CompTia Security + : Exam SY0-401 (3 PCK HAR/)

個数:

CompTia Security + : Exam SY0-401 (3 PCK HAR/)

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版/ページ数 1096 p.
  • 言語 ENG
  • 商品コード 9781119050957
  • DDC分類 004

Full Description


The most complete, up-to-date Security+ prep kit, with 100% exam coverage CompTIA Security+ Certification Kit, 4th Edition is the ideal study tool for the price-savvy Security+ candidate. By combining the CompTIA Deluxe Security+ Study Guide, 3rd Edition and the CompTIA Security+ Review Guide, 3rd Edition into a single bundle, this kit provides everything you need to go into the exam fully prepared. This new edition has been updated to align with the latest version of the Security+ exam (SY0-401), and covers 100% of the exam objectives including communications, infrastructure, operational and organizational security, and much more. Practical examples drawn from real-world topics demonstrate how these concepts are applied on the job, and authoritative coverage and clear, concise explanations help deepen your understanding of these crucial security topics. The DVD includes instructional videos, electronic flashcards, software, and a test bank that allows you to test your knowledge and correct weak areas in advance, so you can approach the exam with confidence.Study 100% of the Security+ exam objectivesSee key topics demonstrated in over an hour of instructional videosUnderstand real-world applications through practical examplesTry out Kali Linux, designed for security auditing, digital forensics, and penetration testing, and Security Onion for intrusion detection, network security monitoring, and log managementTest your knowledge with leading-edge exam prep softwareWith complete exam coverage and practical insight, CompTIA Security+ Certification Kit, 4th Edition gives you the confidence you need on exam day.

Contents

CompTIA Security+ Deluxe Study GuideForeword xxviiIntroduction xxixChapter 1 Measuring and Weighing Risk 1Risk Assessment 3Computing Risk Assessment 4Acting on Your Risk Assessment 9Risks Associated with Cloud Computing 17Risks Associated with Virtualization 19Developing Policies, Standards, and Guidelines 19Implementing Policies 20Understanding Control Types andFalse Positives/Negatives 26Risk Management Best Practices 28Disaster Recovery 36Tabletop Exercise 39Summary 39Exam Essentials 39Review Questions 41Chapter 2 Monitoring and Diagnosing Networks 45Monitoring Networks 46Network Monitors 46Understanding Hardening 52Working with Services 52Patches 56User Account Control 57Filesystems 58Securing the Network 60Security Posture 61Continuous Security Monitoring 61Setting a Remediation Policy 62Reporting Security Issues 63Alarms 63Alerts 63Trends 63Differentiating between Detection Controls andPrevention Controls 64Summary 65Exam Essentials 66Review Questions 67Chapter 3 Understanding Devices and Infrastructure 71Mastering TCP/IP 73OSI Relevance 74Working with the TCP/IP Suite 74IPv4 and IPv6 78Understanding Encapsulation 79Working with Protocols and Services 80Designing a Secure Network 87Demilitarized Zones 87Subnetting 89Virtual Local Area Networks 89Remote Access 92Network Address Translation 93Telephony 94Network Access Control 95Understanding the Various Network Infrastructure Devices 95Firewalls 96Routers 100Switches 102Load Balancers 103Proxies 103Web Security Gateway 103VPNs and VPN Concentrators 103Intrusion Detection Systems 105Understanding Intrusion Detection Systems 106IDS vs. IPS 110Working with a Network-Based IDS 111Working with a Host-Based IDS 116Working with NIPSs 117Protocol Analyzers 118Spam Filters 118UTM Security Appliances 119Summary 122Exam Essentials 123Review Questions 124Chapter 4 Access Control, Authentication, and Authorization 129Understanding Access Control Basics 131Identification vs. Authentication 131Authentication (Single Factor) and Authorization 132Multifactor Authentication 133Layered Security and Defense in Depth 133Network Access Control 134Tokens 135Federations 135Potential Authentication and Access Problems 136Authentication Issues to Consider 137Authentication Protocols 139Account Policy Enforcement 139Users with Multiple Accounts/Roles 141Generic Account Prohibition 142Group-based and User-assigned Privileges 142Understanding Remote Access Connectivity 142Using the Point-to-Point Protocol 143Working with Tunneling Protocols 144Working with RADIUS 145TACACS/TACACS+/XTACACS 146VLAN Management 146SAML 147Understanding Authentication Services 147LDAP 147Kerberos 148Single Sign-On Initiatives 149Understanding Access Control 150Mandatory Access Control 151Discretionary Access Control 151Role-Based Access Control 152Rule-Based Access Control 152Implementing Access Controlling Best Practices 152Least Privileges 153Separation of Duties 153Time of Day Restrictions 153User Access Review 154Smart Cards 154Access Control Lists 156Port Security 157Working with 802.1X 158Flood Guards and Loop Protection 158Preventing Network Bridging 158Log Analysis 159Trusted OS 159Secure Router Configuration 160Summary 161Exam Essentials 161Review Questions 163Chapter 5 Protecting Wireless Networks 167Working with Wireless Systems 169IEEE 802.11x Wireless Protocols 169WEP/WAP/WPA/WPA2 171Wireless Transport Layer Security 173Understanding Wireless Devices 174Wireless Access Points 175Extensible Authentication Protocol 181Lightweight Extensible Authentication Protocol 182Protected Extensible Authentication Protocol 182Wireless Vulnerabilities to Know 183Wireless Attack Analogy 187Summary 188Exam Essentials 189Review Questions 190Chapter 6 Securing the Cloud 195Working with Cloud Computing 196Software as a Service (SaaS) 197Platform as a Service (PaaS) 198Infrastructure as a Service (IaaS) 199Private Cloud 200Public Cloud 200Community Cloud 200Hybrid Cloud 201Working with Virtualization 201Snapshots 203Patch Compatibility 203Host Availability/Elasticity 204Security Control Testing 204Sandboxing 204Security and the Cloud 205Cloud Storage 206Summary 207Exam Essentials 207Review Questions 208Chapter 7 Host, Data, and Application Security 213Application Hardening 215Databases and Technologies 215Fuzzing 218Secure Coding 218Application Configuration Baselining 219Operating System Patch Management 220Application Patch Management 220Host Security 220Permissions 220Access Control Lists 221Antimalware 221Host Software Baselining 226Hardening Web Servers 227Hardening Email Servers 228Hardening FTP Servers 229Hardening DNS Servers 230Hardening DHCP Services 231Protecting Data Through Fault Tolerance 233Backups 233RAID 234Clustering and Load Balancing 235Application Security 235Best Practices for Security 236Data Loss Prevention 236Hardware-Based Encryption Devices 237Summary 238Exam Essentials 238Review Questions 239Chapter 8 Cryptography 243An Overview of Cryptography 245Historical Cryptography 245Modern Cryptography 249Working with Symmetric Algorithms 249Working with Asymmetric Algorithms 251What Cryptography Should You Use? 254Hashing Algorithms 255Rainbow Tables and Salt 256Key Stretching 256Understanding Quantum Cryptography 257Cryptanalysis Methods 257Wi-Fi Encryption 258Using Cryptographic Systems 258Confidentiality and Strength 259Integrity 259Digital Signatures 261Authentication 261Nonrepudiation 262Key Features 262Understanding Cryptography Standards and Protocols 263The Origins of Encryption Standards 263Public-Key Infrastructure X.509/Public-Key Cryptography Standards 266X.509 267SSL and TLS 268Certificate Management Protocols 270Secure Multipurpose Internet Mail Extensions 270Secure Electronic Transaction 270Secure Shell 271Pretty Good Privacy 272HTTP Secure 274Secure HTTP 274IP Security 274Tunneling Protocols 277Federal Information Processing Standard 278Using Public-Key Infrastructure 278Using a Certificate Authority 279Working with Registration Authorities andLocal Registration Authorities 280Implementing Certificates 281Understanding Certificate Revocation 285Implementing Trust Models 285Hardware-Based Encryption Devices 290Data Encryption 290Summary 291Exam Essentials 291Review Questions 293Chapter 9 Malware, Vulnerabilities, and Threats 297Understanding Malware 300Surviving Viruses 310Symptoms of a Virus Infection 311How Viruses Work 311Types of Viruses 312Managing Spam to Avoid Viruses 316Antivirus Software 317Understanding Various Types of Attacks 318Identifying Denial-of-Service andDistributed Denial-of-Service Attacks 319Spoofing Attacks 321Pharming Attacks 322Phishing, Spear Phishing, and Vishing 323Xmas Attack 324Man-in-the-Middle Attacks 324Replay Attacks 325Smurf Attacks 326Password Attacks 326Privilege Escalation 328Malicious Insider Threats 332Transitive Access 332Client-Side Attacks 333Typo Squatting and URL Hijacking 333Watering Hole Attack 334Identifying Types of Application Attacks 334Cross-Site