CompTIA Security+ Deluxe Study Guide: SY0-501
Buy Rights Online Buy Rights

Rights Contact Login For More Details

  • Wiley

More About This Title CompTIA Security+ Deluxe Study Guide: SY0-501

English

Some copies of CompTIA Security+ Deluxe Study Guide: Exam SY0-501 (9781119416852) were printed without discount exam vouchers in the front of the books. If you did not receive a discount exam voucher with your book, please visit http://media.wiley.com/product_ancillary/5X/11194168/DOWNLOAD/CompTIA_Coupon.pdf to download one.


Practical, concise, and complete—the ultimate CompTIA Security+ prep

CompTIA Security+ Deluxe Study Guide, Fourth Edition is the ultimate preparation resource for Exam SY0-501. Fully updated to cover 100% of the latest exam, this book is packed with essential information on critical security concepts including architecture and design, attacks and vulnerabilities, identity and access management, cryptography and PKI, risk management, and more. Real-world examples allow you to practice your skills and apply your knowledge in situations you'll encounter on the job, while insights from a security expert provide wisdom based on years of experience. The Sybex online learning environment allows you to study anytime, anywhere, with access to eBooks in multiple formats, glossary of key terms, flashcards, and more. Take the pre-assessment test to more efficiently focus your study time, and gauge your progress along the way with hundreds of practice questions that show you what to expect on the exam.

The CompTIA Security+ certification is your first step toward a highly in-demand skillset. Fully approved and endorsed by CompTIA, this guide contains everything you need for complete and comprehensive preparation.

  • Master 100% of the objectives for the new Exam SY0-501
  • Apply your knowledge to examples based on real-world scenarios
  • Understand threats, vulnerabilities, cryptography, system security, and more
  • Access an online preparation toolkit so you can study on the go

A CompTIA Security+ certification says that you have the knowledge and skills to secure applications, networks, and devices; analyze and respond to threats; participate in risk mitigation, and much more. Employers are desperately searching for people like you, and the demand will only continue to grow. CompTIA Security+ Deluxe Study Guide, Fourth Edition gives you the thorough preparation you need to clear the exam and get on with your career.

English

Emmett Dulaney is a Professor at a small university in Indiana. He has written several certification books on Windows, Security, IT project management, and UNIX, and was co-author of two of Sybex's leading certification titles: CompTIA Security+ Study Guide and CompTIA A+ Complete Study Guide.

