Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Title Page
Copyright
Publisher's Note
Dedication
About the Authors
Acknowledgments
Table of Exercises
CompTIA
Introduction
Exam SY0-401 Exam Objectives
Assessment Test
Answers to Assessment Test
Chapter 1: Measuring and Weighing Risk
Risk Assessment
Developing Policies, Standards, and Guidelines
Summary
Exam Essentials
Review Question
Chapter 2: Monitoring and Diagnosing Networks
Monitoring Networks
Understanding Hardening
Securing the Network
Security Posture
Reporting Security Issues
Differentiating between Detection Controls and Prevention Controls
Summary
Exam Essentials
Review Question
Chapter 3: Understanding Devices and Infrastructure
Mastering TCP/IP
Designing a Secure Network
Understanding the Various Network Infrastructure Devices
Summary
Exam Essentials
Review Question
Chapter 4: Access Control, Authentication, and Authorization
Understanding Access Control Basics
Understanding Remote Access Connectivity
Understanding Authentication Services
Understanding Access Control
Implementing Access Controlling Best Practices
Summary
Exam Essentials
Review Question
Chapter 5: Protecting Wireless Networks
Working with Wireless Systems
Understanding Wireless Devices
Wireless Vulnerabilities to Know
Summary
Exam Essentials
Review Question
Chapter 6: Securing the Cloud
Working with Cloud Computing
Working with Virtualization
Security and the Cloud
Summary
Exam Essentials
Review Question
Chapter 7: Host, Data, and Application Security
Application Hardening
Host Security
Protecting Data Through Fault Tolerance
Application Security
Best Practices for Security
Summary
Exam Essentials
Review Question
Chapter 8: Cryptography
An Overview of Cryptography
Modern Cryptography
Using Cryptographic Systems
Understanding Cryptography Standards and Protocols
Using Public-Key Infrastructure
Summary
Exam Essentials
Review Question
Chapter 9: Malware, Vulnerabilities, and Threats
Understanding Malware
Surviving Viruses
Understanding Various Types of Attacks
Identifying Types of Application Attacks
Tools for Finding Threats
Summary
Exam Essentials
Review Question
Chapter 10: Social Engineering and Other Foes
Understanding Social Engineering
Understanding Physical Security
Environmental Controls
Control Types
Data Policies
Summary
Exam Essentials
Review Question
Chapter 11: Security Administration
Third-Party Integration
Understanding Security Awareness and Training
Classifying Information
Information Access Controls
Complying with Privacy and Security Regulations
Mobile Devices
Alternative Methods to Mitigate Security Risks
Summary
Exam Essentials
Review Question
Chapter 12: Disaster Recovery and Incident Response
Issues Associated with Business Continuity
Reinforcing Vendor Support
Penetration Testing
Summary
Exam Essentials
Review Questions
Appendix A: Answers to Review Questions
Chapter 1: Measuring and Weighing Risk
Chapter 2: Monitoring and Diagnosing Networks
Chapter 3: Understanding Devices and Infrastructure
Chapter 4: Access Control, Authentication, and Authorization
Chapter 5: Protecting Wireless Networks
Chapter 6: Securing the Cloud
Chapter 7: Host, Data, and Application Security
Chapter 8: Cryptography
Chapter 9: Malware, Vulnerabilities, and Threats
Chapter 10: Social Engineering and Other Foes
Chapter 11: Security Administration
Chapter 12: Disaster Recovery and Incident Response
Appendix B: About the Additional Study Tools
Additional Study Tools
System Requirements
Using the Study Tools
Troubleshooting
Free Online Study Tools
End User License Agreement
← Prev
Back
Next →
← Prev
Back
Next →