of Business Continuity and Disaster Recovery
Select the Appropriate Control to Meet the Goals of Security
Types of Disasters
Natural
Human Error and Sabotage
Network and Hacking Attacks
Viruses
Recovery Plans
Disaster Recovery Team
Risk Analysis
Business Impact Analysis
Privacy Impact Assessment
Disaster Recovery and IT Contingency Plans
Documentation
Testing
After-Action Reporting
Objective 3.02 Execute Disaster Recovery and Continuity of Operations Plans and Procedures
High Availability and Redundancy Planning
Service Levels
Reliability Factors
Spare Equipment Redundancy
Alternate Site Redundancy
Alternate Business Practices
Fault Tolerance
Hard Drives
Power Supplies
Network Interface Cards
CPU
Uninterruptible Power Supply
Backups
Planning
Backup Hardware
Backup Types
Media Rotation and Retention
Backup Documentation
Restoration
Offsite Storage
Online Backup
Objective 3.03 Explain the Impact and Proper Use of Environmental Controls
Facility Construction Issues
Location Planning
Facility Construction
Computer Room Construction
Environmental Issues
Temperature
Humidity
Ventilation
Monitoring
Electrical Power
Cable Shielding
Coaxial
Twisted Pair
Fiber Optic
Wireless Networks and Cells
Fire Suppression
Water
Chemical-Based Fire Suppression
CHECKPOINT
REVIEW QUESTIONS
REVIEW ANSWERS
II Cryptography and PKI
4 Cryptography and Encryption Basics
Objective 4.01 Utilize the Concepts of Cryptography
Information Assurance
Confidentiality
Integrity
Authentication
Nonrepudiation
Obfuscation
Algorithms
Symmetric Keys
Asymmetric Keys
In-Band/Out-of-Band Key Exchange
Ephemeral Keys
Perfect Forward Secrecy
Random/Pseudo-Random Numbers and Inputs
Steganography
Digital Signatures
Basic Hashing Concepts
Message Digest Hashing
Message Digest 5 (MD5)
Secure Hash Algorithm (SHA)
RIPEMD
HMAC
Objective 4.02 Use and Apply Appropriate Cryptographic Tools and Products
Symmetric Encryption Algorithms
DES and 3DES
AES
Blowfish
Twofish
IDEA
RC4
Asymmetric Encryption Algorithms
RSA
Elliptic Curve Cryptography
Diffie–Hellman
DSA
One-Time Pad
Quantum Cryptography
Implementing Encryption Protocols
Wireless Encryption Protocol
Pretty Good Privacy
GNU Privacy Guard (GPG)
S/MIME
SSL and TLS
HTTPS
IPSec
SSH
Key Stretching
Decision Making
Data States
Choosing and Implementing the Best Method
CHECKPOINT
REVIEW QUESTIONS
REVIEW ANSWERS
5 Public Key Infrastructure
Objective 5.01 Explain the Fundamentals of Public Key Infrastructure
Digital Certificates
Certificate Authorities
Trust Models
Web of Trust
Third-Party (Single Authority) Trust
Hierarchical Model
Key Management and Storage
Centralized vs. Decentralized Storage
Key Storage and Protection
Key Escrow
Key Recovery
Multiple Key Pairs
Key History
Objective 5.02 Implementing PKI Concepts to Promote Trust
Certificate Life Cycle
Certificate Requested, Issued, Published, and Received
Certificate Suspension and Revocation
Certificate Expiration
Key Destruction
Certificate Renewal
CHECKPOINT
REVIEW QUESTIONS
REVIEW ANSWERS
III Identity and Access Management
6 Access Control
Objective 6.01 Explain the Fundamental Concepts and Best Practices Related to Authentication, Authorization, and Access Control
Users and Resources
Levels of Security
Access Security Grouping
Access Control Best Practices
Separation of Duties
Rotation of Job Duties
Mandatory Vacations
Implicit Deny
Explicit Deny
Least Privilege
Access Control Models
Mandatory Access Control
Discretionary Access Control
Role-Based Access Control
Rule-Based Access Control
Attribute-Based Access Control
Objective 6.02 Implement Appropriate Security Controls When Performing Account Management
Account Maintenance
Using Appropriate Naming Conventions
Limiting Logon Attempts
Setting Account Expiry Dates
Disabling Unused Accounts
Setting Time Restrictions
Setting Machine Restrictions
Using Tokens
Restricting Multiple/Shared/Guest/Generic Accounts
User Access Reviews
Credential Management
Password Policies
Domain Accounts and Single Sign-On
Federation
Security Roles and Privileges
User
Group
Role
File and Print Security Controls
File and Print ACLs
Objective 6.03 Analyze and Differentiate Among Types of Mitigation and Deterrent Techniques
Physical Barriers
Lighting
Video Surveillance
Locks
Hardware Locks
Man-Trap
Security Guards
Access Logs
Personal Identification Verification Card
Smart Card
Common Access Card
CHECKPOINT
REVIEW QUESTIONS
REVIEW ANSWERS
7 Authentication and Identity Management
Objective 7.01 Explain the Fundamental Concepts and Best Practices Related to Authentication, Authorization, and Access Services
Authentication Models
Single-Factor Authentication
Two-Factor Authentication
Multifactor Authentication
Single Sign-On
Authentication Methods
Remote Access Authentication
Remote Access Applications
Remote Access Protocols
VPN Protocols
Objective 7.02 Explain the Function and Purpose of Authentication Services
PAP
CHAP
LANMAN
NTLM and NTLMv2
Extensible Authentication Protocol
RADIUS
LDAP
SAML
TACACS
Kerberos
OAuth and OpenID Connect
802.1X
Certificates (Mutual Authentication)
HOTP/TOTP
Biometrics
CHECKPOINT
REVIEW QUESTIONS
REVIEW ANSWERS
IV Network Security
8 Securing Networks
Objective 8.01 Implement Security Functionality on Network Devices and Other Technologies
Firewalls
Routers
Switches
Load Balancers
Proxy Servers
All-in-One Security Appliances
Data Loss Prevention
Malware Inspection
Anti-spam Filter
Content Filtering
URL Filtering
Security Information and Event Management
Web Security Gateway
Intrusion Detection and Prevention
Active Detection
Passive Detection
Monitoring Methodologies
Application-Aware Devices
Protocol Analyzers
Objective 8.02 Explain Network Design Elements and Compounds
Security Zones
DMZ
Intranet
Extranet
Network Security Techniques
NAC
NAT
Internal Network Addressing
Subnetting
VLAN
Remote Access
Modems
VPN
Telephony
VoIP
Media Gateway
Virtualization
Cloud Computing
Everything as a Service
Cloud Deployment
CHECKPOINT
REVIEW QUESTIONS
REVIEW ANSWERS
9 Secure Network Administration
Objective 9.01 Implement and Use Common Protocols
TCP/IP
IPv4
IPv6
ICMP
HTTP and HTTPS
Telnet
SSH
FTP
TFTP
FTPS and SFTP
SCP
DNS
SNMP
IPSec
NetBIOS
iSCSI
Fibre Channel
RTP
Objective 9.02 Identify Commonly Used Default Network Ports
TCP/IP Network Ports
Objective 9.03 Analyze and Differentiate Among Types of Network Attacks
Denial of Service
Distributed Denial of Service
Ping Attack
SYN Flood
DNS Amplification
Flood Protection
Back Door
NULL Sessions
Spoofing
Smurf Attack
TCP/IP Hijacking
Man-in-the-Middle
Replay
Xmas Attack
DNS Poisoning
ARP Poisoning
Domain Kiting
Typosquatting
Client-side Attacks
Watering Hole Attack
Zero-Day Attack
Malicious Insider Threats
Objective 9.04 Apply and Implement Secure Network Administration Principles
Networking Device Configuration
Firewall Administration
Router Administration
ACL Rules
Network Separation
Unified Threat Management
Network Device Threats and Risks
Weak Passwords
Default Accounts
Transitive Access and Privilege Escalation
Network Loops
Network Device Hardening
Secure Remote Access
Device Placement
Disable Unused Services
Employ DDoS Mitigation
Firmware/OS Updates
Log Files
CHECKPOINT
REVIEW QUESTIONS
REVIEW ANSWERS
10 Securing Wireless Networks
Objective 10.01 Implement Wireless Networks in a Secure Manner
Wireless LAN Technologies
Narrowband Technology
Spread-Spectrum Technology
Infrared Technology
Wireless Access
Site Surveys
WLAN Topologies
Wireless Protocols
Wireless Access Protocol
Bluetooth
802.11
Securing Wireless Networks
Access Point Security
Service Set Identifier
MAC Address Filtering
Encryption
WPA and WPA2 Security
Wi-Fi Protected Setup
802.1X
Wireless Authentication Protocols
EAP
LEAP
PEAP
VPN Wireless Access
Personal Firewall
Captive Portals
Objective 10.02 Analyze and Differentiate Among Types of Wireless Attacks
Data Emanation
Jamming
Bluetooth Vulnerabilities
Near-Field Communication
War Driving
Access Points (Evil Twin)
Deauthentication and Disassociation
War Chalking
Packet Sniffing and Eavesdropping
Replay Attacks
WPS Attacks
WEP/WPA Attacks
IV Attack
TKIP Attack
WPA2 Attacks
CHECKPOINT
REVIEW QUESTIONS
REVIEW ANSWERS
V Host, Application, and Data Security
11 Securing Host Systems
Objective 11.01 Analyze and Differentiate Among Types of Malware
Viruses
Types of Viruses
File Types That Commonly Carry Viruses
Polymorphic Malware
Metamorphic Malware
Keyloggers
Trojan Horses
Remote Access Trojan
Logic Bombs
Worms
Adware and Spyware
Ransomware
Rootkits
Botnets
Objective 11.02 Carry Out Appropriate Procedures to Establish Host Security
Physical Hardware Security
Supply Chain Risk
Host Software Security Baseline
Operating System Hardening
Trusted Operating System
Operating System Updates
Patch Management
BIOS and UEFI Security
Services and OS Configuration
File System Security
System User Accounts and Password Threats
Management Interface Security