Scripting and Forgery 334SQL Injection 335LDAP Injection 336XML Injection 337Directory Traversal/Command Injection 337Buffer Overflow 338Integer Overflow 338Zero-Day Exploits 338Cookies and Attachments 338Locally Shared Objects and Flash Cookies 339Malicious Add-Ons 339Session Hijacking 340Header Manipulation 340Arbitrary Code and Remote Code Execution 341Tools for Finding Threats 341Interpreting Assessment Results 341Tools to Know 342Risk Calculations and Assessment Types 344Summary 346Exam Essentials 346Review Questions 348Chapter 10 Social Engineering and Other Foes 353Understanding Social Engineering 355Types of Social Engineering Attacks 356What Motivates an Attack? 361The Principles Behind Social Engineering 362Social Engineering Attack Examples 363Understanding Physical Security 366Hardware Locks and Security 369Mantraps 371Video Surveillance 371Fencing 372Access List 373Proper Lighting 374Signs 374Guards 374Barricades 375Biometrics 375Protected Distribution 376Alarms 376Motion Detection 376Environmental Controls 377HVAC 378Fire Suppression 378EMI Shielding 380Hot and Cold Aisles 382Environmental Monitoring 383Temperature and Humidity Controls 383Control Types 384A Control Type Analogy 385Data Policies 385Destroying a Flash Drive 386Some Considerations 387Optical Discs 388Summary 389Exam Essentials 389Review Questions 391Chapter 11 Security Administration 395Third-Party Integration 397Transitioning 397Ongoing Operations 398Understanding Security Awareness and Training 399Communicating with Users to Raise Awareness 399Providing Education and Training 399Safety Topics 401Training Topics 402Classifying Information 409Public Information 410Private Information 411Information Access Controls 413Security Concepts 413Complying with Privacy and Security Regulations 414The Health Insurance Portability andAccountability Act 415The Gramm-Leach-Bliley Act 415Contents xxiThe Computer Fraud and Abuse Act 416The Family Educational Rights and Privacy Act 416The Computer Security Act of 1987 416The Cyberspace Electronic Security Act 417The Cyber Security Enhancement Act 417The Patriot Act 417Familiarizing Yourself with International Efforts 418Mobile Devices 418BYOD Issues 419Alternative Methods to Mitigate Security Risks 420Summary 422Exam Essentials 422Review Questions 424Chapter 12 Disaster Recovery and Incident Response 429Issues Associated with Business Continuity 431Types of Storage Mechanisms 432Crafting a Disaster-Recovery Plan 433Incident Response Policies 445Understanding Incident Response 446Succession Planning 454Tabletop Exercises 454Reinforcing Vendor Support 455Service-Level Agreements 455Code Escrow Agreements 457Penetration Testing 458What Should You Test? 458Vulnerability Scanning 459Summary 460Exam Essentials 461Review Questions 462Appendix A Answers to Review Questions 467Chapter 1: Measuring and Weighing Risk 468Chapter 2: Monitoring and Diagnosing Networks 469Chapter 3: Understanding Devices and Infrastructure 470Chapter 4: Access Control, Authentication, andAuthorization 471Chapter 5: Protecting Wireless Networks 473Chapter 6: Securing the Cloud 474Chapter 7: Host, Data, and Application Security 475Chapter 8: Cryptography 476Chapter 9: Malware, Vulnerabilities, and Threats 477Chapter 10: Social Engineering and Other Foes 478Chapter 11: Security Administration 480Chapter 12: Disaster Recovery and Incident Response 481Appendix B Labs, Questions, and Exam Preparation Miscellany 483The Challenges 485See Hidden Shares 485Choose Problem Reporting Defaults 485Open the Add/Remove Programs Applet 485Delete Cookies 485Remove All Currently Allowed Pop-ups 485Synchronize Files 486Configure the Crash File 486Limit Computer Time 486Hide Extensions 486Allow Remote Desktop Connections 487Display Statistics 488MISC: Fire Extinguisher Types 488Restore Connections 488Open the Security Center Applet 489Identify the Issue #1 489Display All Information 489MISC: Compute CIDR #1 490Turn On the Archive Bit 490Repair Damaged Files 490MISC: Identify the Tool #1 490Generate a System Health Report 491Change Permissions for a File 491Create a Legal Notice 492Open the System Configuration Utility 492Turn On the SmartScreen Filter 492Prevent Sites from Knowing Your Location 493Register with Websites 493Create a Restore Point 494Add Encrypted Files 494Renew a DHCP Address 494MISC: Algorithm Types 495Enable Encryption 495Identify the Issue #2 496View Configuration