Comp. TIA Security+ SY0- 4. Cert Guide, Deluxe Edition, 3rd Edition. Online Sample Chapter. Comp. TIA Security+ SY0- 4. Authorized Cert Guide: OS Hardening and Virtualization.
Table of Contents Introduction xxii. Chapter 1 Introduction to Security 3 Foundation Topics 3 Security 1. The CIA of Computer Security 3 The Basics of Information Security 5 Think Like a Hacker 8 Chapter Review Activities 1. Review Key Topics 1. Define Key Terms 1. Review Questions 1.
Answers and Explanations 1. Chapter 2 Computer Systems Security 1. Foundation Topics 1. Computer Systems Security Threats 1. Malicious Software 1. Viruses 1. 8 Worms 1.
![Comptia Security Exam Cram 3Rd Edition Comptia Security Exam Cram 3Rd Edition](http://ecx.images-amazon.com/images/I/51y3t3XwyzL._SL160_.jpg)
- This thread contains errata concerning incorrect or incomplete information in the A+ Exam Cram 6th Edition, 1st printing, and the CompTIA.
- The Premium Edition eBook and Practice Test is a digital-only certification preparation product combining an eBook with enhanced Pearson IT Certification.
- Study your flashcards anywhere! Download the official Cram app for free >.
6. Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, 3rd Edition (Exam N10-005) (CompTIA Authorized) by Michael. CompTIA Security+ SY0-401 Exam Cram (4th Edition) CompTIA Security+ SY0-401 Exam Cram (4th Edition) In its Third Edition, this is the Authorized Cert Guide.
Trojan Horses 2. 0 Ransomware 2. Spyware 2. 1 Rootkits 2. Spam 2. 2 Summary of Malware Threats 2. Ways to Deliver Malicious Software 2. Via Software, Messaging, and Media 2. Botnets and Zombies 2.
Active Interception 2. Privilege Escalation 2. Backdoors 2. 6 Logic Bombs 2. Preventing and Troubleshooting Malware 2. Preventing and Troubleshooting Viruses 2.
Preventing and Troubleshooting Worms and Trojans 3. Preventing and Troubleshooting Spyware 3. Preventing and Troubleshooting Rootkits 3. Preventing and Troubleshooting Spam 3. You Can’t Save Every Computer from Malware! Summary of Malware Prevention Techniques 3.
Implementing Security Applications 3. Personal Software Firewalls 3.
Host- Based Intrusion Detection Systems 4. Pop- Up Blockers 4. Data Loss Prevention Systems 4.
Securing Computer Hardware, Peripherals, and Mobile Devices 4. Securing the BIOS 4. Securing Storage Devices 4. Removable Storage 4. Network Attached Storage 4. Whole Disk Encryption 4. Hardware Security Modules 5.
Securing Mobile Devices 5. Malware 5. 1 Botnet Activity 5. SIM Cloning 5. 2 Wireless Attacks 5. Theft 5. 3 Application Security 5. BYOD Concerns 5. 7 Chapter Summary 6. Chapter Review Activities 6. Review Key Topics 6.
Define Key Terms 6. Review Questions 6. Answers and Explanations 7. Case Studies for Chapter 2 7. Case Study Solutions 7.
Chapter 3 OS Hardening and Virtualization 8. Foundation Topics 8.
Hardening Operating Systems 8. Removing Unnecessary Applications and Services 8. Service Packs 9. 2 Windows Update, Patches, and Hotfixes 9. Patches and Hotfixes 9. Patch Management 9.
Group Policies, Security Templates, and Configuration Baselines 1. Hardening File Systems and Hard Drives 1. Virtualization Technology 1.
Types of Virtualization and Their Purposes 1. Hypervisor 1. 09 Securing Virtual Machines 1. Chapter Summary 1. Chapter Review Activities 1. Review Key Topics 1. Define Key Terms 1.
Review Questions 1. Answers and Explanations 1. Case Studies for Chapter 3 1.
Case Study Solutions 1. Chapter 4 Application Security 1. Foundation Topics 1.
Securing the Browser 1. General Browser Security Procedures 1.
Implement Policies 1. Train Your Users 1. Use a Proxy and Content Filter 1. Secure Against Malicious Code 1. Securing Internet Explorer 1. Securing Firefox 1. Securing Other Browsers 1.
Securing Other Applications 1. Secure Programming 1.
Systems Development Life Cycle 1. Programming Testing Methods 1. Programming Vulnerabilities and Attacks 1. Backdoors 1. 57 Buffer Overflows 1. Arbitrary Code Execution/Remote Code Execution 1. XSS and XSRF 1. 59 More Code Injection Examples 1.
Directory Traversal 1. Zero Day Attack 1. Chapter Summary 1. Chapter Review Activities 1. Review Key Topics 1.
Define Key Terms 1. Review Questions 1. Answers and Explanations 1. Case Studies for Chapter 4 1.
Case Study Solutions 1. Chapter 5 Network Design Elements 1. Foundation Topics 1. Network Design 1. The OSI Model 1. 80 Network Devices 1. Hub 1. 82 Switch 1. Router 1. 84 Network Address Translation, and Private Versus Public IP 1.
Network Zones and Interconnections 1. LAN Versus WAN 1. Internet 1. 89 Demilitarized Zone (DMZ) 1. Intranets and Extranets 1. Network Access Control (NAC) 1. Subnetting 1. 92 Virtual Local Area Network (VLAN) 1. Telephony Devices 1.
Modems 1. 96 PBX Equipment 1. Vo. IP 1. 97 Cloud Security and Server Defense 1. Cloud Computing 1. Cloud Security 2. Server Defense 2. File Servers 2. 03 Network Controllers 2.
E- mail Servers 2. Web Servers 2. 05 FTP Server 2. Chapter Summary 2. Chapter Review Activities 2. Review Key Topics 2. Define Key Terms 2. Review Questions 2.
Answers and Explanations 2. Case Studies for Chapter 5 2. Case Study Solutions 2. Chapter 6 Networking Protocols and Threats 2. Foundation Topics 2.
Ports and Protocols 2. Ports Ranges, Inbound Versus Outbound, and Common Ports 2. Protocols That Can Cause Anxiety on the Exam 2.
Malicious Attacks 2. Do. S 2. 36 DDo. S 2. 39 Sinkholes and Blackholes 2. Spoofing 2. 40 Session Hijacking 2. Replay 2. 43 Null Sessions 2. Transitive Access and Client- Side Attacks 2. DNS Poisoning and Other DNS Attacks 2.
ARP Poisoning 2. 47 Summary of Network Attacks 2. Chapter Summary 2. Chapter Review Activities 2. Review Key Topics 2. Define Key Terms 2. Review Questions 2.
Answers and Explanations 2. Case Studies for Chapter 6 2. Case Study Solutions 2.
Chapter 7 Network Perimeter Security 2. Foundation Topics 2. Firewalls and Network Security 2. Firewalls 2. 68 Proxy Servers 2. Honeypots and Honeynets 2.
Data Loss Prevention (DLP) 2. NIDS Versus NIPS 2. NIDS 2. 79 NIPS 2.
Summary of NIDS Versus NIPS 2. The Protocol Analyzer’s Role in NIDS and NIPS 2. Unified Threat Management 2. Chapter Summary 2. Chapter Review Activities 2. Review Key Topics 2.
Define Key Terms 2. Review Questions 2. Answers and Explanations 2. Case Studies for Chapter 7 2. Case Study Solutions 2.
Chapter 8 Securing Network Media and Devices 2. Foundation Topics 2.
Securing Wired Networks and Devices 2. Network Device Vulnerabilities 3. Default Accounts 3. Weak Passwords 3. Privilege Escalation 3. Back Doors 3. 03 Network Attacks 3. Other Network Device Considerations 3.
Cable Media Vulnerabilities 3. Interference 3. 05 Crosstalk 3. Data Emanation 3. Tapping into Data and Conversations 3. Securing Wireless Networks 3.
Wireless Access Point Vulnerabilities 3. The Administration Interface 3. SSID Broadcast 3. Rogue Access Points 3. Evil Twin 3. 11 Weak Encryption 3. Wi- Fi Protected Setup 3.
VPN over Open Wireless 3. Wireless Access Point Security Strategies 3. Wireless Transmission Vulnerabilities 3. Bluetooth Vulnerabilities 3. Bluejacking 3. 19 Bluesnarfing 3. Chapter Summary 3. Chapter Review Activities 3.
Review Key Topics 3. Define Key Terms 3. Review Questions 3. Answers and Explanations 3. Case Studies for Chapter 8 3.
