CompTIA security+ certification study guide : network security essentials /

Prepare for the CompTIA Security+ certification exam that covers the skills required to perform core security functions and pursue a career in IT. You will learn the basic principles of network security. Computer network vulnerabilities and threats are covered and you will learn how to safeguard com...

Full description

Saved in:
Bibliographic Details
Main Author: Sheikh, Ahmed F.
Format: Electronic eBook
Language:English
Published: [Berkeley, CA] : Apress, [2020]
Subjects:
Online Access:CONNECT

MARC

LEADER 00000cam a2200000 i 4500
001 in00006081125
006 m o d
007 cr cnu---unuuu
008 200919s2020 cau ob 000 0 eng d
005 20220712171621.1
035 |a 1WRLDSHRon1196252537 
040 |a EBLCP  |b eng  |e rda  |e pn  |c EBLCP  |d YDX  |d N$T  |d LQU  |d YDXIT  |d OCLCF  |d GW5XE  |d EBLCP  |d NLW  |d UKMGB  |d UMI  |d UKAHL  |d OCLCQ  |d OCLCO  |d COM 
015 |a GBC0G1812  |2 bnb 
016 7 |a 019940762  |2 Uk 
019 |a 1196039143  |a 1197083012  |a 1197837981  |a 1198387658  |a 1203012700  |a 1206386203 
020 |a 9781484262344  |q (electronic book) 
020 |a 1484262344  |q (electronic book) 
020 |z 1484262336 
020 |z 9781484262337 
024 8 |a 10.1007/978-1-4842-6 
035 |a (OCoLC)1196252537  |z (OCoLC)1196039143  |z (OCoLC)1197083012  |z (OCoLC)1197837981  |z (OCoLC)1198387658  |z (OCoLC)1203012700  |z (OCoLC)1206386203 
037 |a com.springer.onix.9781484262344  |b Springer Nature 
050 4 |a QA76.9.A25  |b S54 2020 
082 0 4 |a 005.8  |2 23 
049 |a TXMM 
100 1 |a Sheikh, Ahmed F. 
245 1 0 |a CompTIA security+ certification study guide :  |b network security essentials /  |c Ahmed F. Sheikh. 
264 1 |a [Berkeley, CA] :  |b Apress,  |c [2020] 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Chapter 1: General Security Concepts and Trends -- Information Security Model -- Operational Model of Computer Security -- Diversity of Defense -- Communications Security -- Access Control -- Authentication -- Social Engineering -- Security Trends -- Due Care and Due Diligence -- Summary -- Resources -- Chapter 2: Network Fundamentals and Infrastructure Security -- Network Architectures -- Network Topology -- Network Protocol -- The OSI Model -- IP Packet -- TCP vs. UDP -- Three-Way Handshake 
505 8 |a Internet Control Message Protocol (ICMP) -- Packet Delivery -- Local Packet Delivery -- Remote Packet Delivery -- Domain Name System (DNS) -- Routing -- IP Addressing -- Subnetting -- Classes of Network Addresses -- Reserved Addresses -- Classless IP Addressing -- Network Address Translation (NAT) -- Security Zones -- Demilitarized Zone -- Virtual LAN (VLAN) -- Tunneling -- Infrastructure Security: Securing a Workstation -- Virtualization -- Hubs -- Bridges -- Switches -- Routers -- Firewalls -- Basic Packet Filtering -- Stateful Packet Filtering -- Modems -- Cable Modems -- DSL Modems 
505 8 |a Virtual Private Networks -- Intrusion Detection System -- Mobile Devices -- Media Cables -- Security Concerns for Transmission Media -- Object Reuse -- Network-Attached Storage -- Summary -- Resources -- Chapter 3: Wireless and Intrusion Detection System Network Security -- Introduction to Wireless Networking -- 802.11 -- WAP -- WAP Vulnerabilities -- Bluetooth -- 802.11 Modulation -- 802.11 Individual Standards -- 802.11 Protocol -- Attacking 802.11 -- NetStumbler on a Windows PC -- Windows Displaying Access Points -- New Security Protocols -- Implementing 802.X 
505 8 |a Types of Intrusion Detection Systems -- IDS Components -- NIDS Placement -- Network IDS -- Advantages -- Disadvantages -- Active vs. Passive NIDS -- Signatures -- IDS Matrix -- IDS Detection Models -- Firewall -- Intrusion Prevention Systems -- Proxy Servers -- Types of Proxy Servers -- Protocol Analyzers -- Honeypots and Honeynets -- Host-Based IDS (HIDS) -- HIDs Advantages vs. Disadvantages -- Modern HIDS -- Antivirus Products -- Antivirus Products: Signature-Based and Heuristic Scanning -- Signature-Based Scanning -- Heuristic Scanning -- Personal Software Firewalls 
505 8 |a Pop-Up Blockers and Windows Defender -- Anti-spam -- Summary -- Chapter 4: Role of People in Security-Operational and Organizational Security -- Security Options -- The Operational Process -- Controls -- Physical Security -- Physical Barriers -- Environmental Issues -- Fire Suppression -- Electromagnetic Eavesdropping -- Location -- Role of People in Security -- Social Engineering -- Phishing -- Spear Phishing and Pharming -- Vishing -- Shoulder Surfing -- Security Hoaxes -- Password Best Practices -- Piggybacking -- Dumpster Diving -- Installing Unauthorized Hardware and Software 
500 |a Physical Access by Non-employees 
520 |a Prepare for the CompTIA Security+ certification exam that covers the skills required to perform core security functions and pursue a career in IT. You will learn the basic principles of network security. Computer network vulnerabilities and threats are covered and you will learn how to safeguard computer networks. Network security planning, technology, and organization are discussed along with associated legal and ethical issues. Lesson objectives and instruction succinctly review each major topic, including: network fundamentals, operational and organizational security, risk management, wireless security, change management, physical security, forensics, network attacks, and much more. You will: Identify the concepts of confidentiality, integrity, and availability Implement secure network administration principles Apply appropriate risk mitigation strategies Explain the impact of physical security on computer and network security Use assessment tools to discover security threats and vulnerabilities Implement appropriate security controls when performing account management This book is for security professionals looking to get this credential, including systems administrators, network administrators, security administrators, junior IT auditors and penetration testers, security specialists, security consultants, security engineers, and more. 
504 |a Includes bibliographical references. 
590 |a O'Reilly Online Learning Platform: Academic Edition (SAML SSO Access) 
650 0 |a Computer security  |x Examinations  |v Study guides. 
650 0 |a Computer networks  |x Security measures  |x Examinations  |v Study guides. 
650 0 |a Computer technicians  |x Certification  |v Study guides. 
650 0 |a Electronic data processing personnel  |x Certification  |v Study guides. 
655 7 |a examination study guides.  |2 aat 
655 7 |a Study guides  |2 fast  |0 (OCoLC)fst01423888 
655 7 |a Study guides.  |2 lcgft 
655 7 |a Guides de l'étudiant.  |2 rvmgf 
730 0 |a WORLDSHARE SUB RECORDS 
776 0 8 |i Print version:  |a Sheikh, Ahmed F.  |t CompTIA Security+ Certification Study Guide : Network Security Essentials.  |d Berkeley, CA : Apress L.P., ©2020  |z 9781484262337 
856 4 0 |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9781484262344/?ar  |z CONNECT  |3 O'Reilly  |t 0 
949 |a ho0 
994 |a 92  |b TXM 
998 |a wi  |d z 
999 f f |s 712d5518-7c0d-4a71-8f81-0e7ac752f003  |i 278cba48-cd4c-4fbf-a43b-9a7e19eef4ec  |t 0 
952 f f |a Middle Tennessee State University  |b Main  |c James E. Walker Library  |d Electronic Resources  |t 0  |e QA76.9.A25 S54 2020  |h Library of Congress classification 
856 4 0 |3 O'Reilly  |t 0  |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9781484262344/?ar  |z CONNECT