Eleventh Hour Security+

1st Edition

Exam SY0-201 Study Guide

Authors: Ido Dubrawsky
Paperback ISBN: 9781597494274
eBook ISBN: 9781597494946
Imprint: Syngress
Published Date: 26th October 2009
Page Count: 232
Tax/VAT will be calculated at check-out
Compatible Not compatible
VitalSource PC, Mac, iPhone & iPad Amazon Kindle eReader
ePub & PDF Apple & PC desktop. Mobile devices (Apple & Android) Amazon Kindle eReader
Mobi Amazon Kindle eReader Anything else

Institutional Access


Eleventh Hour Network+: Exam N10-004 Study Guide offers a practical guide for those preparing for the Security+ certification exam. The book's 14 chapters provide in-depth discussions of the following topics: systems security; operating system hardening; application security; virtualization technologies; network security; wireless networks; network access; network authentication; risk assessment and risk mitigation; general cryptographic concepts; public key infrastructure; redundancy planning; environmental controls and implementing disaster recovery and incident response procedures; and legislation and organizational policies. Each chapter includes information on exam objectives, exam warnings, and the top five toughest questions along with their answers.

Key Features

  • The only book keyed to the new SY0-201 objectives that has been crafted for last minute cramming
  • Easy to find, essential material with no fluff – this book does not talk about security in general, just how it applies to the test
  • Includes review of five toughest questions by topic - sure to improve your score


The Security+ certification is recommended for Network/Security Administrators and Engineers, Security Analysts/Consultants, and IT Architects.

Table of Contents

About the Authors Chapter 1 Systems Security Systems security threats Privilege escalation Viruses and worms Trojan Spyware and adware Rootkits and botnets Logic bombs Host intrusion detection system Behavior-based vs. signature-based IDS characteristics Anti-SPAM Pop-up blockers Hardware and peripheral security risks BIOS USB devices Cell phones Removable storage devices Network attached storage Summary of exam objectives Top five toughest questions Answers Chapter 2 OS Hardening General OS hardening Services File system Removing unnecessary programs Hotfixes/patches Service packs/maintenance updates Patch management Windows group policies Security templates Configuration baselines Server OS hardening Enabling and disabling services and protocols FTP servers DNS servers NNTP servers File and print servers DHCP servers Data repositories Workstation OS User rights and groups Summary of exam objectives Top five toughest questions Answers Chapter 3 Application Security Threats are moving “up the stack” Rationale Threat modeling Application security threats Browser Buffer overflows Packet sniffers and instant messaging Instant messaging Peer-to-peer SMTP open relays Summary of exam objectives Top five toughest questions Answers Chapter 4 Virtualization Technologies The purpose of virtualization Benefits of virtualization Types of virtualization Designing a virtual environment System virtualization Management o


No. of pages:
© Syngress 2010
eBook ISBN:
Paperback ISBN:

About the Author

Ido Dubrawsky

Ido Dubrawsky (CISSP, CCNA, CCDA) is the Chief Security Advisor for Microsoft’s Communication Sector North America, a division of the Mobile and Embedded Devices Group. Prior to working at Microsoft, Ido was the acting Security Consulting Practice Lead at AT&T’s Callisma subsidiary and a Senior Security Consultant. Before joining AT&T, Ido was a Network Security Architect for Cisco Systems, Inc., SAFE Architecture Team. He has worked in the systems and network administration field for almost 20 years in a variety of environments from government to academia to private enterprise. He has a wide range of experience in various networks, from small to large and relatively simple to complex. Ido is the primary author of three major SAFE white papers and has written, and spoken, extensively on security topics. He is a regular contributor to the SecurityFocus website on a variety of topics covering security issues. Previously, he worked in Cisco Systems, Inc. Secure Consulting Group, providing network security posture assessments and consulting services for a wide range of clients. In addition to providing penetration-testing consultation, he also conducted security architecture reviews and policy and process reviews. He holds a B.Sc. and a M.Sc. in Aerospace Engineering from the University of Texas at Austin.

Affiliations and Expertise

Chief Security Advisor, Microsoft’s Communication Sector North America, a division of the Mobile and Embedded Devices Group