Case Study Solutions 3. Chapter 9 Physical Security and Authentication Models 3.
Foundation Topics 3. Physical Security 3. General Building and Server Room Security 3. Door Access 3. 42 Biometric Readers 3. Authentication Models and Components 3. Authentication Models 3.
Localized Authentication Technologies 3. X and EAP 3. 48 LDAP 3. Kerberos and Mutual Authentication 3. Remote Desktop Services 3. Remote Authentication Technologies 3.
Remote Access Service 3. Virtual Private Networks 3. RADIUS Versus TACACS 3.
Chapter Summary 3. Chapter Review Activities 3. Review Key Topics 3. Define Key Terms 3. Review Questions 3. Answers and Explanations 3.
Case Studies for Chapter 9 3. Case Study Solutions 3.
Chapter 1. 0 Access Control Methods and Models 3. Foundation Topics 3. Access Control Models Defined 3.
Discretionary Access Control 3. Mandatory Access Control 3. Role- Based Access Control (RBAC) 3. Access Control Wise Practices 3.
Rights, Permissions, and Policies 3. Users, Groups, and Permissions 3. Permission Inheritance and Propagation 3.
Moving and Copying Folders and Files 3. Usernames and Passwords 3.
Policies 4. 00 User Account Control (UAC) 4. Chapter Summary 4. Chapter Review Activities 4. Review Key Topics 4. Define Key Terms 4.
Review Questions 4. Answers and Explanations 4. Case Studies for Chapter 1.
Case Study Solutions 4. Chapter 1. 1 Vulnerability and Risk Assessment 4. Foundation Topics 4.
Conducting Risk Assessments 4. Qualitative Risk Assessment 4. Quantitative Risk Assessment 4. Security Analysis Methodologies 4. Security Controls 4. Vulnerability Management 4. Penetration Testing 4.
OVAL 4. 34 Assessing Vulnerability with Security Tools 4. Network Mapping 4. Vulnerability Scanning 4.
Network Sniffing 4. Password Analysis 4. Chapter Summary 4. Chapter Review Activities 4. Review Key Topics 4.
Define Key Terms 4. Review Questions 4. Answers and Explanations 4. Case Studies for Chapter 1. Case Study Solutions 4. Chapter 1. 2 Monitoring and Auditing 4. Foundation Topics 4.
Monitoring Methodologies 4. Signature- Based Monitoring 4. Anomaly- Based Monitoring 4. Behavior- Based Monitoring 4. Using Tools to Monitor Systems and Networks 4. Performance Baselining 4. Protocol Analyzers 4.
Wireshark 4. 71 Network Monitor 4. SNMP 4. 74 Analytical Tools 4. Conducting Audits 4. Auditing Files 4. Logging 4. 81 Log File Maintenance and Security 4. Auditing System Security Settings 4. Chapter Summary 4.
Chapter Review Activities 4. Review Key Topics 4.
Define Key Terms 4. Review Questions 4. Answers and Explanations 4. Case Studies for Chapter 1. Case Study Solutions 5.
Chapter 1. 3 Encryption and Hashing Concepts 5. Foundation Topics 5. Cryptography Concepts 5. Symmetric Versus Asymmetric Key Algorithms 5. Symmetric Key Algorithms 5. Asymmetric Key Algorithms 5.
Public Key Cryptography 5. Key Management 5. Steganography 5. 15 Encryption Algorithms 5.
DES and 3. DES 5. AES 5. 17 RC 5. Blowfish and Twofish 5. Summary of Symmetric Algorithms 5. RSA 5. 19 Diffie- Hellman 5. Elliptic Curve 5. More Encryption Types 5.
One- Time Pad 5. 23 PGP 5. Hashing Basics 5. Cryptographic Hash Functions 5. MD5 5. 27 SHA 5. RIPEMD and HMAC 5. Happy Birthday! 5.
LANMAN, NTLM, and NTLMv. LANMAN 5. 29 NTLM and NTLMv. Additional Password Hashing Concepts 5. Chapter Summary 5. Chapter Review Activities 5. Review Key Topics 5. Define Key Terms 5.
Review Questions 5. Answers and Explanations 5.
Case Studies for Chapter 1. Case Study Solutions 5. Chapter 1. 4 PKI and Encryption Protocols 5.