CompTIA Security + Study Guide
Article description
Introduction xxiv Assessment Test xli Chapter 1 Managing Risk 1 Risk Terminology 3 Threat Assessment 6 Risk Assessment 6 Computing Risk Assessment 7 Assessing Privacy 12 Acting on Your Risk Assessment 12 Risks Associated with Cloud Computing 15 Risks Associated with Virtualization 16 Developing Policies, Standards, and Guidelines 17 Implementing Policies 17 Understanding Control Types and False Positives/Negatives 26 Risk Management Best Practices 28 Change Management 38 Summary 38 Exam Essentials 38 Review Questions 40 Chapter 2 Monitoring and Diagnosing Networks 45 Monitoring and Diagnosing Networks Terminology 47 Frameworks, Best Practices, and Configuration Guides 48 Industry-Standard Frameworks and Reference Architectures 48 National Institute of Standards and Technology (NIST) 51 Benchmarks/Secure Configuration Guides 54 Secure Network Architecture Concepts 57 Zones 57 Tunneling/VPN 63 Placing Security Devices 64 SDN 67 IDS vs. IPS 67 Secure Systems Design 68 Hardware and Firmware Security 68 Operating Systems 69 Peripherals 73 Secure Staging Deployment Concepts 73 Summary 74 Exam Essentials 74 Review Questions 76 Chapter 3 Understanding Devices and Infrastructure 79 Infrastructure Terminology 81 Designing with Security in Mind 84 Firewalls 84 VPNs and VPN Concentrators 89 Intrusion Detection Systems 91 Router 104 Switch 106 Proxy 107 Load Balancer 108 Access Point 108 SIEM 111 DLP 111 Network Access Control (NAC) 112 Mail Gateway 112 Bridge 113 SSL/TLS Accelerators 113 SSL Decryptors 113<
Specifications
| Author | Dulaney, Emmett, |
| ISBN/EAN | 9781119416876 |
| Edition | 7 |
Article description
Introduction xxiv Assessment Test xli Chapter 1 Managing Risk 1 Risk Terminology 3 Threat Assessment 6 Risk Assessment 6 Computing Risk Assessment 7 Assessing Privacy 12 Acting on Your Risk Assessment 12 Risks Associated with Cloud Computing 15 Risks Associated with Virtualization 16 Developing Policies, Standards, and Guidelines 17 Implementing Policies 17 Understanding Control Types and False Positives/Negatives 26 Risk Management Best Practices 28 Change Management 38 Summary 38 Exam Essentials 38 Review Questions 40 Chapter 2 Monitoring and Diagnosing Networks 45 Monitoring and Diagnosing Networks Terminology 47 Frameworks, Best Practices, and Configuration Guides 48 Industry-Standard Frameworks and Reference Architectures 48 National Institute of Standards and Technology (NIST) 51 Benchmarks/Secure Configuration Guides 54 Secure Network Architecture Concepts 57 Zones 57 Tunneling/VPN 63 Placing Security Devices 64 SDN 67 IDS vs. IPS 67 Secure Systems Design 68 Hardware and Firmware Security 68 Operating Systems 69 Peripherals 73 Secure Staging Deployment Concepts 73 Summary 74 Exam Essentials 74 Review Questions 76 Chapter 3 Understanding Devices and Infrastructure 79 Infrastructure Terminology 81 Designing with Security in Mind 84 Firewalls 84 VPNs and VPN Concentrators 89 Intrusion Detection Systems 91 Router 104 Switch 106 Proxy 107 Load Balancer 108 Access Point 108 SIEM 111 DLP 111 Network Access Control (NAC) 112 Mail Gateway 112 Bridge 113 SSL/TLS Accelerators 113 SSL Decryptors 113<
Specifications
| Author | Dulaney, Emmett, |
| ISBN/EAN | 9781119416876 |
| Edition | 7 |