English

Introduction xxiv

Assessment Test xli

Chapter 1 Managing Risk 1

Risk Terminology 3

Threat Assessment 6

Risk Assessment 6

Computing Risk Assessment 7

Assessing Privacy 12

Acting on Your Risk Assessment 12

Risks Associated with Cloud Computing 15

Risks Associated with Virtualization 16

Developing Policies, Standards, and Guidelines 17

Implementing Policies 17

Understanding Control Types and False Positives/Negatives 26

Risk Management Best Practices 28

Change Management 38

Summary 38

Exam Essentials 38

Review Questions 40

Chapter 2 Monitoring and Diagnosing Networks 45

Monitoring and Diagnosing Networks Terminology 47

Frameworks, Best Practices, and Configuration Guides 48

Industry-Standard Frameworks and Reference

Architectures 48

National Institute of Standards and Technology (NIST) 51

Benchmarks/Secure Configuration Guides 54

Secure Network Architecture Concepts 57

Zones 57

Tunneling/VPN 63

Placing Security Devices 64

SDN 67

IDS vs. IPS 67

Secure Systems Design 68

Hardware and Firmware Security 68

Operating Systems 69

Peripherals 73

Secure Staging Deployment Concepts 73

Summary 74

Exam Essentials 74

Review Questions 76

Chapter 3 Understanding Devices and Infrastructure 79

Infrastructure Terminology 81

Designing with Security in Mind 84

Firewalls 84

VPNs and VPN Concentrators 89

Intrusion Detection Systems 91

Router 104

Switch 106

Proxy 107

Load Balancer 108

Access Point 108

SIEM 111

DLP 111

Network Access Control (NAC) 112

Mail Gateway 112

Bridge 113

SSL/TLS Accelerators 113

SSL Decryptors 113

Media Gateway 114

Hardware Security Module 114

Summary 115

Exam Essentials 115

Review Questions 116

Chapter 4 Identity and Access Management 121

Using Tools to Assess Your Network 125

Protocol Analyzer 125

Network Scanners 127

Password Cracker 130

Vulnerability Scanners 131

Command-Line Tools 135

Additional Tools 142

Troubleshooting Common Security Issues 143

Access Issues 144

Configuration Issues 145

Security Technologies 147

Intrusion Detection Systems 147

Antimalware 148

Firewalls and Related Devices 149

Other Systems 150

Identity and Access Management Concepts 151

Identification vs. Authentication 151

Authentication (Single Factor) and Authorization 152

Multifactor Authentication 153

Biometrics 153

Federations 154

Potential Authentication and Access Problems 154

LDAP 155

PAP, SPAP, and CHAP 155

Kerberos 156

Working with RADIUS 157

TACACS, TACACS+, XTACACS 158

OATH 158

One-Time Passwords 158

SAML 159

Install and Configure Identity and Access Services 159

Mandatory Access Control 159

Discretionary Access Control 160

Role-Based Access Control 160

Rule-Based Access Control 160

ABAC 161

Smartcards 161

Tokens 162

File and Database Security 163

Summary 163

Exam Essentials 164

Review Questions 165

Chapter 5 Wireless Network Threats 169

Wireless Threat Terminology 170

Wireless Vulnerabilities to Know 171

Replay 172

Rogue APs and Evil Twins 174

Jamming 174

WPS 175

Bluejacking 175

Bluesnarfing 175

NFC and RFID 176

Disassociation 176

Wireless Commonsense 176

Wireless Attack Analogy 176

Summary 177

Exam Essentials 178

Review Questions 179

Chapter 6 Securing the Cloud 183

Cloud-Related Terminology 184

Working with Cloud Computing 186

Software as a Service (SaaS) 186

Platform as a Service (PaaS) 186

Infrastructure as a Service (IaaS) 188

Private Cloud 189

Public Cloud 189

Community Cloud 189

Hybrid Cloud 190

Working with Virtualization 190

Understanding Hypervisors 190

Understanding Containers and Application Cells 192

VDI/VDE 192

On-Premise vs. Hosted vs. Cloud 192

VM Escape Protection 193

VM Sprawl Avoidance 193

Security and the Cloud 194

Cloud Access Security Brokers 195

Cloud Storage 195

Security as a Service 195

Summary 196

Exam Essentials 196

Review Questions 197

Chapter 7 Host, Data, and Application Security 201

Threat Actors and Attributes 204

Script Kiddies 205

Hacktivist 206

Organized Crime 207

Nation-States/APT 207

Insiders 207

Competitors 207

Use of Open Source Intelligence 208

Types of Vulnerabilities 211

Configuration Issues 211

User Issues 212

Zero-Day Exploits 212

Other Issues 214

Embedded Systems Security 214

Application Vulnerabilities 216

Input Vulnerabilities 216

Memory Vulnerabilities 217

Secure Programming 217

Programming Models 218

Software Testing 218

Specific Types of Testing 219

Secure Coding Standards 220

Application Configuration Baselining 221

Operating System Patch Management 221

Application Patch Management 222

Other Application Security Issues 222

Databases and Technologies 222

Database Security 225

Secure Configurations 225

Code Issues 225

Summary 226

Exam Essentials 226

Review Questions 227

Chapter 8 Cryptography 231

An Overview of Cryptography 234

