Sale!

CompTIA Security+ Guide to Network Security Fundamentals by Mark Ciampa EBOOK PDF Instant Download

$19.00

Category:

Description

CompTIA Security+ Guide to Network Security Fundamentals by Mark Ciampa EBOOK PDF Instant Download

Table of Contents

Contents
Introduction
Chapter 1: Introduction to Security
Challenges of Securing Information
What Is Information Security?
Who Are the Attackers?
Attacks and Defenses
Chapter Summary
Key Terms
Review Questions
Hands-On Projects
Case Projects
References
Part I: Threats
Chapter 2: Malware and Social Engineering Attacks
Attacks Using Malware
Social Engineering Attacks
Chapter Summary
Key Terms
Review Questions
Hands-On Projects
Case Projects
References
Chapter 3: Application and Networking-Based Attacks
Application Attacks
Networking-Based Attacks
Chapter Summary
Key Terms
Review Questions
Hands-On Projects
Case Projects
Part II: Application, Data, and Host Security
Chapter 4: Host, Application, and Data Security
Securing the Host
Securing Static Environments
Application Security
Securing Data
Chapter Summary
Key Terms
Review Questions
Hands-On Projects
Case Projects
References
Part III: Cryptography
Chapter 5: Basic Cryptography
Defining Cryptography
Cryptographic Algorithms
Using Cryptography
Chapter Summary
Key Terms
Review Questions
Hands-On Projects
Case Projects
References
Chapter 6: Advanced Cryptography
Digital Certificates
Public Key Infrastructure (PKI)
Key Management
Cryptographic Transport Protocols
Chapter Summary
Key Terms
Review Questions
Hands-On Projects
Case Projects
References
Part IV: Network Security
Chapter 7: Network Security Fundamentals
Security Through Network Devices
Security Through Network Technologies
Security Through Network Design Elements
Chapter Summary
Key Terms
Review Questions
Hands-On Projects
Case Projects
Chapter 8: Administering a Secure Network
Common Network Protocols
Network Administration Principles
Securing Network Applications and Platforms
Chapter Summary
Key Terms
Review Questions
Hands-On Projects
Case Projects
References
Part V: Mobile Security
Chapter 9: Wireless Network Security
Wireless Attacks
Vulnerabilities of IEEE Wireless Security
Wireless Security Solutions
Chapter Summary
Key Terms
Review Questions
Hands-On Projects
Case Projects
References
Chapter 10: Mobile Device Security
Types of Mobile Devices
Mobile Device Risks
Securing Mobile Devices
Mobile Device App Security
BYOD Security
Chapter Summary
Key Terms
Review Questions
Hands-On Projects
Case Projects
References
Part VI: Access Control and Identity Management
Chapter 11: Access Control Fundamentals
What Is Access Control?
Implementing Access Control
Authentication Services
Chapter Summary
Key Terms
Review Questions
Hands-On Projects
Case Projects
Reference
Chapter 12: Authentication and Account Management
Authentication Credentials
Single Sign-On
Account Management
Chapter Summary
Key Terms
Review Questions
Hands-On Projects
Case Projects
References
Part VII: Compliance and Operational Security
Chapter 13: Business Continuity
What Is Business Continuity?
Disaster Recovery
Environmental Controls
Incident Response
Chapter Summary
Key Terms
Review Questions
Hands-On Projects
Case Projects
References
Chapter 14: Risk Mitigation
Controlling Risk
Reducing Risk Through Policies
Awareness and Training
Chapter Summary
Key Terms
Review Questions
Hands-On Projects
Case Projects
Reference
Chapter 15: Vulnerability Assessment
Assessing Vulnerabilities
Vulnerability Scanning vs. Penetration Testing
Third-Party Integration
Mitigating and Deterring Attacks
Chapter Summary
Key Terms
Review Questions
Hands-On Projects
Case Projects
References
Appendix A: CompTIA SY0-401 Certification Exam Objectives
Appendix B: Downloads and Tools for Hands-On Projects
Appendix C: Security Websites
Appendix D: Selected TCP/IP Ports and Their Threats
Appendix E: Information Security Community Site
Glossary
Index