Description

Eleventh Hour Network+: Exam N10-004 Study Guide offers a practical guide for those preparing for the Security+ certification exam. The book's 14 chapters provide in-depth discussions of the following topics: systems security; operating system hardening; application security; virtualization technologies; network security; wireless networks; network access; network authentication; risk assessment and risk mitigation; general cryptographic concepts; public key infrastructure; redundancy planning; environmental controls and implementing disaster recovery and incident response procedures; and legislation and organizational policies. Each chapter includes information on exam objectives, exam warnings, and the top five toughest questions along with their answers.

Key Features

  • The only book keyed to the new SY0-201 objectives that has been crafted for last minute cramming
  • Easy to find, essential material with no fluff – this book does not talk about security in general, just how it applies to the test
  • Includes review of five toughest questions by topic - sure to improve your score

Readership

The Security+ certification is recommended for Network/Security Administrators and Engineers, Security Analysts/Consultants, and IT Architects.

Table of Contents

About the Authors Chapter 1 Systems Security Systems security threats Privilege escalation Viruses and worms Trojan Spyware and adware Rootkits and botnets Logic bombs Host intrusion detection system Behavior-based vs. signature-based IDS characteristics Anti-SPAM Pop-up blockers Hardware and peripheral security risks BIOS USB devices Cell phones Removable storage devices Network attached storage Summary of exam objectives Top five toughest questions Answers Chapter 2 OS Hardening General OS hardening Services File system Removing unnecessary programs Hotfixes/patches Service packs/maintenance updates Patch management Windows group policies Security templates Configuration baselines Server OS hardening Enabling and disabling services and protocols FTP servers DNS servers NNTP servers File and print servers DHCP servers Data repositories Workstation OS User rights and groups Summary of exam objectives Top five toughest questions Answers Chapter 3 Application Security Threats are moving “up the stack” Rationale Threat modeling Application security threats Browser Buffer overflows Packet sniffers and instant messaging Instant messaging Peer-to-peer SMTP open relays Summary of exam objectives Top five toughest questions Answers Chapter 4 Virtualization Technologies The purpose of virtualization Benefits of virtualization Types of virtualization Designing a virtual environment System virtualization Management o

Details

No. of pages:
232
Language:
English
Copyright:
© 2010
Published:
Imprint:
Syngress
Print ISBN:
9781597494274
Electronic ISBN:
9781597494946