Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Dedication Acknowledgments About the Author Introduction Who This Book Is For About This Book How to Use This Book Conventions Remember This Vendor Neutral Free Online Resources Additional Web Resources Assumptions Set a Goal About the Exam Passing Score Exam Prerequisites Beta Questions Exam Format Question Types
Multiple Choice Performance-Based Questions Question Complexity
Video Exam Test Provider Voucher Code for 10 Percent Off Exam Domains Objective to Chapter Map
1.0 Threats, Attacks and Vulnerabilities 21% 2.0 Technologies and Tools 22% 3.0 Architecture and Design 15% 4.0 Identity and Access Management 16% 5.0 Risk Management 14% 6.0 Cryptography and PKI 12%
Recertification Requirements Pre-Assessment Exam Assessment Exam Answers Chapter 1 Mastering Security Basics Understanding Core Security Goals What Is a Use Case? Ensure Confidentiality
Encryption Access Controls Steganography and Obfuscation
Provide Integrity
Hashing Digital Signatures, Certificates, and Non-Repudiation
Increase Availability
Redundancy and Fault Tolerance Patching
Resource Versus Security Constraints Introducing Basic Risk Concepts Understanding Control Types Technical Controls Administrative Controls Physical Controls Control Goals
Preventive Controls Detective Controls Comparing Detection and Prevention Controls Corrective Controls Deterrent Controls Compensating Controls
Combining Control Types and Goals Implementing Virtualization Comparing Hypervisors Application Cell or Container Virtualization Secure Network Architecture
Snapshots VDI/VDE and Non-Persistence VMs as Files Risks Associated with Virtualization Running Kali Linux in a VM
Using Command-Line Tools Windows Command Line Linux Terminal Understanding Switches and Getting Help Understanding Case Ping
Using Ping to Check Name Resolution Beware of Firewalls Using Ping to Check Security Posture
Ipconfig, ifconfig, and ip Netstat Tracert Arp Chapter 1 Exam Topic Review Chapter 1 Practice Questions Chapter 1 Practice Question Answers Chapter 2 Understanding Identity and Access Management Exploring Authentication Concepts Comparing Identification and AAA Comparing Authentication Factors
Something You Know Something You Have Something You Are Somewhere You Are Dual-Factor and Multifactor Authentication
Summarizing Identification Methods Troubleshooting Authentication Issues Comparing Authentication Services Kerberos NTLM LDAP and LDAPS Single Sign-On Managing Accounts Least Privilege Need to Know Account Types Require Administrators to Use Two Accounts Standard Naming Convention Prohibiting Shared and Generic Accounts Disablement Policies Recovering Accounts Time-of-Day Restrictions Expiring Accounts and Recertification Account Maintenance Credential Management Comparing Access Control Models Role-Based Access Control
Using Roles Based on Jobs and Functions Documenting Roles with a Matrix Establishing Access with Group-Based Privileges
Rule-Based Access Control Discretionary Access Control
SIDs and DACLs The Owner Establishes Access Beware of Trojans
Mandatory Access Control
Labels and Lattice Establishing Access
Attribute-Based Access Control Chapter 2 Exam Topic Review Chapter 2 Practice Questions Chapter 2 Practice Question Answers Chapter 3 Exploring Network Technologies and Tools Reviewing Basic Networking Concepts Basic Networking Protocols Implementing Protocols for Use Cases
Voice and Video Use Case File Transfer Use Case Email and Web Use Cases Directory Services Use Case Remote Access Use Cases Time Synchronization Use Case Network Address Allocation Use Case Domain Name Resolution Use Case Subscription Services Use Case
Understanding and Identifying Ports
Combining the IP Address and the Port IP Address Used to Locate Hosts Server Ports Client Ports Putting It All Together The Importance of Ports in Security
Understanding Basic Network Devices Switches
Security Benefit of a Switch Port Security Physical Security of a Switch Loop Prevention Flood Attacks and Flood Guards
Routers
Routers and ACLs Implicit Deny Antispoofing
Bridge Aggregation Switch Firewalls
Host-Based Firewalls Application-Based Versus Network-Based Firewalls Stateless Firewall Rules Stateful Versus Stateless Web Application Firewall
Implementing a Secure Network Zones and Topologies
DMZ Understanding NAT and PAT
Network Separation
Physical Isolation and Airgaps Logical Separation and Segmentation Comparing a Layer 2 Versus Layer 3 Switch Isolating Traffic with a VLAN
Media Gateway Proxy Servers
Caching Content for Performance Transparent Proxy Versus Nontransparent Proxy Reverse Proxy Application Proxy
Mail Gateways Summarizing Routing and Switching Use Cases Chapter 3 Exam Topic Review Chapter 4 Securing Your Network Exploring Advanced Security Devices Understanding IDSs and IPSs
HIDS NIDS Sensor and Collector Placement Detection Methods Data Sources and Trends Reporting Based on Rules False Positives Versus False Negatives
IPS Versus IDS—Inline Versus Passive SSL/TLS Accelerators SSL Decryptors Honeypots Honeynets IEEE 802.1x Security Securing Wireless Networks Reviewing Wireless Basics
Fat Versus Thin Access Points Band Selection and Channel Widths Access Point SSID Disable SSID Broadcasting or Not Enable MAC Filtering Antenna Types and Placement Antenna Power and Signal Strength
Network Architecture Zones Wireless Cryptographic Protocols
WPA WPA2 TKIP Versus CCMP PSK, Enterprise, and Open Modes
Authentication Protocols Captive Portals Understanding Wireless Attacks Disassociation Attacks WPS and WPS Attacks Rogue AP Evil Twin Jamming Attacks IV Attacks NFC Attacks Bluetooth Attacks Wireless Replay Attacks RFID Attacks Misconfigured Access Points Using VPNs for Remote Access VPNs and VPN Concentrators Remote Access VPN
IPsec as a Tunneling Protocol TLS as a Tunneling Protocol Split Tunnel Versus Full Tunnel Site-to-Site VPNs Always-On VPN
Network Access Control
Host Health Checks Permanent Versus Dissolvable
Identity and Access Services
PAP CHAP MS-CHAP and MS-CHAPv2 RADIUS TACACS+ Diameter AAA Protocols
Chapter 4 Exam Topic Review Chapter 4 Practice Questions Chapter 5 Securing Hosts and Data Implementing Secure Systems Operating Systems Secure Operating System Configurations
Using Master Images Resiliency and Automation Strategies Secure Baseline and Integrity Measurements Patch Management Change Management Policy Unauthorized Software and Compliance Violations Application Whitelisting and Blacklisting
Secure Staging and Deployment
Sandboxing with VMs Sandboxing with Chroot Secure Staging Environment
Peripherals Hardware and Firmware Security
EMI and EMP FDE and SED UEFI and BIOS Trusted Platform Module Hardware Security Module
Summarizing Cloud Concepts Software as a Service Platform as a Service Infrastructure as a Service Security Responsibilities with Cloud Models Security as a Service Cloud Deployment Models Deploying Mobile Devices Securely Deployment Models Connection Methods Mobile Device Management Mobile Device Enforcement and Monitoring
Unauthorized Software Hardware Control Unauthorized Connections
Exploring Embedded Systems Security Implications and Vulnerabilities Comparing Embedded Systems Protecting Data
Protecting Confidentiality with Encryption Database Security File System Security
Data Loss Prevention
Removable Media Data Exfiltration Cloud-Based DLP
Chapter 5 Exam Topic Review Chapter 5 Practice Questions Chapter 5 Practice Question Answers Chapter 6 Comparing Threats, Vulnerabilities, and Common Attacks Understanding Threat Actors Determining Malware Types Viruses Worms Logic Bombs Backdoors Trojans RAT Ransomware Keylogger Spyware Adware Bots and Botnets Rootkits Recognizing Common Attacks Social Engineering
Impersonation Shoulder Surfing Tricking Users with Hoaxes Tailgating and Mantraps Dumpster Diving Watering Hole Attacks
Attacks via Email and Phone
Spam Phishing Spear Phishing Whaling Vishing
One Click Lets Them In Blocking Malware and Other Attacks Protecting Systems from Malware
Antivirus and Anti-Malware Software Data Execution Prevention Advanced Malware Tools Spam Filters
Educating Users
New Viruses Phishing Attacks Zero-Day Exploits
Why Social Engineering Works
Authority Intimidation Consensus Scarcity Urgency Familiarity Trust
Chapter 6 Exam Topic Review Chapter 6 Practice Questions Chapter 6 Practice Question Answers Chapter 7 Protecting Against Advanced Attacks Comparing Common Attacks DoS Versus DDoS Privilege Escalation Spoofing SYN Flood Attacks Man-in-the-Middle Attacks ARP Poisoning Attacks DNS Attacks
DNS Poisoning Attacks Pharming Attacks DDoS DNS Attacks
Amplification Attacks Password Attacks
Brute Force Attacks Dictionary Attacks Password Hashes Pass the Hash Attacks Birthday Attacks Rainbow Table Attacks
Replay Attacks Known Plaintext Attacks Hijacking and Related Attacks Domain Hijacking Man-in-the-Browser Driver Manipulation Zero-Day Attacks Memory Buffer Vulnerabilities
Memory Leak Integer Overflow Buffer Overflows and Buffer Overflow Attacks Pointer Dereference DLL Injection
Summarizing Secure Coding Concepts Compiled Versus Runtime Code Proper Input Validation
Client-Side and Server-Side Input Validation Other Input Validation Techniques
Avoiding Race Conditions Proper Error Handling Cryptographic Techniques Code Reuse and SDKs Code Obfuscation Code Quality and Testing Development Life-Cycle Models Secure DevOps Version Control and Change Management Provisioning and Deprovisioning Identifying Application Attacks Web Servers Database Concepts
Normalization SQL Queries
Injection Attacks Cross-Site Scripting Cross-Site Request Forgery Understanding Frameworks and Guides Chapter 7 Exam Topic Review Chapter 7 Practice Questions Chapter 7 Practice Question Answers Chapter 8 Using Risk Management Tools Understanding Risk Management Threats and Threat Assessments Vulnerabilities Risk Management
Risk Assessment Risk Registers Supply Chain Assessment
Comparing Scanning and Testing Tools Checking for Vulnerabilities
Password Crackers Network Scanners Banner Grabbing Vulnerability Scanning Credentialed Versus Non-Credentialed Configuration Compliance Scanner
Obtaining Authorization Penetration Testing
Passive Reconnaissance Active Reconnaissance Initial Exploitation Escalation of Privilege Pivot Persistence White, Gray, and Black Box Testing
Intrusive Versus Non-Intrusive Testing Passive Versus Active Tools Exploitation Frameworks Using Security Tools Sniffing with a Protocol Analyzer Command-Line Tools
Tcpdump Nmap Netcat
Monitoring Logs for Event Anomalies
Operating System Event Logs Firewall and Router Access Logs Linux Logs Other Logs
SIEM Continuous Monitoring Usage Auditing and Reviews Permission Auditing and Review Chapter 8 Exam Topic Review Chapter 8 Practice Questions Chapter 8 Practice Question Answers Chapter 9 Implementing Controls to Protect Assets Implementing Defense in Depth Comparing Physical Security Controls Using Signs Comparing Door Lock Types
Securing Door Access with Cipher Locks Securing Door Access with Cards Securing Door Access with Biometrics
Tailgating Preventing Tailgating with Mantraps Increasing Physical Security with Guards Monitoring Areas with Cameras Fencing, Lighting, and Alarms Securing Access with Barricades Using Hardware Locks
Securing Mobile Computers with Cable Locks Securing Servers with Locking Cabinets Securing Small Devices with a Safe
