Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying CompTIA Security+ Certification Guide
  • Table Of Contents Toc
  • Feedback & Rating feedback
CompTIA Security+ Certification Guide

CompTIA Security+ Certification Guide

By : Ian Neil
4.6 (90)
close
close
CompTIA Security+ Certification Guide

CompTIA Security+ Certification Guide

4.6 (90)
By: Ian Neil

Overview of this book

CompTIA Security+ is a worldwide certification that establishes the fundamental knowledge required to perform core security functions and pursue an IT security career. CompTIA Security+ Certification Guide is a best-in-class exam study guide that covers all of CompTIA Security+ 501 exam objectives. It is authored by Ian Neil, who is a world-class trainer of CompTIA Security+ 501. Packed with self-assessment scenarios and realistic exam questions, this guide will help you master the core concepts to succeed in the exam the first time you take it. Using relevant examples, you will learn all the important security fundamentals from Certificates and Encryption to Identity and Access Management concepts. You will then dive into the important domains of the exam; namely, threats, attacks and vulnerabilities, technologies and tools, architecture and design, risk management, and cryptography and Public Key Infrastructure (PKI). This book comes with over 600 practice questions with detailed explanation that is at the exam level and also includes two mock exams to help you with your study plan. This guide will ensure that encryption and certificates are made easy for you.
Table of Contents (18 chapters)
close
close
12
Mock Exam 1
13
Mock Exam 2
15
Acronyms

Troubleshooting Common Security Issues

On a day-to-day basis, the security team will come across some of the following issues; we will look at how the team can mitigate them:

  • Unencrypted credentials/clear text: Unencrypted credentials/clear text are a security risk as they can be intercepted by a packet sniffer or protocol analyzer. We should be using an authentication protocol, such as Kerberos, that is encrypted and encrypts data in transit.
  • Logs and events anomalies: There are many logs in a company (such as firewall logs, antivirus logs, and event viewers on computers and servers), showing attempts to log into the network. The best way to prevent duplications of events and get real-time monitoring would be to install an SIEM system.
  • Permission issues: Permissions that are incorrectly set can give users more permissions than they need to do their jobs, but someone with more...
Visually different images
CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
CompTIA Security+ Certification Guide
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist download Download options font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon