CompTIA security+ study guide Exam SY0-701
Book - 2024
In the newly revised ninth edition of CompTIA Security+ Study Guide: Exam SY0-701, veteran cybersecurity professionals and educators Mike Chapple and David Seidl deliver easy-to-follow coverage of the security fundamentals tested by the challenging CompTIA SY0-701 exam. You'll explore general security concepts, threats, vulnerabilities, mitigations, security architecture and operations, as well as security program management and oversight. Practice exams that get you ready to succeed on your first try at the real thing and help you conquer test anxiety. Hundreds of review questions that gauge your readiness for the certification exam and help you retain and remember key concepts. Complimentary access to the online Sybex learning enviro...nment, complete with hundreds of additional practice questions and flashcards, and a glossary of key terms, all supported by Wiley's support agents who are available 24x7 via email or live chat to assist with access and login questions. --
- Subjects
- Genres
- Examination study guides
Study guides
Examinations - Published
-
Hoboken, NJ :
Sybex
[2024]
- Language
- English
- Main Author
- Other Authors
- Edition
- Ninth edition
- Item Description
- "Over 500 practice test questions"--Cover.
- Physical Description
- xlviii, 652 pages : illustrations ; 24 cm
- Bibliography
- Includes Index.
- ISBN
- 9781394211418
- Introduction
- Chapter 1. Today's Security Professional
- Cybersecurity Objectives
- Data Breach Risks
- The DAD Triad
- Breach Impact
- Implementing Security Controls
- Gap Analysis
- Security Control Categories
- Security Control Types
- Data Protection
- Data Encryption
- Data Loss Prevention
- Data Minimization
- Access Restrictions
- Segmentation and Isolation
- Summary
- Exam Essentials
- Review Questions
- Chapter 2. Cybersecurity Threat Landscape
- Exploring Cybersecurity Threats
- Classifying Cybersecurity Threats
- Threat Actors
- Attacker Motivations
- Threat Vectors and Attack Surfaces
- Threat Data and Intelligence
- Open Source Intelligence
- Proprietary and Closed-Source Intelligence
- Assessing Threat Intelligence
- Threat Indicator Management and Exchange
- Information Sharing Organizations
- Conducting Your Own Research
- Summary
- Exam Essentials
- Review Questions
- Chapter 3. Malicious Code
- Malware
- Ransomware
- Trojans
- Worms
- Spyware
- Bloatware
- Viruses
- Keyloggers
- Logic Bombs
- Rootkits
- Summary
- Exam Essentials
- Review Questions
- Chapter 4. Social Engineering and Password Attacks
- Social Engineering and Human Vectors
- Social Engineering Techniques
- Password Attacks
- Summary
- Exam Essentials
- Review Questions
- Chapter 5. Security Assessment and Testing
- Vulnerability Management
- Identifying Scan Targets
- Determining Scan Frequency
- Configuring Vulnerability Scans
- Scanner Maintenance
- Vulnerability Scanning Tools
- Reviewing and Interpreting Scan Reports
- Confirmation of Scan Results
- Vulnerability Classification
- Patch Management
- Legacy Platforms
- Weak Configurations
- Error Messages
- Insecure Protocols
- Weak Encryption
- Penetration Testing
- Adopting the Hacker Mindset
- Reasons for Penetration Testing
- Benefits of Penetration Testing
- Penetration Test Types
- Rules of Engagement
- Reconnaissance
- Running the Test
- Cleaning Up
- Audits and Assessments
- Security Tests
- Security Assessments
- Security Audits
- Vulnerability Life Cycle
- Vulnerability Identification
- Vulnerability Analysis
- Vulnerability Response and Remediation
- Validation of Remediation
- Reporting
- Summary
- Exam Essentials
- Review Questions
- Chapter 6. Application Security
- Software Assurance Best Practices
- The Software Development Life Cycle
- Software Development Phases
- DevSecOps and DevOps
- Designing and Coding for Security
- Secure Coding Practices
- API Security
- Software Security Testing
- Analyzing and Testing Code
- Injection Vulnerabilities
- SQL Injection Attacks
- Code Injection Attacks
- Command Injection Attacks
- Exploiting Authentication Vulnerabilities
- Password Authentication
- Session Attacks
- Exploiting Authorization Vulnerabilities
- Insecure Direct Object References
- Directory Traversal
- File Inclusion
- Privilege Escalation
- Exploiting Web Application Vulnerabilities
- Cross-Site Scripting (XSS)
- Request Forgery
- Application Security Controls
- Input Validation
- Web Application Firewalls
- Parameterized Queries
- Sandboxing
- Code Security
- Secure Coding Practices
- Source Code Comments
- Error Handling
- Hard-Coded Credentials
- Package Monitoring
- Memory Management
- Race Conditions
- Unprotected APIs
- Automation and Orchestration
- Use Cases of Automation and Scripting
- Benefits of Automation and Scripting
- Other Considerations
- Summary
- Exam Essentials
- Review Questions
- Chapter 7. Cryptography and the PKI
- An Overview of Cryptography
- Historical Cryptography
- Goals of Cryptography
- Confidentiality
- Integrity
- Authentication
- Non-repudiation
- Cryptographic Concepts
- Cryptographic Keys
- Ciphers
- Modern Cryptography
- Cryptographic Secrecy
- Symmetric Key Algorithms
- Asymmetric Key Algorithms
- Hashing Algorithms
- Symmetric Cryptography
- Data Encryption Standard
- Advanced Encryption Standard
- Symmetric Key Management
- Asymmetric Cryptography
- RSA
- Elliptic Curve
- Hash Functions
- SHA
- MD5
- Digital Signatures
- HMAC
- Public Key Infrastructure
- Certificates
- Certificate Authorities
- Certificate Generation and Destruction
- Certificate Formats
- Asymmetric Key Management
- Cryptographic Attacks
- Brute Force
- Frequency Analysis
- Known Plain Text
- Chosen Plain Text
- Related Key Attack
- Birthday Attack
- Downgrade Attack
- Hashing, Salting, and Key Stretching
- Exploiting Weak Keys
- Exploiting Human Error
- Emerging Issues in Cryptography
- Tor and the Dark Web
- Blockchain
- Lightweight Cryptography
- Homomorphic Encryption
- Quantum Computing
- Summary
- Exam Essentials
- Review Questions
- Chapter 8. Identity and Access Management
- Identity
- Authentication and Authorization
- Authentication and Authorization Technologies
- Authentication Methods
- Passwords
- Multifactor Authentication
- One-Time Passwords
- Biometrics
- Accounts
- Account Types
- Provisioning and Deprovisioning Accounts
- Access Control Schemes
- Filesystem Permissions
- Summary
- Exam Essentials
- Review Questions
- Chapter 9. Resilience and Physical Security
- Resilience and Recovery in Security Architectures
- Architectural Considerations and Security
- Storage Resiliency
- Response and Recovery Controls
- Capacity Planning for Resilience and Recovery
- Testing Resilience and Recovery Controls and Designs
- Physical Security Controls
- Site Security
- Detecting Physical Attacks
- Summary
- Exam Essentials
- Review Questions
- Chapter 10. Cloud and Virtualization Security
- Exploring the Cloud
- Benefits of the Cloud
- Cloud Roles
- Cloud Service Models
- Cloud Deployment Models
- Private Cloud
- Shared Responsibility Model
- Cloud Standards and Guidelines
- Virtualization
- Hypervisors
- Cloud Infrastructure Components
- Cloud Compute Resources
- Cloud Storage Resources
- Cloud Networking
- Cloud Security Issues
- Availability
- Data Sovereignty
- Virtualization Security
- Application Security
- Governance and Auditing of Third-Party Vendors
- Hardening Cloud Infrastructure
- Cloud Access Security Brokers
- Resource Policies
- Secrets Management
- Summary
- Exam Essentials
- Review Questions
- Chapter 11. Endpoint Security
- Operating System Vulnerabilities
- Hardware Vulnerabilities
- Protecting Endpoints
- Preserving Boot Integrity
- Endpoint Security Tools
- Hardening Techniques
- Hardening
- Service Hardening
- Network Hardening
- Default Passwords
- Removing Unnecessary Software
- Operating System Hardening
- Configuration, Standards, and Schemas
- Encryption
- Securing Embedded and Specialized Systems
- Embedded Systems
- SCADA and ICS
- Securing the Internet of Things
- Communication Considerations
- Security Constraints of Embedded Systems
- Asset Management
- Summary
- Exam Essentials
- Review Questions
- Chapter 12. Network Security
- Designing Secure Networks
- Infrastructure Considerations
- Network Design Concepts
- Network Segmentation
- Zero Trust
- Network Access Control
- Port Security and Port-Level Protections
- Virtual Private Networks and Remote Access
- Network Appliances and Security Tools
- Deception and Disruption Technology
