Home > Store

Register your product to gain access to bonus material or receive a coupon.

CompTIA Security+ SY0-501 Pearson uCertify Course and Labs and Textbook Bundle, 2nd Edition

Book

  • Your Price: $136.00
  • List Price: $160.00
  • Usually ships in 24 hours.

Description

  • Copyright 2018
  • Edition: 2nd
  • Book
  • ISBN-10: 0-7897-5915-2
  • ISBN-13: 978-0-7897-5915-3

Welcome to CompTIA Security+ SY0-501 Pearson uCertify Course and Labs and Textbook Bundle
CompTIA Security+ SY0-501 Pearson uCertify Course and Labs is an easy-to-use online course that allows you to assess your readiness and teaches you what you need to know to pass the CompTIA Security+ SY0-501 exam. 
Master all of the CompTIA Security+ SY0-501 exam objectives in the framework of CompTIA Security+ SY0-501 Cert Guide, Academic Edition interactive eBook. The interactive eBook includes informative text, tables, step-by-step lists, images, video instruction, interactive exercises, glossary flash cards, and review activities. The course comes complete with extensive pre- and post-assessment tests. In total there are over 430 practice questions.
The award-winning uCertify Labs help bridge the gap between conceptual knowledge and real-world application by providing competency-based, interactive, online, 24x7 training. uCertify Labs simulate real-world networking hardware, software applications and operating systems, and command-line interfaces. The 60+ labs are supplemented with videos demonstrating lab solutions. Students can feel safe working in this virtual environment resolving real-world operating system and hardware problems.
All of the content–the complete Cert Guide, video instruction, the practice questions, the exercises, and the labs–is focused around the official CompTIA Security+ SY0-501 exam objectives.



Learn, prepare, and practice for CompTIA Security+ SY0-501 exam success with this full-color CompTIA Authorized Cert Guide, Academic Edition from Pearson IT Certification, a leader in IT Certification learning. This book includes access to four complete practice tests, chapter summaries, and case studies including simulations and hands-on video exercises to reinforce the learning.

  • Master CompTIA’s Security+ SY0-501 exam topics
  • Assess your knowledge with chapter-ending quizzes
  • Reinforce your knowledge of key concepts with chapter review activities
  • Practice with realistic exam questions
  • Includes complete video solutions to hands-on labs
  • Plus interactive simulations on key exam topics
  • Work through Flash Cards in Q&A and glossary term format
  • Includes free access to the Premium Edition eBook

Sample Content

Table of Contents

Introduction xxii

Chapter 1 Introduction to Security 2

Foundation Topics 3

Security 101 3

    The CIA of Computer Security 3

    The Basics of Information Security 4

Think Like a Hacker 6

Threat Actor Types and Attributes 7

Chapter Review Activities 9

Chapter 2 Computer Systems Security Part I 12

Foundation Topics 13

Malicious Software Types 13

    Viruses 13

    Worms 14

    Trojan Horses 14

    Ransomware 15

    Spyware 15

    Rootkits 16

    Spam 16

    Summary of Malware Threats 17

Delivery of Malware 17

    Via Software, Messaging, and Media 18

    Botnets and Zombies 19

    Active Interception 19

    Privilege Escalation 19

    Backdoors 19

    Logic Bombs 20

Preventing and Troubleshooting Malware 20

    Preventing and Troubleshooting Viruses 20

    Preventing and Troubleshooting Worms and Trojans 23

    Preventing and Troubleshooting Spyware 24

    Preventing and Troubleshooting Rootkits 25

    Preventing and Troubleshooting Spam 26

    You Can’t Save Every Computer from Malware! 27

    Summary of Malware Prevention Techniques 27

Chapter Review Activities 29

Chapter 3 Computer Systems Security Part II 34

Foundation Topics 35

Implementing Security Applications 35

    Personal Software Firewalls 35

    Host-Based Intrusion Detection Systems 36

    Pop-Up Blockers 38

    Data Loss Prevention Systems 38

Securing Computer Hardware and Peripherals 39

    Securing the BIOS 39

    Securing Storage Devices 41

        Removable Storage 41

        Network Attached Storage 41

        Whole Disk Encryption 42

        Hardware Security Modules 43

    Securing Wireless Peripherals 43

Securing Mobile Devices 44

    Malware 44

    Botnet Activity 45

    SIM Cloning and Carrier Unlocking 45

    Wireless Attacks 46

    Theft 46

    Application Security 47

    BYOD Concerns 49

Chapter Review Activities 53

Chapter 4 OS Hardening and Virtualization 58

Foundation Topics 59

Hardening Operating Systems 59

    Removing Unnecessary Applications and Services 59

    Windows Update, Patches, and Hotfixes 65

        Patches and Hotfixes 66

        Patch Management 68

    Group Policies, Security Templates, and Configuration Baselines 69

    Hardening File Systems and Hard Drives 71

Virtualization Technology 74

    Types of Virtualization and Their Purposes 74

    Hypervisor 75

    Securing Virtual Machines 76

Chapter Review Activities 79

Chapter 5 Application Security 86

Foundation Topics 87

Securing the Browser 87

    General Browser Security Procedures 88

        Implement Policies 88

        Train Your Users 90

        Use a Proxy and Content Filter 91

        Secure Against Malicious Code 92

    Web Browser Concerns and Security Methods 92

        Basic Browser Security 92

        Cookies 92

        LSOs 93

        Add-ons 94

        Advanced Browser Security 94

Securing Other Applications 95

Secure Programming 99

    Software Development Life Cycle 99

    Core SDLC and DevOps Principles 100

    Programming Testing Methods 102

        White-box and Black-box Testing 102

        Compile-Time Errors Versus Runtime Errors 102

        Input Validation 103

        Static and Dynamic Code Analysis 104

        Fuzz Testing 104

    Programming Vulnerabilities and Attacks 104

        Backdoors 105

        Memory/Buffer Vulnerabilities 105

        Arbitrary Code Execution/Remote Code Execution 106

        XSS and XSRF 107

        More Code Injection Examples 107

        Directory Traversal 109

        Zero Day Attack 109

Chapter Review Activities 111

Chapter 6 Network Design Elements 118

Foundation Topics 119

Network Design 119

    The OSI Model 119

    Network Devices 120

        Switch 120

        Bridge 122

        Router 122

    Network Address Translation, and Private Versus Public IP 123

    Network Zones and Interconnections 125

        LAN Versus WAN 125

        Internet 126

        Demilitarized Zone (DMZ) 126

        Intranets and Extranets 127

    Network Access Control (NAC) 128

    Subnetting 128

    Virtual Local Area Network (VLAN) 130

    Telephony 131

        Modems 131

        PBX Equipment 132

        VoIP 132

Cloud Security and Server Defense 133

    Cloud Computing 133

    Cloud Security 135

    Server Defense 137

        File Servers 137

        Network Controllers 137

        E-mail Servers 138

        Web Servers 139

        FTP Server 140

Chapter Review Activities 142

Chapter 7 Networking Protocols and Threats 148

Foundation Topics 149

Ports and Protocols 149

    Port Ranges, Inbound Versus Outbound, and Common Ports 149

    Protocols That Can Cause Anxiety on the Exam 155

Malicious Attacks 155

    DoS 155

    DDoS 158

    Sinkholes and Blackholes 158

    Spoofing 159

    Session Hijacking 159

    Replay 161

    Null Sessions 161

    Transitive Access and Client-Side Attacks 162

    DNS Poisoning and Other DNS Attacks 162

    ARP Poisoning 164

    Summary of Network Attacks 164

Chapter Review Activities 167

Chapter 8 Network Perimeter Security 174

Foundation Topics 175

Firewalls and Network Security 175

    Firewalls 175

    Proxy Servers 179

    Honeypots and Honeynets 181

    Data Loss Prevention (DLP) 182

NIDS Versus NIPS 183

    NIDS 183

    NIPS 184

    Summary of NIDS Versus NIPS 185

    The Protocol Analyzer’s Role in NIDS and NIPS 185

    Unified Threat Management 186

Chapter Review Activities 187

Chapter 9 Securing Network Media and Devices 194

Foundation Topics 195

Securing Wired Networks and Devices 195

    Network Device Vulnerabilities 195

        Default Accounts 195

        Weak Passwords 195

        Privilege Escalation 196

        Back Doors 197

        Network Attacks 197

        Other Network Device Considerations 197

    Cable Media Vulnerabilities 198

        Interference 198

        Crosstalk 199

        Data Emanation 199

        Tapping into Data and Conversations 200

Securing Wireless Networks 201

    Wireless Access Point Vulnerabilities 202

        The Administration Interface 202

        SSID Broadcast 202

        Rogue Access Points 202

        Evil Twin 203

        Weak Encryption 203

        Wi-Fi Protected Setup 205

        Ad Hoc Networks 205

        VPN over Open Wireless 205

    Wireless Access Point Security Strategies 205

    Wireless Transmission Vulnerabilities 208

    Bluetooth and Other Wireless Technology Vulnerabilities 209

        Bluejacking 209

        Bluesnarfing 210

    RFID and NFC 210

        More Wireless Technologies 210

Chapter Review Activities 212

Chapter 10 Physical Security and Authentication Models 218

Foundation Topics 219

Physical Security 219

    General Building and Server Room Security 219

    Door Access 220

    Biometric Readers 221

Authentication Models and Components 222

    Authentication Models 222

    Localized Authentication Technologies 224

        802.1X and EAP 224

        LDAP 226

        Kerberos and Mutual Authentication 227

        Remote Desktop Services 229

    Remote Authentication Technologies 230

        Remote Access Service 230

        Virtual Private Networks 231

        RADIUS Versus TACACS 234

Chapter Review Activities 236

Chapter 11 Access Control Methods and Models 244

Foundation Topics 245

Access Control Models Defined 245

    Discretionary Access Control 245

    Mandatory Access Control 246

    Role-Based Access Control (RBAC) 247

    Attribute-based Access Control (ABAC) 248

    Access Control Wise Practices 249

Rights, Permissions, and Policies 250

    Users, Groups, and Permissions 251

    Permission Inheritance and Propagation 255

    Moving and Copying Folders and Files 256

    Usernames and Passwords 256

    Policies 258

    User Account Control (UAC) 261

Chapter Review Activities 262

Chapter 12 Vulnerability and Risk Assessment 270

Foundation Topics 271

Conducting Risk Assessments 271

    Qualitative Risk Assessment 272

    Quantitative Risk Assessment 273

    Security Analysis Methodologies 274

    Security Controls 275

    Vulnerability Management 276

        Penetration Testing 277

        OVAL 279

        Additional Vulnerabilities 279

Assessing Vulnerability with Security Tools 280

    Network Mapping 280

    Vulnerability Scanning 282

    Network Sniffing 283

    Password Analysis 284

Chapter Review Activities 287

Chapter 13 Monitoring and Auditing 294

Foundation Topics 295

Monitoring Methodologies 295

    Signature-Based Monitoring 295

    Anomaly-Based Monitoring 295

    Behavior-Based Monitoring 296

Using Tools to Monitor Systems and Networks 296

    Performance Baselining 297

    Protocol Analyzers 299

        Wireshark 299

    SNMP 301

    Analytical Tools 302

    Use Static and Dynamic Tools 304

Conducting Audits 304

    Auditing Files 305

    Logging 306

    Log File Maintenance and Security 310

    Auditing System Security Settings 311

    SIEM 314

Chapter Review Activities 315

Chapter 14 Encryption and Hashing Concepts 322

Foundation Topics 323

Cryptography Concepts 323

    Symmetric Versus Asymmetric Key Algorithms 326

        Symmetric Key Algorithms 326

    Asymmetric Key Algorithms 327

    Public Key Cryptography 327

    Key Management 328

    Steganography 328

Encryption Algorithms 329

    DES and 3DES 329

    AES 329

    RC 330

    Blowfish and Twofish 331

    Summary of Symmetric Algorithms 331

    RSA 331

    Diffie-Hellman 333

    Elliptic Curve 333

    More Encryption Types 334

        One-Time Pad 334

        PGP 335

        Pseudorandom Number Generators 336

Hashing Basics 336

    Cryptographic Hash Functions 337

        MD5 338

        SHA 338

        RIPEMD and HMAC 338

    LANMAN, NTLM, and NTLMv2 339

        LANMAN 339

        NTLM and NTLMv2 340

    Hashing Attacks 341

        Pass the Hash 341

        Happy Birthday! 341

    Additional Password Hashing Concepts 342

Chapter Review Activities 343

Chapter 15 PKI and Encryption Protocols 350

Foundation Topics 351

Public Key Infrastructure 351

    Certificates 351

        SSL Certificate Types 352

        Single-Sided and Dual-Sided Certificates 352

        Certificate Chain of Trust 352

        Certificate Formats 352

    Certificate Authorities 353

    Web of Trust 356

Security Protocols 356

    S/MIME 357

    SSL/TLS 357

    SSH 359

    PPTP, L2TP, and IPsec 359

        PPTP 359

        L2TP 359

        IPsec 360

Chapter Review Activities 361

Chapter 16 Redundancy and Disaster Recovery 368

Foundation Topics 369

Redundancy Planning 369

    Redundant Power 370

    Redundant Power Supplies 371

    Uninterruptible Power Supplies 371

    Backup Generators 372

    Redundant Data 374

    Redundant Networking 376

    Redundant Servers 377

    Redundant Sites 378

    Redundant People 379

Disaster Recovery Planning and Procedures 379

    Data Backup 379

    DR Planning 382

Chapter Review Activities 385

Chapter 17 Social Engineering, User Education, and Facilities Security 390

Foundation Topics 391

Social Engineering 391

    Pretexting 391

    Malicious Insider 391

    Diversion Theft 392

    Phishing 392

    Hoaxes 393

    Shoulder Surfing 394

    Eavesdropping 394

    Dumpster Diving 394

    Baiting 394

    Piggybacking/Tailgating 394

    Watering Hole Attack 395

    Summary of Social Engineering Types 395

User Education 396

    Facilities Security 398

    Fire Suppression 398

        Fire Extinguishers 398

        Sprinkler Systems 399

        Special Hazard Protection Systems 399

    HVAC 400

    Shielding 401

    Vehicles 402

Chapter Review Activities 404

Chapter 18 Policies and Procedures 410

Foundation Topics 411

Legislative and Organizational Policies 411

    Data Sensitivity and Classification of Information 411

    Personnel Security Policies 413

        Privacy Policies 414

        Acceptable Use 414

        Change Management 414

        Separation of Duties/Job Rotation 415

        Mandatory Vacations 415

        Onboarding and Offboarding 415

        Due Diligence 416

        Due Care 416

        Due Process 416

        User Education and Awareness Training 416

        Summary of Personnel Security Policies 417

    How to Deal with Vendors 417

    How to Dispose of Computers and Other IT Equipment Securely 419

Incident Response Procedures 420

IT Security Frameworks 424

Chapter Review Activities 426

Chapter 19 Taking the Real Exam 432

    Getting Ready and the Exam Preparation Checklist 432

    Tips for Taking the Real Exam 435

    Beyond the CompTIA Security+ Certification 438

Practice Exam 1: SY0-501 440

Glossary 458

Elements Available Online

Appendix A: Answers to the Review Questions

Answers to Practice Exam 1

View Recommended Resources

Real-World Scenarios

Flash Cards

9780789759122   TOC   10/31/2017

Updates

Submit Errata

More Information

vceplus-200-125    | boson-200-125    | training-cissp    | actualtests-cissp    | techexams-cissp    | gratisexams-300-075    | pearsonitcertification-210-260    | examsboost-210-260    | examsforall-210-260    | dumps4free-210-260    | reddit-210-260    | cisexams-352-001    | itexamfox-352-001    | passguaranteed-352-001    | passeasily-352-001    | freeccnastudyguide-200-120    | gocertify-200-120    | passcerty-200-120    | certifyguide-70-980    | dumpscollection-70-980    | examcollection-70-534    | cbtnuggets-210-065    | examfiles-400-051    | passitdump-400-051    | pearsonitcertification-70-462    | anderseide-70-347    | thomas-70-533    | research-1V0-605    | topix-102-400    | certdepot-EX200    | pearsonit-640-916    | itproguru-70-533    | reddit-100-105    | channel9-70-346    | anderseide-70-346    | theiia-IIA-CIA-PART3    | certificationHP-hp0-s41    | pearsonitcertification-640-916    | anderMicrosoft-70-534    | cathMicrosoft-70-462    | examcollection-cca-500    | techexams-gcih    | mslearn-70-346    | measureup-70-486    | pass4sure-hp0-s41    | iiba-640-916    | itsecurity-sscp    | cbtnuggets-300-320    | blogged-70-486    | pass4sure-IIA-CIA-PART1    | cbtnuggets-100-101    | developerhandbook-70-486    | lpicisco-101    | mylearn-1V0-605    | tomsitpro-cism    | gnosis-101    | channel9Mic-70-534    | ipass-IIA-CIA-PART1    | forcerts-70-417    | tests-sy0-401    | ipasstheciaexam-IIA-CIA-PART3    | mostcisco-300-135    | buildazure-70-533    | cloudera-cca-500    | pdf4cert-2v0-621    | f5cisco-101    | gocertify-1z0-062    | quora-640-916    | micrcosoft-70-480    | brain2pass-70-417    | examcompass-sy0-401    | global-EX200    | iassc-ICGB    | vceplus-300-115    | quizlet-810-403    | cbtnuggets-70-697    | educationOracle-1Z0-434    | channel9-70-534    | officialcerts-400-051    | examsboost-IIA-CIA-PART1    | networktut-300-135    | teststarter-300-206    | pluralsight-70-486    | coding-70-486    | freeccna-100-101    | digitaltut-300-101    | iiba-CBAP    | virtuallymikebrown-640-916    | isaca-cism    | whizlabs-pmp    | techexams-70-980    | ciscopress-300-115    | techtarget-cism    | pearsonitcertification-300-070    | testking-2v0-621    | isacaNew-cism    | simplilearn-pmi-rmp    | simplilearn-pmp    | educationOracle-1z0-809    | education-1z0-809    | teachertube-1Z0-434    | villanovau-CBAP    | quora-300-206    | certifyguide-300-208    | cbtnuggets-100-105    | flydumps-70-417    | gratisexams-1V0-605    | ituonline-1z0-062    | techexams-cas-002    | simplilearn-70-534    | pluralsight-70-697    | theiia-IIA-CIA-PART1    | itexamtips-400-051    | pearsonitcertification-EX200    | pluralsight-70-480    | learn-hp0-s42    | giac-gpen    | mindhub-102-400    | coursesmsu-CBAP    | examsforall-2v0-621    | developerhandbook-70-487    | root-EX200    | coderanch-1z0-809    | getfreedumps-1z0-062    | comptia-cas-002    | quora-1z0-809    | boson-300-135    | killtest-2v0-621    | learncia-IIA-CIA-PART3    | computer-gcih    | universitycloudera-cca-500    | itexamrun-70-410    | certificationHPv2-hp0-s41    | certskills-100-105    | skipitnow-70-417    | gocertify-sy0-401    | prep4sure-70-417    | simplilearn-cisa    |
http://www.pmsas.pr.gov.br/wp-content/    | http://www.pmsas.pr.gov.br/wp-content/    |