The best fully integrated study system available
Official CompTIA Content! Prepare for CompTIA Security+ Exam SY0-301 with McGraw-Hill—a Gold-Level CompTIA Authorized Partner offering Official CompTIA Approved Quality Content to give you the competitive edge on exam day.
With hundreds of practice questions and hands-on exercises, CompTIA Security+ Certification Study Guide covers what you need to know--and shows you how to prepare--for this challenging exam.
Covers all the exam topics, including:
Networking Basics and Terminology * Security Terminology * Security Policies and Standards * Types of Attacks * System Security Threats * Mitigating Security Threats * Implementing System Security * Securing the Network Infrastructure * Wireless Networking and Security * Authentication * Access Control * Cryptography * Managing a Public Key Infrastructure * Physical Security * Risk Analysis * Disaster Recovery and Business Continuity * Computer Forensics * Security Assessments and Audits * Monitoring and Auditing
with free online registration:
From the Author
Security is a critical part of information systems, and the need is on the rise for IT
professionals proficient in configuring systems in a secure manner and able to assess
security. The CompTIA Security+ Certification Study Guide is a comprehensive book that is designed to help you prepare for the Security+ exam (SY0-301), but also serves as a practical reference you can use after obtaining your certification.
This book is organized to serve as an in-depth review for the CompTIA Security+ certification exam (SY0-301) for both experienced security professionals and newcomers to the field of information system security. Each chapter covers a major aspect of the exam, with an emphasis on the “why” as well as on the “how to” help organizations understand critical security technologies that should be implemented in their environment. This book also helps you understand how to assess and recommend ways of improving security within a company.
Chapter 1: Network Basics and Terminology
Chapter 2: Introduction to Security Terminology
Chapter 3: Security Policies and Standards
Chapter 4: Types of Attacks
Chapter 5: System Security Threats
Chapter 6: Mitigating Security Threats
Chapter 7: Implementing System Security
Chapter 8: Securing the Network Infrastructure
Chapter 9: Wireless Networking and Security
Chapter 10: Authentication
Chapter 11: Access Control
Chapter 12: Introduction to Cryptography
Chapter 13: Managing a Public Key Infrastructure
Chapter 14: Physical Security
Chapter 15: Risk Analysis
Chapter 16: Disaster Recovery and Business Continuity
Chapter 17: Introduction to Computer Forensics
Chapter 18: Security Assessments and Audits
Chapter 19: Understanding Monitoring and Auditing
Appendix: About the CD