Acknowledgments |
|
xxv | |
Introduction |
|
xxvii | |
Part I The CompTIA Security+ Exam |
|
|
Module 1 Meet the Security+ Exam |
|
|
3 | (12) |
|
Why Do We Need Certification Exams? |
|
|
3 | (4) |
|
Demonstrating and Validating Skills and Knowledge |
|
|
4 | (1) |
|
The World of IT Security Certification |
|
|
5 | (2) |
|
The CompTIA Security+ Examination |
|
|
7 | (4) |
|
CompTIA as an Organization |
|
|
7 | (1) |
|
|
8 | (3) |
|
|
11 | (4) |
|
|
15 | (10) |
|
|
15 | (5) |
|
|
20 | (5) |
Part II Stepping Up to IT Security |
|
|
Module 3 The Basics of Security |
|
|
25 | (14) |
|
|
25 | (3) |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
27 | (1) |
|
Other Elements of Security |
|
|
28 | (2) |
|
|
28 | (1) |
|
|
28 | (1) |
|
|
28 | (1) |
|
Auditing and Accountability |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
30 | (4) |
|
|
30 | (1) |
|
|
31 | (1) |
|
Data Sensitivity and Classification |
|
|
31 | (1) |
|
Principle of Least Privilege |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
33 | (1) |
|
Due Diligence and Due Care |
|
|
34 | (1) |
|
|
34 | (5) |
|
Module 4 Understanding Security Governance |
|
|
39 | (12) |
|
|
39 | (8) |
|
|
40 | (1) |
|
Organizational Governance |
|
|
41 | (3) |
|
|
44 | (3) |
|
|
47 | (4) |
|
|
51 | (12) |
|
|
51 | (9) |
|
|
51 | (4) |
|
Putting It All Together: Risk |
|
|
55 | (1) |
|
|
56 | (4) |
|
|
60 | (3) |
|
Module 6 IT Risk Assessment |
|
|
63 | (14) |
|
|
63 | (2) |
|
|
63 | (2) |
|
|
65 | (6) |
|
|
66 | (3) |
|
|
69 | (1) |
|
Putting It All Together: Determining Risk |
|
|
70 | (1) |
|
|
70 | (1) |
|
|
71 | (6) |
Part III Core Security Concepts |
|
|
Module 7 Understanding Cryptography |
|
|
77 | (16) |
|
|
77 | (13) |
|
|
77 | (5) |
|
|
82 | (8) |
|
|
90 | (3) |
|
Module 8 Cryptographic Methods |
|
|
93 | (14) |
|
|
93 | (10) |
|
|
93 | (4) |
|
|
97 | (3) |
|
|
100 | (3) |
|
|
103 | (4) |
|
Module 9 Application of Cryptographic Methods |
|
|
107 | (10) |
|
Application of Cryptographic Methods |
|
|
107 | (7) |
|
Cryptography Applications |
|
|
107 | (5) |
|
Cryptographic Method Considerations |
|
|
112 | (2) |
|
|
114 | (3) |
|
Module 10 Public Key Infrastructure |
|
|
117 | (18) |
|
|
117 | (12) |
|
Keys, Algorithms, and Standards |
|
|
117 | (3) |
|
|
120 | (1) |
|
Digital Certificates and PM Structure |
|
|
121 | (4) |
|
|
125 | (3) |
|
|
128 | (1) |
|
|
129 | (6) |
Part IV Authentication and Authorization |
|
|
Module 11 Understanding Identification and Authentication |
|
|
135 | (12) |
|
|
135 | (8) |
|
|
136 | (3) |
|
|
139 | (2) |
|
Trusted Entity Authentication |
|
|
141 | (2) |
|
|
143 | (4) |
|
Module 12 Understanding Authorization |
|
|
147 | (10) |
|
|
147 | (6) |
|
|
147 | (4) |
|
|
151 | (2) |
|
|
153 | (4) |
|
Module 13 Authentication Methods and Services |
|
|
157 | (12) |
|
|
157 | (9) |
|
Authentication Protocols and Methods |
|
|
157 | (6) |
|
Remote Access Connection and Authentication Services |
|
|
163 | (3) |
|
|
166 | (3) |
|
Module 14 User Account Management |
|
|
169 | (18) |
|
|
169 | (13) |
|
Account Policy Enforcement |
|
|
169 | (8) |
|
Managing Privileges with User Accounts |
|
|
177 | (2) |
|
Account Management Considerations |
|
|
179 | (3) |
|
|
182 | (5) |
Part V Host Security |
|
|
|
187 | (18) |
|
Host-based Threats and Vulnerabilities |
|
|
187 | (14) |
|
|
187 | (6) |
|
|
193 | (8) |
|
|
201 | (4) |
|
|
205 | (14) |
|
|
205 | (11) |
|
|
205 | (3) |
|
Operating System Hardening |
|
|
208 | (4) |
|
Other Host Hardening Measures |
|
|
212 | (2) |
|
Maintaining a Host Security Posture |
|
|
214 | (2) |
|
|
216 | (3) |
|
Module 17 Hardening Host Network Services |
|
|
219 | (10) |
|
|
219 | (7) |
|
Network Protocols and the OSI Model |
|
|
219 | (7) |
|
|
226 | (3) |
|
Module 18 Storage Security |
|
|
229 | (12) |
|
|
229 | (9) |
|
|
229 | (1) |
|
Data Storage Controls and Methods |
|
|
230 | (5) |
|
Data Storage Best Practices |
|
|
235 | (3) |
|
|
238 | (3) |
|
|
241 | (16) |
|
|
241 | (10) |
|
|
241 | (6) |
|
|
247 | (4) |
|
|
251 | (6) |
Part VI LAN Security |
|
|
|
257 | (16) |
|
|
257 | (3) |
|
|
257 | (3) |
|
|
260 | (10) |
|
|
260 | (1) |
|
|
261 | (4) |
|
Secure Network Administration Principles |
|
|
265 | (5) |
|
|
270 | (3) |
|
Module 21 Network Threats |
|
|
273 | (8) |
|
|
273 | (5) |
|
|
273 | (5) |
|
|
278 | (3) |
|
Module 22 Network Hardening |
|
|
281 | (12) |
|
Securing and Defending Networks |
|
|
281 | (8) |
|
|
281 | (5) |
|
Network Hardening Techniques |
|
|
286 | (3) |
|
|
289 | (4) |
|
Module 23 Network Monitoring |
|
|
293 | (12) |
|
|
293 | (7) |
|
|
294 | (2) |
|
|
296 | (1) |
|
|
297 | (3) |
|
|
300 | (5) |
Part VII Application Security |
|
|
Module 24 Host Application Threats |
|
|
305 | (8) |
|
|
305 | (5) |
|
|
305 | (2) |
|
Other Web Application Attacks |
|
|
307 | (3) |
|
|
310 | (3) |
|
Module 25 Web Application Threats |
|
|
313 | (6) |
|
Threats from Web Applications |
|
|
313 | (2) |
|
|
313 | (2) |
|
|
315 | (4) |
|
Module 26 Application Hardening |
|
|
319 | (8) |
|
|
319 | (5) |
|
Application Security Controls and Techniques |
|
|
319 | (3) |
|
Application-Specific Attack Prevention |
|
|
322 | (2) |
|
|
324 | (3) |
|
Module 27 Internet Service Hardening |
|
|
327 | (10) |
|
Internet and Application Service Protocols |
|
|
327 | (7) |
|
Using Secure Protocols and Services |
|
|
327 | (7) |
|
|
334 | (3) |
|
Module 28 Virtualization Security |
|
|
337 | (12) |
|
Securing Virtual Environments |
|
|
337 | (6) |
|
|
337 | (5) |
|
Using Virtualization for Security |
|
|
342 | (1) |
|
|
343 | (6) |
Part VIII Wireless Security |
|
|
Module 29 Wireless Threats |
|
|
349 | (10) |
|
|
349 | (7) |
|
|
349 | (1) |
|
|
350 | (1) |
|
Wardriving and Warchalking |
|
|
351 | (1) |
|
|
352 | (1) |
|
|
352 | (1) |
|
|
353 | (1) |
|
|
353 | (1) |
|
|
354 | (1) |
|
|
355 | (1) |
|
|
355 | (1) |
|
|
355 | (1) |
|
|
356 | (3) |
|
Module 30 Wireless Hardening |
|
|
359 | (20) |
|
Wireless Security Protocols |
|
|
359 | (4) |
|
|
359 | (1) |
|
|
360 | (1) |
|
|
361 | (1) |
|
|
361 | (1) |
|
|
361 | (1) |
|
|
362 | (1) |
|
|
362 | (1) |
|
|
363 | (2) |
|
|
363 | (1) |
|
|
363 | (1) |
|
|
364 | (1) |
|
|
364 | (1) |
|
Wireless Security Considerations |
|
|
365 | (6) |
|
|
365 | (1) |
|
|
365 | (1) |
|
|
366 | (5) |
|
Troubleshooting Wireless Security Issues |
|
|
371 | (2) |
|
|
371 | (1) |
|
|
372 | (1) |
|
|
372 | (1) |
|
|
373 | (6) |
Part IX Physical Security |
|
|
Module 31 Environmental Security and Controls |
|
|
379 | (8) |
|
|
379 | (4) |
|
|
379 | (1) |
|
|
380 | (2) |
|
|
382 | (1) |
|
Temperature and Humidity Controls |
|
|
382 | (1) |
|
|
382 | (1) |
|
|
383 | (1) |
|
|
383 | (4) |
|
Module 32 Perimeter and Physical Controls |
|
|
387 | (20) |
|
|
387 | (4) |
|
|
387 | (1) |
|
|
388 | (3) |
|
|
391 | (10) |
|
Perimeter and Safety Controls |
|
|
391 | (10) |
|
|
401 | (6) |
Part X Outside Security |
|
|
Module 33 Third-Party Security |
|
|
407 | (12) |
|
Third-Party Business Practices |
|
|
407 | (8) |
|
Integrating Systems and Data with Third Parties |
|
|
409 | (2) |
|
Third-Party Security Considerations |
|
|
411 | (2) |
|
|
413 | (2) |
|
|
415 | (4) |
|
|
419 | (12) |
|
|
419 | (8) |
|
|
420 | (2) |
|
Cloud Architecture Models |
|
|
422 | (1) |
|
Cloud Computing Risks and Virtualization |
|
|
423 | (2) |
|
Appropriate Controls to Ensure Data Security |
|
|
425 | (2) |
|
|
427 | (4) |
|
Module 35 Mobile Security |
|
|
431 | (22) |
|
Mobile Devices in the Business World |
|
|
431 | (17) |
|
Mobile Security Concepts and Technologies |
|
|
432 | (5) |
|
Application Control and Security |
|
|
437 | (1) |
|
Encryption and Authentication |
|
|
438 | (2) |
|
|
440 | (3) |
|
|
443 | (2) |
|
|
445 | (3) |
|
|
448 | (5) |
Part XI People Security |
|
|
Module 36 Social Engineering |
|
|
453 | (12) |
|
Social Engineering Attacks |
|
|
453 | (9) |
|
|
453 | (1) |
|
|
454 | (5) |
|
Social Engineering Principles of Effectiveness |
|
|
459 | (3) |
|
|
462 | (3) |
|
Module 37 Security Training |
|
|
465 | (14) |
|
Security Awareness and Training |
|
|
465 | (9) |
|
|
465 | (2) |
|
|
467 | (3) |
|
|
470 | (2) |
|
New Threats and New Security Trends/Alerts |
|
|
472 | (1) |
|
|
473 | (1) |
|
|
474 | (5) |
Part XIII Proactive Security |
|
|
Module 38 Security Assessment |
|
|
479 | (16) |
|
Security Assessment Tools and Techniques |
|
|
479 | (12) |
|
|
480 | (1) |
|
|
481 | (1) |
|
|
482 | (4) |
|
|
486 | (3) |
|
Interpreting Security Assessment Tool Results |
|
|
489 | (2) |
|
|
491 | (4) |
|
Module 39 Incident Response |
|
|
495 | (12) |
|
Incident Response Concepts |
|
|
495 | (2) |
|
Risk Mitigation Strategies |
|
|
495 | (1) |
|
|
496 | (1) |
|
Incident Response Procedures |
|
|
497 | (7) |
|
|
497 | (1) |
|
Executing an Incident Response |
|
|
498 | (5) |
|
|
503 | (1) |
|
|
504 | (3) |
|
Module 40 Forensics Procedures |
|
|
507 | (12) |
|
|
507 | (2) |
|
Impartiality and the Collection of Evidence |
|
|
507 | (1) |
|
|
508 | (1) |
|
Legal and Ethical Considerations |
|
|
508 | (1) |
|
|
509 | (1) |
|
|
509 | (1) |
|
Critical Forensic Practices |
|
|
510 | (3) |
|
|
510 | (1) |
|
Chain-of-Custody and Securely Handling Evidence |
|
|
511 | (1) |
|
|
511 | (1) |
|
File and Evidence Integrity |
|
|
512 | (1) |
|
Track Man Hours and Expense |
|
|
512 | (1) |
|
|
513 | (2) |
|
|
513 | (1) |
|
|
514 | (1) |
|
|
514 | (1) |
|
|
515 | (1) |
|
|
515 | (1) |
|
|
516 | (1) |
|
|
516 | (3) |
|
Module 41 Business Continuity |
|
|
519 | (12) |
|
Risk Management Best Practices |
|
|
519 | (1) |
|
|
519 | (1) |
|
Business Continuity Concepts |
|
|
520 | (2) |
|
|
520 | (1) |
|
Identification of Critical Systems and Components |
|
|
520 | (1) |
|
Removing Single Points of Failure |
|
|
521 | (1) |
|
Business Continuity Planning |
|
|
522 | (4) |
|
|
522 | (1) |
|
|
523 | (1) |
|
|
523 | (1) |
|
|
523 | (1) |
|
|
524 | (1) |
|
|
525 | (1) |
|
|
526 | (1) |
|
|
526 | (1) |
|
|
526 | (1) |
|
|
526 | (1) |
|
Full Tests and Disaster Recovery Exercises |
|
|
527 | (1) |
|
|
527 | (4) |
|
Module 42 Disaster Recovery |
|
|
531 | (12) |
|
Disaster Recovery Concepts |
|
|
531 | (7) |
|
Backup Plans and Policies |
|
|
532 | (1) |
|
Backup Execution and Frequency |
|
|
533 | (2) |
|
|
535 | (2) |
|
Recovery Time and Recovery Point Objectives |
|
|
537 | (1) |
|
|
538 | |
Part XIII Appendixes and Glossary |
|
|
Appendix A Exam Objectives Map |
|
|
543 | (4) |
|
Appendix B About the CD-ROM |
|
|
547 | (4) |
Glossary |
|
551 | (48) |
Index |
|
599 | |