Description
CompTIA Security+ All-in-One Exam Guide 5th Edition by Wm. Arthur Conklin, ISBN-13: 978-1260019322
[PDF eBook eTextbook] – Available Instantly
- Publisher: McGraw Hill; 5th edition (January 8, 2018)
- Language: English
- 647 pages
- ISBN-10: 1260019322
- ISBN-13: 978-1260019322
This fully updated study guide covers every topic on the current version of the CompTIA Security+ exam.
Take the latest version of the CompTIA Security+ exam with complete confidence using the detailed information contained in this highly effective self-study system. Written by a team of leading information security experts, this authoritative guide addresses the skills required for securing a network and managing risk and enables you to become CompTIA Security+ certified.
CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501) covers all exam domains and features 200 accurate practice questions. To aid in study, the book features learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. All questions mirror those on the live test in style, format, and difficulty. Beyond fully preparing you for the challenging SY0-501 exam, the book also serves as a valuable on-the-job reference for IT professionals.
• Provides 100% coverage of every objective on exam SY0-501
• Electronic content includes 200 practice questions and a secured book PDF
• Written by a team of experienced IT security academics
Table of Contents:
Cover
Title Page
Copyright Page
Dedication
Contents
Preface
Acknowledgments
Introduction
Objective Map: Exam SY0-501
Part I Threats, Attacks, and Vulnerabilities
Chapter 1 Malware and Indicators of Compromise
Malware
Polymorphic Malware
Viruses
Crypto-malware
Ransomware
Worm
Trojan
Rootkit
Keylogger
Adware
Spyware
Bots
RAT
Logic Bomb
Backdoor
Indicators of Compromise
Chapter Review
Questions
Answers
Chapter 2 Attacks
Social Engineering Methods
Phishing
Spear Phishing
Whaling
Vishing
Tailgating
Impersonation
Dumpster Diving
Shoulder Surfing
Hoax
Watering Hole Attack
Social Engineering Principles
Application/Service Attacks
DoS
DDoS
Man-in-the-Middle
Buffer Overflow
Injection
Cross-Site Scripting
Cross-Site Request Forgery
Privilege Escalation
ARP Poisoning
Amplification
DNS Poisoning
Domain Hijacking
Man-in-the-Browser
Zero Day
Replay
Pass the Hash
Hijacking and Related Attacks
Driver Manipulation
Spoofing
MAC Spoofing
IP Address Spoofing
Wireless Attacks
Replay
IV
Evil Twin
Rogue AP
Jamming
WPS
Bluejacking
Bluesnarfing
RFID
NFC
Disassociation
Cryptographic Attacks
Birthday
Known Plaintext/Ciphertext
Password Attacks
Rainbow Tables
Dictionary
Brute Force
Hybrid Attack
Collision
Downgrade
Replay
Weak Implementations
Chapter Review
Questions
Answers
Chapter 3 Threat Actors
Types of Actors
Script Kiddies
Hacktivists
Organized Crime
Nation States/APT
Insiders
Competitors
Attributes of Actors
Internal/External
Level of Sophistication
Resources/Funding
Intent/Motivation
Use of Open Source Intelligence
Chapter Review
Questions
Answers
Chapter 4 Vulnerability Scanning and Penetration Testing
Penetration Testing Concepts
Active Reconnaissance
Passive Reconnaissance
Pivot
Initial Exploitation
Persistence
Escalation of Privilege
Black Box
White Box
Gray Box
Pen Testing vs. Vulnerability Scanning
Vulnerability Scanning Concepts
Passively Test Security Controls
Identify Vulnerability
Identify Lack of Security Controls
Identify Common Misconfigurations
Intrusive vs. Non-intrusive
Credentialed vs. Non-credentialed
False Positive
Chapter Review
Questions
Answers
Chapter 5 Vulnerabilities and Impacts
Race Conditions
System Vulnerabilities
End-of-Life Systems
Embedded Systems
Lack of Vendor Support
Improper Input Handling
Improper Error Handling
Misconfiguration/Weak Configuration
Default Configuration
Resource Exhaustion
Untrained Users
Improperly Configured Accounts
Vulnerable Business Processes
Weak Cipher Suites and Implementations
Memory/Buffer Vulnerability
Memory Leak
Integer Overflow
Buffer Overflow
Pointer Dereference
DLL Injection
System Sprawl/Undocumented Assets
Architecture/Design Weaknesses
New Threats/Zero Day
Improper Certificate and Key Management
Chapter Review
Questions
Answers
Part II Technologies and Tools
Chapter 6 Network Components
Firewall
How Do Firewalls Work?
Firewall Rules
ACL
Application-Based vs. Network-Based
Stateful vs. Stateless
Implicit Deny
Secure Network Administration Principles
Rule-Based Management
VPN Concentrator
Remote Access vs. Site-to-Site
IPSec
Split Tunnel vs. Full Tunnel
TLS
Always-on VPN
NIPS/NIDS
Signature-Based
Heuristic/Behavioral
Anomaly
Inline vs. Passive
In-Band vs. Out-of-Band
Rules
Analytics
Router
ACLs
Antispoofing
Switch
Port Security
Layer 2 vs. Layer 3
Loop Prevention
Flood Guard
Proxy
Forward and Reverse Proxy
Transparent
Application/Multipurpose
Load Balancer
Scheduling
Active-Passive
Active-Active
Virtual IPs
Access Point
SSID
MAC Filtering
Signal Strength
Band Selection/Width
Antenna Types and Placement
Fat vs. Thin
Controller-Based vs. Standalone
SIEM
Aggregation
Correlation
Automated Alerting and Triggers
Time Synchronization
Event Deduplication
Logs/WORM
DLP
USB Blocking
Cloud-Based
E-mail
NAC
Dissolvable vs. Permanent
Host Health Checks
Agent vs. Agentless
Mail Gateway
Spam Filter
DLP
Encryption
Bridge
SSL/TLS Accelerators
SSL Decryptors
Media Gateway
Hardware Security Module
Chapter Review
Questions
Answers
Chapter 7 Security Tools and Technologies
Protocol Analyzer
Switched Port Analyzer
Network Scanners
Rogue System Detection
Network Mapping
Wireless Scanners/Cracker
Password Cracker
Vulnerability Scanner
Configuration Compliance Scanner
Exploitation Frameworks
Data Sanitization Tools
Steganography Tools
Honeypot
Backup Utilities
Banner Grabbing
Passive vs. Active
Command-Line Tools
ping
netstat
tracert
nslookup/dig
arp
ipconfig/ip/ifconfig
tcpdump
nmap
netcat
Security Technologies
HIDS/HIPS
Antivirus
File Integrity Check
Host-Based Firewall
Application Whitelisting
Removable Media Control
Advanced Malware Tools
Patch Management Tools
UTM
DLP
Data Execution Prevention
Web Application Firewall
Chapter Review
Questions
Answers
Chapter 8 Troubleshooting Common Security Issues
Unencrypted Credentials/Clear Text
Logs and Events Anomalies
Permission Issues
Access Violations
Certificate Issues
Data Exfiltration
Misconfigured Devices
Firewall
Content Filter
Access Points
Weak Security Configurations
Personnel Issues
Policy Violation
Insider Threat
Social Engineering
Social Media
Personal E-mail
Unauthorized Software
Baseline Deviation
License Compliance Violation (Availability/Integrity)
Asset Management
Authentication Issues
Chapter Review
Questions
Answers
Chapter 9 Mobile Devices
Connection Methods
Cellular
Wi-Fi
SATCOM
Bluetooth
NFC
ANT
Infrared
USB
Mobile Device Management Concepts
Application Management
Content Management
Remote Wipe
Geofencing
Geolocation
Screen Locks
Push Notification Services
Passwords and Pins
Biometrics
Context-Aware Authentication
Containerization
Storage Segmentation
Full Device Encryption
Enforcement and Monitoring
Third-Party App Stores
Rooting/Jailbreaking
Sideloading
Custom Firmware
Carrier Unlocking
Firmware OTA Updates
Camera Use
SMS/MMS
External Media
USB OTG
Recording Microphone
GPS Tagging
Wi-Fi Direct/Ad Hoc
Tethering
Payment Methods
Deployment Models
BYOD
CYOD
COPE
Corporate-Owned
VDI
Chapter Review
Questions
Answers
Chapter 10 Implementing Secure Protocols
Secure Protocols
DNSSEC
SSH
S/MIME
SRTP
LDAPS
FTPS
SFTP
SNMPv3
SSL/TLS
HTTPS
Secure POP/IMAP
Use Cases
Voice and Video
Time Synchronization
E-mail and Web
File Transfer
Directory Services
Remote Access
Domain Name Resolution
Routing and Switching
Network Address Allocation
Subscription Services
Chapter Review
Questions
Answers
Part III Architecture and Design
Chapter 11 Architecture Frameworks and Secure Network Architectures
Industry-Standard Frameworks and Reference Architectures
Regulatory
Non-regulatory
National vs. International
Industry-Specific Frameworks
Benchmarks/Secure Configuration Guides
Platform/Vendor-Specific Guides
General Purpose Guides
Defense-in-Depth/Layered Security
Vendor Diversity
Control Diversity
User Training
Zones/Topologies
DMZ
Extranet
Intranet
Wireless
Guest
Honeynets
NAT
Ad Hoc
Segregation/Segmentation/Isolation
Physical
Logical (VLAN)
Virtualization
Air Gaps
Tunneling/VPN
Site-to-Site
Remote Access
Security Device/Technology Placement
Sensors
Collectors
Correlation Engines
Filters
Proxies
Firewalls
VPN Concentrators
SSL Accelerators
Load Balancers
DDoS Mitigator
Aggregation Switches
Taps and Port Mirror
SDN
Chapter Review
Questions
Answers
Chapter 12 Secure Systems Design and Deployment
Hardware/Firmware Security
FDE/SED
TPM
HSM
UEFI/BIOS
Secure Boot and Attestation
Supply Chain
Hardware Root of Trust
EMI/EMP
Operating Systems
Types
Patch Management
Disabling Unnecessary Ports and Services
Least Functionality
Secure Configurations
Trusted Operating System
Application Whitelisting/Blacklisting
Disable Default Accounts/Passwords
Peripherals
Wireless Keyboards
Wireless Mice
Displays
Wi-Fi-Enabled MicroSD Cards
Printers/MFDs
External Storage Devices
Digital Cameras
Sandboxing
Environment
Development
Test
Staging
Production
Secure Baseline
Integrity Measurement
Chapter Review
Questions
Answers
Chapter 13 Embedded Systems
SCADA/ICS
Smart Devices/IoT
Wearable Technology
Home Automation
HVAC
SoC
RTOS
Printers/MFDs
Camera Systems
Special Purpose
Medical Devices
Vehicles
Aircraft/UAV
Chapter Review
Questions
Answers
Chapter 14 Application Development and Deployment
Development Lifecycle Models
Waterfall vs. Agile
Secure DevOps
Security Automation
Continuous Integration
Baselining
Immutable Systems
Infrastructure as Code
Version Control and Change Management
Provisioning and Deprovisioning
Secure Coding Techniques
Proper Error Handling
Proper Input Validation
Normalization
Stored Procedures
Code Signing
Encryption
Obfuscation/Camouflage
Code Reuse/Dead Code
Server-Side vs. Client-Side Execution and Validation
Memory Management
Use of Third-Party Libraries and SDKs
Data Exposure
Code Quality and Testing
Static Code Analyzers
Dynamic Analysis (e.g., Fuzzing)
Stress Testing
Sandboxing
Model Verification
Compiled vs. Runtime Code
Chapter Review
Questions
Answers
Chapter 15 Cloud and Virtualization
Hypervisor
Type I
Type II
Application Cells/Containers
VM Sprawl Avoidance
VM Escape Protection
Cloud Storage
Cloud Deployment Models
SaaS
PaaS
IaaS
Private
Public
Hybrid
Community
On-Premise vs. Hosted vs. Cloud
VDI/VDE
Cloud Access Security Broker
Security as a Service
Chapter Review
Questions
Answers
Chapter 16 Resiliency and Automation Strategies
Automation/Scripting
Automated Courses of Action
Continuous Monitoring
Configuration Validation
Templates
Master Image
Non-persistence
Snapshots
Revert to Known State
Rollback to Known Configuration
Live Boot Media
Elasticity
Scalability
Distributive Allocation
Redundancy
Fault Tolerance
High Availability
RAID
Chapter Review
Questions
Answers
Chapter 17 Physical Security Controls
Lighting
Signs
Fencing/Gate/Cage
Security Guards
Alarms
Safe
Secure Cabinets/Enclosures
Protected Distribution/Protected Cabling
Airgap
Mantrap
Faraday Cages
Lock Types
Biometrics
Barricades/Bollards
Tokens/Cards
Environmental Controls
HVAC
Hot and Cold Aisles
Fire Suppression
Cable Locks
Screen Filters
Cameras
Motion Detection
Logs
Infrared Detection
Key Management
Chapter Review
Questions
Answers
Part IV Identity and Access Management
Chapter 18 Identity, Access, and Accounts
Identification, Authentication, Authorization, and Accounting (AAA)
Multifactor Authentication
Something You Are
Something You Have
Something You Know
Something You Do
Somewhere You Are
Federation
Single Sign-on
Transitive Trust
Account Types
User Account
Shared and Generic Accounts/Credentials
Guest Accounts
Service Accounts
Privileged Accounts
General Concepts
Least Privilege
Onboarding/Offboarding
Permission Auditing and Review
Usage Auditing and Review
Time-of-Day Restrictions
Recertification
Standard Naming Convention
Account Maintenance
Group-Based Access Control
Location-Based Policies
Account Policy Enforcement
Credential Management
Group Policy
Password Complexity
Expiration
Recovery
Disablement
Lockout
Password History
Password Reuse
Password Length
Chapter Review
Questions
Answers
Chapter 19 Identity and Access Services
LDAP
Kerberos
TACACS+
TACACS+ Authentication
TACACS+ Authorization
TACACS+ Accounting
CHAP
PAP
MSCHAP
RADIUS
SAML
OpenID Connect
OAUTH
Shibboleth
Secure Token
NTLM
Chapter Review
Questions
Answers
Chapter 20 Identity and Access Management Controls
Access Control Models
MAC
DAC
ABAC
Role-Based Access Control
Rule-Based Access Control
Physical Access Control
Proximity Cards
Smart Cards
Biometric Factors
Fingerprint Scanner
Retinal Scanner
Iris Scanner
Voice Recognition
Facial Recognition
False Positives and False Negatives
False Acceptance Rate
False Rejection Rate
Crossover Error Rate
Biometrics Calculation Example
Tokens
Hardware
Software
HOTP/TOTP
Certificate-Based Authentication
PIV/CAC/Smart Card
IEEE 802.1x
File System Security
Database Security
Chapter Review
Questions
Answers
Part V Risk Management
Chapter 21 Policies, Plans, and Procedures
Standard Operating Procedure
Agreement Types
BPA
SLA
ISA
MOU/MOA
Personnel Management
Mandatory Vacations
Job Rotation
Separation of Duties
Clean Desk
Background Checks
Exit Interviews
Role-Based Awareness Training
NDA
Onboarding
Continuing Education
Acceptable Use Policy/Rules of Behavior
Adverse Actions
General Security Policies
Social Media Networks/Applications
Personal E-mail
Chapter Review
Questions
Answers
Chapter 22 Risk Management and Business Impact Analysis
Business Impact Analysis Concepts
RTO/RPO
MTBF
MTTR
Mission-Essential Functions
Identification of Critical Systems
Single Point of Failure
Impact
Privacy Impact Assessment
Privacy Threshold Assessment
Risk Management Concepts
Threat Assessment
Risk Assessment
Change Management
Security Controls
Deterrent
Preventive
Detective
Corrective
Compensating
Technical
Administrative
Physical
Chapter Review
Questions
Answers
Chapter 23 Incident Response, Disaster Recovery, and Continuity of Operations
Incident Response Plan
Documented Incident Types/Category Definitions
Roles and Responsibilities
Reporting Requirements/Escalation
Cyber-Incident Response Teams
Exercise
Incident Response Process
Preparation
Identification
Containment
Eradication
Recovery
Lessons Learned
Disaster Recovery
Recovery Sites
Hot Sites
Warm Sites
Cold Sites
Order of Restoration
Backup Concepts
Differential
Incremental
Snapshots
Full
Geographic Considerations
Off-Site Backups
Distance
Location Selection
Legal Implications
Data Sovereignty
Continuity of Operation Planning
Exercises/Tabletop
After-Action Reports
Failover
Alternate Processing Sites
Alternate Business Practices
Chapter Review
Questions
Answers
Chapter 24 Digital Forensics
Order of Volatility
Chain of Custody
Legal Hold
Data Acquisition
Standards for Evidence
Types of Evidence
Three Rules Regarding Evidence
Capture System Image
Network Traffic and Logs
Capture Video
Record Time Offset
Take Hashes
Screenshots
Witness Interviews
Preservation
Recovery
Strategic Intelligence/Counterintelligence Gathering
Active Logging
Track Man-Hours
Chapter Review
Questions
Answers
Chapter 25 Data Security and Privacy Practices
Data Destruction and Media Sanitization
Burning
Shredding
Pulping
Pulverizing
Degaussing
Purging
Wiping
Data Sensitivity Labeling and Handling
Confidential
Private
Public
Proprietary
PII
PHI
Data Roles
Owner
Steward/Custodian
Privacy Officer
Data Retention
Legal and Compliance
Chapter Review
Questions
Answers
Part VI Cryptography and Public Key Infrastructure
Chapter 26 Cryptographic Concepts
General Cryptographic Concepts
Fundamental Methods
Symmetric Algorithms
Modes of Operation
Asymmetric Algorithms
Symmetric vs. Asymmetric
Hashing
Salt, IV, Nonce
Elliptic Curve
Weak/Deprecated Algorithms
Key Exchange
Cryptographic Objectives
Digital Signatures
Diffusion
Confusion
Collision
Steganography
Obfuscation
Stream vs. Block
Key Strength
Session Keys
Ephemeral Key
Secret Algorithm
Data-in-Transit
Data-at-Rest
Data-in-Use
Random/Pseudo-Random Number Generation
Key Stretching
Implementation vs. Algorithm Selection
Perfect Forward Secrecy
Security Through Obscurity
Common Use Cases
Chapter Review
Questions
Answers
Chapter 27 Cryptographic Algorithms
Symmetric Algorithms
DES
3DES
AES
RC4
Blowfish/Twofish
Cipher Modes
CBC
GCM
ECB
CTM/CTR
Stream vs. Block
Asymmetric Algorithms
RSA
DSA
Diffie-Hellman
Elliptic Curve
PGP/GPG
Hashing Algorithms
MD5
SHA
HMAC
RIPEMD
Key Stretching Algorithms
BCRYPT
PBKDF2
Obfuscation
XOR
ROT13
Substitution Ciphers
Chapter Review
Questions
Answers
Chapter 28 Wireless Security
Cryptographic Protocols
WEP
WPA
WPA2
CCMP
TKIP
Authentication Protocols
EAP
PEAP
EAP-FAST
EAP-TLS
EAP-TTLS
IEEE 802.1X
RADIUS Federation
Methods
PSK vs. Enterprise vs. Open
WPS
Setting Up WPA2
Captive Portals
Chapter Review
Questions
Answers
Chapter 29 Public Key Infrastructure
PKI Components
Certificate Authority
Intermediate CA
Revocation
Suspension
CSR
Certificate
Public Key
Private Key
Object Identifiers
PKI Concepts
Online vs. Offline CA
Stapling
Pinning
Trust Model
Key Escrow
Certificate Chaining
Types of Certificates
Wildcard
SAN
Code Signing
Self-Signed
Machine/Computer
E-mail
User
Root
Domain Validation
Extended Validation
Certificate Formats
DER
PEM
CER
KEY
PFX
P12
P7B
Chapter Review
Questions
Answers
Part VII Appendixes and Glossary
Appendix A OSI Model and Internet Protocols
Networking Frameworks and Protocols
OSI Model
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Link Layer
Physical Layer
Internet Protocols
TCP
UDP
IP
Message Encapsulation
Review
Appendix B About the Download
System Requirements
Installing and Running Total Tester
About Total Tester
Technical Support
Glossary
Index
Wm. Arthur Conklin is an Assistant Professor in the Information and Logistics Technology department of the College of Technology at the University of Houston. He received his Ph.D. in Business Administration, from The University of Texas at San Antonio (UTSA), with specialization in Information Systems. He holds Security+, CISSP, CSSLP, CRISC, CSDP, DFCP, IAM and IEM certifications. Currently a founding member and Director of the Center for Information Security Research and Education (CISRE) at the University of Houston, Dr. Conklin has previously served as the Technical Director for the Center for Infrastructure Assurance and Security (CIAS) at The University of Texas at San Antonio. His research interests include the use of systems theory to explore information security, specifically in Cyber Physical Systems (CPS), and the measurement of security through regulation and metrics. He has an extensive background in secure coding and is a member of DHS Software Assurance Forum working group for workforce education and development. A frequent speaker on information security, he has authored numerous academic publications on security and is a co-author on six books on information security.
What makes us different?
• Instant Download
• Always Competitive Pricing
• 100% Privacy
• FREE Sample Available
• 24-7 LIVE Customer Support