Asset Management Implementing Environmental Controls
Heating, Ventilation, and Air Conditioning Hot and Cold Aisles HVAC and Fire Fire Suppression Environmental Monitoring
Shielding
Protected Cabling Protected Distribution of Cabling Faraday Cage
Adding Redundancy and Fault Tolerance Single Point of Failure Disk Redundancies
RAID-0 RAID-1 RAID-5 and RAID-6 RAID-10
Server Redundancy and High Availability
Failover Clusters for High Availability Load Balancers for High Availability Clustering Versus Load Balancing
Power Redundancies Protecting Data with Backups Comparing Backup Types
Full Backups Restoring a Full Backup Differential Backups Order of Restoration for a Full/Differential Backup Set Incremental Backups Order of Restoration for a Full/Incremental Backup Set Choosing Full/Incremental or Full/Differential Snapshot Backup
Testing Backups Protecting Backups Backups and Geographic Considerations Comparing Business Continuity Elements Business Impact Analysis Concepts
Impact Privacy Impact and Threshold Assessments Recovery Time Objective Recovery Point Objective Comparing MTBF and MTTR
Continuity of Operations Planning
Recovery Sites Order of Restoration
Disaster Recovery Testing Plans with Exercises Chapter 9 Exam Topic Review Chapter 9 Practice Question Answers Chapter 10 Understanding Cryptography and PKI Introducing Cryptography Concepts Providing Integrity with Hashing MD5 SHA HMAC RIPEMD Hashing Files Hashing Passwords Key Stretching Hashing Messages Using HMAC Providing Confidentiality with Encryption Encryption Terms Block Versus Stream Ciphers Cipher Modes Symmetric Encryption
AES DES 3DES RC4 Blowfish and Twofish Symmetric Encryption Summary
Asymmetric Encryption
The Rayburn Box The Rayburn Box Used to Send Secrets The Rayburn Box Used for Authentication The Rayburn Box Demystified
Certificates RSA Static Versus Ephemeral Keys Elliptic Curve Cryptography Diffie-Hellman Steganography Using Cryptographic Protocols Protecting Email
Signing Email with Digital Signatures Encrypting Email S/MIME PGP/GPG
HTTPS Transport Encryption
SSL Versus TLS Encrypting HTTPS Traffic with TLS Cipher Suites Implementation Versus Algorithm Selection Downgrade Attacks on Weak Implementations
Exploring PKI Components Certificate Authority Certificate Chaining and Trust Models Registration and CSRs Revoking Certificates Certificate Issues Public Key Pinning Key Escrow Recovery Agent Comparing Certificate Types Certificate Formats Chapter 10 Exam Topic Review Chapter 10 Practice Questions Chapter 10 Practice Question Answers Chapter 11 Implementing Policies to Mitigate Risks Exploring Security Policies Personnel Management Policies
Acceptable Use Policy Mandatory Vacations Separation of Duties Job Rotation Clean Desk Policy Background Check NDA Exit Interview Onboarding Policy Violations and Adverse Actions Other General Security Policies Agreement Types
Protecting Data Information Classification Data Sensitivity Labeling and Handling
Data Destruction and Media Sanitization Data Retention Policies PII and PHI Protecting PII and PHI Legal and Compliance Issues Data Roles and Responsibilities
Responding to Incidents Incident Response Plan Incident Response Process Implementing Basic Forensic Procedures
Order of Volatility Data Acquisition and Preservation of Evidence Chain of Custody Legal Hold Recovery of Data Active Logging for Intelligence Gathering Track Man-Hours and Expense
Providing Training Role-Based Awareness Training Continuing Education Training and Compliance Issues Troubleshooting Personnel Issues Chapter 11 Exam Topic Review Chapter 11 Practice Questions Chapter 11 Practice Question Answers Post-Assessment Exam Assessment Exam Answers Appendix A—Glossary A B C D E F G I J K L M N O P Q R S T U V W X Z
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion