Book Image

CompTIA Security+ Certification SY0-601: The Total Course [Video]

By : Mike Meyers, Daniel Lachance
4 (2)
Book Image

CompTIA Security+ Certification SY0-601: The Total Course [Video]

4 (2)
By: Mike Meyers, Daniel Lachance

Overview of this book

Excel in the CompTIA Security+ Certification SY0-601 exam by taking this course, which deep dives into the various concepts of risk management and kinds of risk involved, and the various security standards such as PCI DSS and the Cloud Controls Matrix (CCM) define what types of security controls to put in place to mitigate risk, both on-premises and in the cloud. Learn about data protection and the various cryptographic methods used to protect the critical keys in cryptography that keep communication secure. The course also reviews different types of certificates including web, email, code-signing, machine/computer, and user. Explore the 3 As—authentication, authorization, and accounting/auditing, which play a big role in IT security. Tracking activity through auditing provides accountability for access to resources such as files on a file server or database rows. Learn about securing dedicated systems using IoT. IoT devices are function-specific and can communicate over the Internet. Examples include environmental control devices, medical devices, and video surveillance systems. This episode also covers the Zigbee smart home automation protocol. Wrap up the course by understanding data backup; backing up data provides availability in the event of data deletion, corruption, or encryption through ransomware. This episode discusses backup settings such as compression and encryption, as well as full, differential, and incremental backup types. All resources are placed here: https://github.com/PacktPublishing/CompTIA-Security-Certification-SY0-601-The-Total-Course
Table of Contents (13 chapters)
Chapter 6
The Basic LAN
Content Locked
Section 13
Intrusion Detection and Prevention Systems (IDS/IPS)
Intrusion detection can detect, log, report, and send alerts when suspicious activity is detected on a host or on the network, whereas intrusion prevention can be configured to stop the suspicious activity. Anomaly detection can be signature-based or heuristic/behavior-based. Unified Threat Management (UTM) solutions combine firewall, IDS, IPS, and other security functions.