Amazon cover image
Image from Amazon.com

Security administrator street smarts : a real world guide to CompTIA Security+ skills / David R. Miller, Michael Gregg.

By: Contributor(s): Material type: TextTextSeries: Serious skills | Street smarts seriesPublisher: Indianapolis : Wiley , 2009Edition: Second editionDescription: xxxvi, 513 pages : illustrations ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9780470404850
  • 047040485X
Subject(s): DDC classification:
  • 005.8 MI.S 2009 G.C 23
LOC classification:
  • QA76.3 .M562 2009
Contents:
Summary: Updated for the new CompTIA Security+ exam, this book focuses on the latest topics and technologies in the ever-evolving field of IT security and offers you the inside scoop on a variety of scenarios that you can expect to encounter on the job-as well as step-by-step guidance for tackling these tasks.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
Books Books The Knowledge Hub Library Gift collections 005.8 MI.S 2009 G.C (Browse shelf(Opens below)) Available 191688

Includes index.

Introduction -- 1. The Grunt Work of Security -- 1.1. Performing an Initial Risk Assessment -- 1.2. Determining Which Security Policy Is Most Important -- 1.3. Establishing a User-Awareness Program -- 1.4. Reviewing a Physical-Security Checklist -- 1.5. Understanding the Value of Documents -- 2. Hardening Systems -- 2.1. Managing Services -- 2.2. Managing Ports -- 2.3. Patching the Operating System -- 2.4. Security Templates -- 2.5. Securing Autoruns -- 2.6. Securing Hardware Devices -- 2.7. Virtualization -- 3. Malicious Software -- 3.1. Installing, Updating, and Running Antivirus Software -- 3.2. Using a Rootkit Checker -- Criteria for Completion -- 3.3. Using Adware Checker -- 3.4. Using Spyware Checker -- 3.5. Malicious Software Removal Tool -- 3.6. McAfee Site Advisor -- 3.7. ARP Poisoning with Cain & Abel -- 4. Secure Storage -- 4.1. The Encrypting File System -- 4.2. EFS Data Recovery -- 4.3. Implementing Syskey -- 4.4. Converting FAT to NTFS -- 4.5. Implementing Disk Fault Tolerance with RAID -- 4.6. Backing Up Data -- 4.7. Restoring Data from a Backup -- 4.8. Securing Shares -- 4.9. BitLocker Drive Encryption -- 5. Managing User Accounts -- 5.1. Creating User Accounts -- 5.2. Implementing the Password Policy -- 5.3. Auditing Logons -- 5.4. Securing the Default User Accounts -- 5.5. Implementing a Deny Group -- 6. Network Security -- 6.1. Deploying IPSec -- 6.2. Configuring the VPN Server -- 6.3. Configuring the VPN Client -- 6.4. Implementing Secure Remote Administration -- 6.5. Secure Administration Using Run As -- 6.6. Configuring a Packet Filter -- 6.7. Implementing 802.11 Wireless Security -- 6.8. Implementing an IPSec VPN Using AES -- 7. Securing Internet Activity -- 7.1. Configuring Internet Access -- 7.2. Using Internet Explorer Security Zones -- 7.3. Configuring IE for Secure Use of Cookies -- 7.4. Using Internet Connection Sharing -- 7.5. Securing E-mail -- 7.6. Spam Management -- 7.7. Installing and Using a Digital Certificate -- 7.8. Certificate Backup and Management -- 7.9. Performing Secure File Exchange -- 7.10. Validating Downloads and Checking the Hash -- 7.11. Logging and Recording Internet Activity -- 8. Security Testing -- 8.1. Penetration Testing with Nessus -- 8.2. Penetration Testing with Retina -- 8.3. Performing Assessments with MBSA -- 8.4. Performing Security Assessments with HFNetChk -- 8.5. Performing Internet Vulnerability Profiling -- 8.6. Tracking Hostile IPs -- 8.7. Investigating Netcat -- 9. Investigating Incidents -- 9.1. Configuring an Audit Policy for Object Access -- 9.2. Reviewing the Audit Logs -- 9.3. Forcing a Memory Dump -- 9.4. Capturing Packets with the Packet Analyzer: Wireshark -- 9.5. Recovering Previous Versions of Files -- 10. Security Troubleshooting -- 10.1. Booting into Safe Mode -- 10.2. Implementing Last Known Good Configuration -- 10.3. Using System Restore -- 10.4. Sanitizing Media -- 10.5. Implementing a Host-Based Intrusion Detection System.

Updated for the new CompTIA Security+ exam, this book focuses on the latest topics and technologies in the ever-evolving field of IT security and offers you the inside scoop on a variety of scenarios that you can expect to encounter on the job-as well as step-by-step guidance for tackling these tasks.

There are no comments on this title.

to post a comment.