CompTIA security+ certification study guide : network security essentials /

Prepare for the CompTIA Security+ certification exam that covers the skills required to perform core security functions and pursue a career in IT. You will learn the basic principles of network security. Computer network vulnerabilities and threats are covered and you will learn how to safeguard com...

Full description

Saved in:
Bibliographic Details
Main Author: Sheikh, Ahmed F.
Format: Electronic eBook
Language:English
Published: [Berkeley, CA] : Apress, [2020]
Subjects:
Online Access:CONNECT
Table of Contents:
  • Intro
  • Table of Contents
  • About the Author
  • About the Technical Reviewer
  • Chapter 1: General Security Concepts and Trends
  • Information Security Model
  • Operational Model of Computer Security
  • Diversity of Defense
  • Communications Security
  • Access Control
  • Authentication
  • Social Engineering
  • Security Trends
  • Due Care and Due Diligence
  • Summary
  • Resources
  • Chapter 2: Network Fundamentals and Infrastructure Security
  • Network Architectures
  • Network Topology
  • Network Protocol
  • The OSI Model
  • IP Packet
  • TCP vs. UDP
  • Three-Way Handshake
  • Internet Control Message Protocol (ICMP)
  • Packet Delivery
  • Local Packet Delivery
  • Remote Packet Delivery
  • Domain Name System (DNS)
  • Routing
  • IP Addressing
  • Subnetting
  • Classes of Network Addresses
  • Reserved Addresses
  • Classless IP Addressing
  • Network Address Translation (NAT)
  • Security Zones
  • Demilitarized Zone
  • Virtual LAN (VLAN)
  • Tunneling
  • Infrastructure Security: Securing a Workstation
  • Virtualization
  • Hubs
  • Bridges
  • Switches
  • Routers
  • Firewalls
  • Basic Packet Filtering
  • Stateful Packet Filtering
  • Modems
  • Cable Modems
  • DSL Modems
  • Virtual Private Networks
  • Intrusion Detection System
  • Mobile Devices
  • Media Cables
  • Security Concerns for Transmission Media
  • Object Reuse
  • Network-Attached Storage
  • Summary
  • Resources
  • Chapter 3: Wireless and Intrusion Detection System Network Security
  • Introduction to Wireless Networking
  • 802.11
  • WAP
  • WAP Vulnerabilities
  • Bluetooth
  • 802.11 Modulation
  • 802.11 Individual Standards
  • 802.11 Protocol
  • Attacking 802.11
  • NetStumbler on a Windows PC
  • Windows Displaying Access Points
  • New Security Protocols
  • Implementing 802.X
  • Types of Intrusion Detection Systems
  • IDS Components
  • NIDS Placement
  • Network IDS
  • Advantages
  • Disadvantages
  • Active vs. Passive NIDS
  • Signatures
  • IDS Matrix
  • IDS Detection Models
  • Firewall
  • Intrusion Prevention Systems
  • Proxy Servers
  • Types of Proxy Servers
  • Protocol Analyzers
  • Honeypots and Honeynets
  • Host-Based IDS (HIDS)
  • HIDs Advantages vs. Disadvantages
  • Modern HIDS
  • Antivirus Products
  • Antivirus Products: Signature-Based and Heuristic Scanning
  • Signature-Based Scanning
  • Heuristic Scanning
  • Personal Software Firewalls
  • Pop-Up Blockers and Windows Defender
  • Anti-spam
  • Summary
  • Chapter 4: Role of People in Security-Operational and Organizational Security
  • Security Options
  • The Operational Process
  • Controls
  • Physical Security
  • Physical Barriers
  • Environmental Issues
  • Fire Suppression
  • Electromagnetic Eavesdropping
  • Location
  • Role of People in Security
  • Social Engineering
  • Phishing
  • Spear Phishing and Pharming
  • Vishing
  • Shoulder Surfing
  • Security Hoaxes
  • Password Best Practices
  • Piggybacking
  • Dumpster Diving
  • Installing Unauthorized Hardware and Software