- Network Security, Services, and Management
- Secure Protocols
- Using Secure Protocols
- Secure Protocols
- Network Attacks
- On-Path Attacks
- Domain Name System Attacks
- Credential Replay Attacks
- Malicious Code
- Distributed Denial-of-Service Attacks
- Summary
- Exam Essentials
- Review Questions
- Chapter 13. Wireless and Mobile Security
- Building Secure Wireless Networks
- Connection Methods
- Wireless Network Models
- Attacks Against Wireless Networks and Devices
- Designing a Network
- Controller and Access Point Security
- Wi-Fi Security Standards
- Wireless Authentication
- Managing Secure Mobile Devices
- Mobile Device Deployment Methods
- Hardening Mobile Devices
- Mobile Device Management
- Summary
- Exam Essentials
- Review Questions
- Chapter 14. Monitoring and Incident Response
- Incident Response
- The Incident Response Process
- Training
- Threat Hunting
- Understanding Attacks and Incidents
- Incident Response Data and Tools
- Monitoring Computing Resources
- Security Information and Event Management Systems
- Alerts and Alarms
- Log Aggregation, Correlation, and Analysis
- Rules
- Benchmarks and Logging
- Reporting and Archiving
- Mitigation and Recovery
- Secure Orchestration, Automation, and Response (SOAR)
- Containment, Mitigation, and Recovery Techniques
- Root Cause Analysis
- Summary
- Exam Essentials
- Review Questions
- Chapter 15. Digital Forensics
- Digital Forensic Concepts
- Legal Holds and e-Discovery
- Conducting Digital Forensics
- Acquiring Forensic Data
- Acquisition Tools
- Validating Forensic Data Integrity
- Data Recovery
- Forensic Suites and a Forensic Case Example
- Reporting
- Digital Forensics and Intelligence
- Summary
- Exam Essentials
- Review Questions
- Chapter 16. Security Governance and Compliance
- Security Governance
- Corporate Governance
- Governance, Risk, and Compliance Programs
- Information Security Governance
- Types of Governance Structures
- Understanding Policy Documents
- Policies
- Standards
- Procedures
- Guidelines
- Exceptions and Compensating Controls
- Monitoring and Revision
- Change Management
- Change Management Processes and Controls
- Version Control
- Documentation
- Personnel Management
- Least Privilege
- Separation of Duties
- Job Rotation and Mandatory Vacations
- Clean Desk Space
- Onboarding and Offboarding
- Nondisclosure Agreements
- Social Media
- Third-Party Risk Management
- Vendor Selection
- Vendor Assessment
- Vendor Agreements
- Vendor Monitoring
- Winding Down Vendor Relationships
- Complying with Laws and Regulations
- Common Compliance Requirements
- Compliance Reporting
- Consequences of Noncompliance
- Compliance Monitoring
- Adopting Standard Frameworks
- NIST Cybersecurity Framework
- NIST Risk Management Framework
- ISO Standards
- Benchmarks and Secure Configuration Guides
- Security Awareness and Training
- User Training
- Ongoing Awareness Efforts
- Summary
- Exam Essentials
- Review Questions
- Chapter 17. Risk Management and Privacy
- Analyzing Risk
- Risk Identification
- Risk Assessment
- Risk Analysis
- Managing Risk
- Risk Mitigation
- Risk Avoidance
- Risk Transference
- Risk Acceptance
- Risk Tracking
- Risk Register
- Risk Reporting
- Disaster Recovery Planning
- Disaster Types
- Business Impact Analysis
- Privacy
- Data Inventory
- Information Classification
- Data Roles and Responsibilities
- Information Life Cycle
- Privacy Enhancing Technologies
- Privacy and Data Breach Notification
- Summary
- Exam Essentials
- Review Questions
- Appendix Answers to Review Questions
- Chapter 1. Today's Security Professional
- Chapter 2. Cybersecurity Threat Landscape
- Chapter 3. Malicious Code
- Chapter 4. Social Engineering and Password Attacks
- Chapter 5. Security Assessment and Testing
- Chapter 6. Application Security
- Chapter 7. Cryptography and the PKI
- Chapter 8. Identity and Access Management
- Chapter 9. Resilience and Physical Security
- Chapter 10. Cloud and Virtualization Security
- Chapter 11. Endpoint Security
- Chapter 12. Network Security
- Chapter 13. Wireless and Mobile Security
- Chapter 14. Monitoring and Incident Response
- Chapter 15. Digital Forensics
- Chapter 16. Security Governance and Compliance
- Chapter 17. Risk Management and Privacy
- Index