for a Service 496View Current Audit Policy 497Display Network Path 497MISC: Identify the Tool #2 497Change Ownership on a File 498Enable Drive Compression 498Configure Program Compatibility 498Configure Immediate Deletion 499Change the Registered Organization for Windows 499Display Disk Quota 499Allow Pop-Ups from a Site 499Turn On DEP 499Enable Protection 500Require Wake-Up Password 500Open a Port in Windows Firewall 501Open the User Accounts 501Identify the Issue #3 501Open the System Properties 502View Group Policy Settings 502MISC: Attack Types 502Secure the Database 502Call Up the Security Policy Manager 503MISC: Identify the Tool #3 503View Effective Permissions for a File 503Create a Quota on Disk Space 504Optimize a Folder 504Choose Firewall Notifications 504MISC: Identify the Tool #4 504Turn Off Windows Firewall 505Disable Toolbars 505Reinstall Windows 505Change UAC Settings 506Synchronize Time 506View All Processes Currently Running 507Configure a Firewall 507Display ARP Table 507Display Windows Version 507MISC: Compute CIDR #2 508Summon the Event Viewer 508Identify the Issue #4 508Enable ReadyBoost 508Encrypt Folder Contents 509Clear Index Scores 509Turn On BitLocker 509Turn Off All AutoPlay 509Choose Default Programs 510Enable Shutdown Without Login 510Open System Configuration Editor 510Override Cookie Handling 511Software Updates 511Prohibit Remote Desktop 511Uninstall 512Change Notification Settings 512Display Network Name 512Flush the Cache 512Backup and Recover Passwords 513MISC: Identify the Tool #5 513MISC: Identify the Tool #6 514Restart Windows 515Identify the Issue #5 515Reduce the Number of Recently Used Programs 515File Properties 516Audit Views of a File 516Configure Sharing of a Folder 516Don t Display Last User 516The Answers 517See Hidden Shares: Answer 517Choose Problem Reporting Defaults: Answer 517Open the Add/Remove Programs Applet: Answer 518Delete Cookies: Answer 518Remove All Currently Allowed Pop-ups: Answer 518Synchronize Files: Answer 519Configure the Crash File: Answer 519Limit Computer Time: Answer 520Hide Extensions: Answer 520Allow Remote Desktop Connections: Answer 521Display Statistics: Answer 522MISC: Fire Extinguisher Types: Answer 522Restore Connections: Answer 523Open the Security Center Applet: Answer 523Identify the Issue #1: Answer 523Display All Information: Answer 524MISC: Compute CIDR #1: Answer 524Turn On the Archive Bit: Answer 525Repair Damaged Files: Answer 525MISC: Identify the Tool #1: Answer 525Generate a System Health Report: Answer 526Change Permissions for a File: Answer 527Create a Legal Notice: Answer 528Open the System Configuration Utility: Answer 529Turn On the SmartScreen Filter: Answer 529Prevent Sites from Knowing Your Location: Answer 530Register with Websites: Answer 530Create a Restore Point: Answer 531Add Encrypted Files: Answer 531Renew a DHCP Address: Answer 532MISC: Algorithm Types: Answer 532Enable Encryption: Answer 533Identify the Issue #2: Answer 534View Configuration for a Service: Answer 535View Current Audit Policy: Answer 535Display Network Path: Answer 535MISC: Identify the Tool #2: Answer 536Change Ownership on a File: Answer 536Enable Drive Compression: Answer 537Configure Program Compatibility: Answer 537Configure Immediate Deletion: Answer 538Change the Registered Organization for Windows: Answer 538Display Disk Quota: Answer 539Allow Pop-Ups from a Site: Answer 539Turn On DEP: Answer 540Enable Protection: Answer 540Require Wake-Up Password: Answer 541Open a Port in Windows Firewall: Answer 542Open the User Accounts: Answer 543Identify the Issue #3: Answer 543Open the System Properties: Answer 543View Group Policy Settings: Answer 543MISC: Attack Types: Answer 544Secure the Database: Answer 544Call Up the Security Policy Manager: Answer 545MISC: Identify the Tool #3: Answer 545View Effective Permissions for a File: Answer 546Create a Quota on Disk Space: Answer 546Optimize a Folder: Answer 547Choose Firewall Notifications: Answer 547MISC: Identify the Tool #4: Answer 548Turn Off Windows Firewall: Answer 549Disable Toolbars: Answer 549Reinstall Windows: Answer 550Change UAC Settings: Answer 550Synchronize Time: Answer 551View All Processes Currently Running: Answer 551Configure a Firewall: Answer 552Display ARP Table: Answer 552Display Windows Version: Answer 552MISC: Compute CIDR #2: Answer 553Summon the Event Viewer: Answer 553Identify the Issue #4: Answer 553Enable ReadyBoost: Answer 554Encrypt Folder Contents: Answer 555Clear Index Scores: Answer 555Turn On BitLocker: Answer 556Turn Off All AutoPlay: Answer 556Choose Default Programs: Answer 556Enable Shutdown Without Login: Answer 557Open System Configuration Editor: Answer 557Override Cookie Handling: Answer 558Software Updates: Answer 559Prohibit Remote Desktop: Answer 559Uninstall: Answer 560Change Notification Settings: Answer 560Display Network Name: Answer 561Flush the Cache: Answer 561Backup and Recover Passwords: Answer 561MISC: Identify the Tool #5: Answer 562MISC: Identify the Tool #6: Answer 563Restart Windows: Answer 564Identify the Issue #5: Answer 564Reduce the Number of Recently Used Programs: Answer 565File Properties: Answer 566Audit Views of a File: Answer 566Configure Sharing of a Folder: Answer 567Don t Display Last User: Answer 567Appendix C About the Companion CD 569What You ll Find on the CD 570Test Engine 570Electronic Flashcards 570E-book in All Formats 570Videos 571PDF of Glossary of Terms 571Adobe Reader 571System Requirements 571Using the Study Tools 572Troubleshooting 572Customer Care 572IndexCompTIA Security+ Review Guide: Exam SY0-401Introduction xxvChapter 1 Network Security 11.1 Implement security configuration parameters on network devices and other technologies 51.2 Given a scenario, use secure network administration principles 221.3 Explain network design elements and components 271.4 Given a scenario, implement common protocols and services 401.5 Given a scenario, troubleshoot security issues related to wireless networking 56Chapter 2 Compliance and Operational Security 692.1 Explain the importance of risk-related concepts 762.2 Summarize the security implications of integrating systems and data with third parties 922.3 Given a scenario, implement appropriate riskmitigation strategies 962.4 Given a scenario, implement basic forensic procedures 1012.5 Summarize common incident response procedures 1062.6 Explain the importance of security-related awareness and training 1112.7 Compare and contrast physical security and environmental controls 1232.8 Summarize risk-management best practices 1352.9 Given a scenario, select the appropriate control to meet the goals of security 148Chapter 3 Threats and Vulnerabilities 1553.1 Explain types of malware 1613.2 Summarize various types of attacks 1673.3 Summarize social engineering attacks and the associated effectiveness with each attack 1843.4 Explain types of wireless attacks 1883.5 Explain types of application attacks 1943.6 Analyze a scenario and select the appropriate type of mitigation and deterrent techniques 2013.7 Given a scenario, use appropriate tools and techniques to discover security threats and vulnerabilities 2113.8 Explain the proper use of penetration testing versus vulnerability scanning 217Chapter 4 Application, Data, and Host Security 2254.1 Explain the importance of application security controls and techniques 2294.2 Summarize mobile security concepts and technologies 2354.3 Given a scenario, select the appropriate solution to establish host security 2444.4 Implement the appropriate controls to ensure data security 2514.5 Compare and contrast alternative methods to mitigate security risks in static environments 257Chapter 5 Access Control and Identity Management 2675.1 Compare and contrast the function and purpose of authentication services 2705.2 Given a scenario, select the appropriate authentication, authorization, or access control 2755.3 Install and configure security controls when performing account management, based on best practices 289Chapter 6 Cryptography 2996.1 Given a scenario, utilize general cryptography concepts 3026.2 Given a scenario, use appropriate cryptographic methods 3316.3 Given a scenario, use appropriate PKI, certificate management, and associated components 344Appendix A Answers to Review Questions 359Chapter 1: Network Security 360Chapter 2: Compliance and Operational Security 360Chapter 3: Threats and Vulnerabilities 361Chapter 4: Application, Data, and Host Security 362Chapter 5: Access Control and Identity Management 363Chapter 6: Cryptography 364Appendix B About the Additional Study Tools 367Additional Study Tools 368Sybex Test Engine 368Electronic Flashcards 368PDF of Glossary of Terms 368Adobe Reader 368System Requirements 369Using the Study Tools 369Troubleshooting 369Customer Care 370Index 371

最近チェックした商品