Host Internet Access
Software Access and Privileges
Peripherals
Host Security Applications
Whitelists or Blacklists
Antivirus and Anti-spyware Software
Virus Signature Files
Anti-spam Software
Host-Based Firewalls
Web Browser Security
Host-Based Intrusion Detection System
Live Media
Virtualization
Hypervisors
Virtualization Risks
Objective 11.03 Understand Mobile Security Concepts and Technologies
Mobile Device Security
Securing Your Connection
Deployment Models
BYOD
CYOD
COPE
Corporate-Owned
VDI
Deployment Concerns
Ownership
Security Management
Legal
Protection from Theft
Password/Screen Lock/Lockout
Biometrics
GPS Tracking
Remote Wipe
Full Device Encryption
Voice Encryption
Protection from Users
Mobile Camera Security
Mobile Device Management
Asset Control
Push Notification Technologies
Storage
Data Containerization
CHECKPOINT
REVIEW QUESTIONS
REVIEW ANSWERS
12 Securing Applications and Data
Objective 12.01 Analyze and Differentiate Among Types of Attacks and Vulnerabilities
Web Application Vulnerabilities
JavaScript
ActiveX
Buffer Overflows
Resource Exhaustion
Privilege Escalation
Hijacking
HTML Attachments
Malicious Add-Ons
CGI Scripts
Cross-Site Scripting
Cross-Site Request Forgery (XSRF)
Header Manipulation
Injection
Directory Traversal
Arbitrary Code Execution
Zero-Day Attacks
Race Conditions
Internet Server Vulnerabilities
FTP Servers
DNS Servers
DHCP Servers
Database Servers
LDAP and Directory Services
E-mail Servers
General Considerations
Objective 12.02 Explain the Importance of Application Security
Development Life-Cycle Models
Waterfall Method
Agile Method
Secure Coding Concepts
Secure Development Operations
Change Management
Input Validation
Escaping
Code Testing and Verification
Error and Exception Handling
Transitive Access
Server-Side vs. Client-Side Validation
Cross-Site Scripting
Cross-Site Request Forgery
Code Reuse and Third-Party Libraries
Secure Deployment
NoSQL vs. SQL Databases
Application Hardening
Application Configuration Baseline
Application Patch Management
Objective 12.03 Explain the Importance of Data Security
Data Loss Prevention
Data Encryption
Trusted Platform Module
Hardware Security Module
Full Disk Encryption
Database Encryption
Individual File Encryption
Removable Media and Mobile Devices
Data Destruction and Media Sanitization
Cloud Storage
Storage Area Networks
Handling Big Data
CHECKPOINT
REVIEW QUESTIONS
REVIEW ANSWERS
VI Threats and Vulnerabilities
13 Monitoring for Security Threats
Objective 13.01 Analyze, Interpret, and Troubleshoot Different Types of Mitigation and Deterrent Techniques
Security Posture
Detecting Security-Related Anomalies
System and Performance Monitoring
Protocol Analyzers
Network Monitor
Intrusion Detection and Intrusion Prevention Systems
Bypass of Security Equipment
Monitoring Logs
System Logs
Performance Logs
Access Logs
DNS Logs
Firewall Logs
Antivirus Logs
Security Logging Applications
Reports and Trend Monitoring
Alarms and Notifications
System Auditing
System Baselines
Auditing Event Logs
User Access Rights Review
Reviewing Audit Information
Auditing the Administrators
Storage and Retention Policies
Hardening the System
Disable Unnecessary Services
Protect Management Interfaces and Applications
Utilize Password Protection
Disable Unnecessary Accounts
Improve Baseline Configurations
Ensure Systems Are Up to Date
Implement User Training
Network Security
Limit and Filter MAC Addresses
802.1X
Disable Unused Interfaces and Ports
Rogue Machine Detection
Mitigating Threats in Alternative Environments
CHECKPOINT
REVIEW QUESTIONS
REVIEW ANSWERS
14 Vulnerability Assessments
Objective 14.01 Implement Assessment Tools and Techniques to Discover Security Threats and Vulnerabilities
Vulnerability Assessment Tools
Banner Grabbing
Network Mappers
Port Scanners
Vulnerability Scanners
Protocol Analyzers
Password Crackers
Honeypots and Honeynets
Other Command-Line Tools
OVAL
Application Code Assessments
Objective 14.02 Implement Penetration Tests When Appropriate
White, Black, and Gray Box Testing
White Box Testing
Black Box Testing
Gray Box Testing
CHECKPOINT
REVIEW QUESTIONS
REVIEW ANSWERS
VII Appendixes
A Career Flight Path
CompTIA Security+ Exam Format
CompTIA Security+ and Beyond
Getting the Latest Information on the CompTIA Security+ Exam
B About the Download
System Requirements
About Total Tester
Installing and Running Total Tester
Technical Support
Index
← Prev
Back
Next →
← Prev
Back
Next →