Historical Cryptography 234

Modern Cryptography 238

Working with Symmetric Algorithms 239

Working with Asymmetric Algorithms 243

Cryptography Concepts 246

Hashing Algorithms 247

Rainbow Tables and Salt 249

Key Stretching 249

Cryptanalysis Methods 250

Wi-Fi Encryption 252

Using Cryptographic Systems 254

Confidentiality and Strength 254

Integrity 254

When to Encrypt 255

Digital Signatures 256

Authentication 257

Nonrepudiation 257

Key Features 258

Understanding Cryptography Standards and Protocols 258

The Origins of Encryption Standards 259

Public Key Infrastructure X.509/Public Key Cryptography Standards 261

X.509 262

Public Key Infrastructure 264

Pretty Good Privacy 264

SSL and TLS 266

Using Public Key Infrastructure 269

Hardware-Based Encryption Devices 269

Data Encryption 269

Authentication 270

Summary 271

Exam Essentials 271

Review Questions 273

Chapter 9 Threats, Attacks, and Vulnerabilities 277

Threat and Attack Terminology 278

Living in a World of Viruses 282

Symptoms of a Virus Infection 282

How Viruses Work 283

Types of Viruses 284

Managing Spam to Avoid Viruses 286

Antivirus Software 287

Malware and Crypto-Malware 288

Understanding Various Types of Application/Service Attacks 296

Identifying Denial-of-Service and Distributed Denial-of-Service Attacks 296

Man-in-the-Middle Attacks 298

Buffer Overflow 299

Injection 299

Cross-Site Scripting and Request Forgery 302

Privilege Escalation 303

ARP Poisoning 304

Amplification 304

DNS Poisoning 304

Domain Hijacking 304

Man-in-the-Browser 305

Zero-Day Exploits 305

Replay Attacks 305

Pass the Hash 306

Hijacking and Related Attacks 306

Driver Manipulation 307

MAC and IP Spoofing Attacks 308

Summary 309

Exam Essentials 309

Review Questions 311

Chapter 10 Social Engineering and Other Foes 315

Social Engineering and Physical Security Terminology 316

Understanding Social Engineering 318

Types of Social Engineering Attacks 319

What Motivates an Attack? 325

The Principles Behind Social Engineering 326

Social Engineering Attack Examples 327

Understanding Physical Security 330

Lighting 331

Signs 331

Fencing, Gates, and Cages 332

Security Guards 333

Alarms 333

Safe 334

Secure Cabinets and Enclosures 334

Protected Distribution 335

Protected Cabling 336

Airgap 336

Mantrap 336

Faraday Cage 337

Lock Types 337

Biometrics 338

Barricades/Bollards 339

Tokens/Cards 339

Environmental Controls 339

Cable Locks 345

Screen Filters 346

Cameras 346

Motion Detection 347

Logs 347

Infrared Detection 348

Key Management 348

Various Control Types 348

An Analogy of Control Types 349

Data Security and Privacy Practices 350

Data Destruction and Media Sanitation 350

Data Sensitivity Labeling and Handling 352

Data Roles 355

Data Retention 355

Legal and Compliance 356

Summary 356

Exam Essentials 356

Review Questions 358

Chapter 11 Security Administration 363

Connection Types 365

Cellular 365

Bluetooth 365

Wi-Fi 366

Infrared 368

SATCOM 369

Mobile Devices 369

BYOD Issues 371

Enforcement 373

Account Management Concepts 374

Account Types 375

General Concepts 376

Summary 378

Exam Essentials 378

Review Questions 379

Chapter 12 Disaster Recovery and Incident Response 383

Disaster and Incident Related Terminology 385

Penetration Testing 387

What Should You Test? 387

Vulnerability Scanning 388

Issues Associated with Business Continuity 389

Types of Storage Mechanisms 390

Crafting a Disaster-Recovery Plan 392

Incident Response Procedures 403

Understanding Incident Response 404

Tabletop Exercises 412

Summary 412

Exam Essentials 413

Review Questions 414

Appendix Answers to Review Questions 419

Chapter 1: Managing Risk 420

Chapter 2: Monitoring and Diagnosing Networks 421

Chapter 3: Understanding Devices and Infrastructure 422

Chapter 4: Identity and Access Management 423

Chapter 5: Wireless Network Threats 425

Chapter 6: Securing the Cloud 426

Chapter 7: Host, Data, and Application Security 427

Chapter 8: Cryptography 428

Chapter 9: Threats, Attacks, and Vulnerabilities 429

Chapter 10: Social Engineering and Other Foes 430

Chapter 11: Security Administration 431

Chapter 12: Disaster Recovery and Incident Response 432

Index 435

Table of Exercises

Exercise 1.1 Risk Assessment Computations 8

Exercise 3.1 Verifying the Presence of a TPM Chip in Windows 114

Exercise 5.1 Configuring a Wireless Connection Not Broadcasting an SSID 172

Exercise 8.1 Encrypting a Filesystem in Linux 238

Exercise 8.2 TLS Settings in Windows Server 2016 268

Exercise 9.1 Viewing Running Processes on a Windows-Based Machine 290

Exercise 9.2 Viewing Running Processes on a Linux-Based Machine 291

Exercise 10.1 Test Social Engineering 328

Exercise 10.2 Security Zones in the Physical Environment 347

Exercise 12.1 Creating a Backup in SUSE Linux 396

loading