Security Guide to Network Security Fundamentals 5th edition by Mark Ciampa – Ebook PDF Instant Download/Delivery: 1305093917, 9781305093911
Full download Security Guide to Network Security Fundamentals 5th edition after payment

Product details:
ISBN 10: 1305093917
ISBN 13: 9781305093911
Author: Mark Ciampa
This best-selling guide provides a complete, practical, up-to-date introduction to network and computer security. SECURITY GUIDE TO NETWORK SECURITY FUNDAMENTALS, Fifth Edition, maps to the new CompTIA Security SY0-401 Certification Exam, providing thorough coverage of all domain objectives to help readers prepare for professional certification and career success. The text covers the essentials of network security, including compliance and operational security; threats and vulnerabilities; application, data, and host security; access control and identity management; and cryptography. The extensively updated Fifth Edition features a new structure based on major domains, a new chapter dedicated to mobile device security, expanded coverage of attacks and defenses, and new and updated information reflecting recent developments and emerging trends in information security, such as virtualization. New hands-on and case activities help readers review and apply what they have learned, and end-of-chapter exercises direct readers to the Information Security Community Site for additional activities and a wealth of learning resources, including blogs, videos, and current news and information relevant to the information security field.
Security Guide to Network Security Fundamentals 5th Table of contents:
Introduction
Part 1: Security Fundamentals
Chapter 1: Introduction to Security
- Challenges of Securing Information
- Today’s Security Attacks
- Difficulties in Defending Against Attacks
- What Is Information Security?
- Understanding Security
- Defining Information Security
- Information Security Terminology
- Understanding the Importance of Information Security
Who Are the Attackers?
- Cybercriminals
- Script Kiddies
- Brokers
- Insiders
- Cyberterrorists
- Hacktivists
- State-Sponsored Attackers
Attacks and Defenses
- Steps of an Attack
- Defenses Against Attacks
Chapter Summary
Key Terms
Review Questions
Hands-On Projects
Case Projects
Part 2: Threats
Chapter 2: Malware and Social Engineering Attacks
- Attacks Using Malware
- Circulation/Infection
- Concealment
- Payload Capabilities
- Social Engineering Attacks
- Psychological Approaches
- Physical Procedures
Chapter Summary
Key Terms
Review Questions
Hands-On Projects
Case Projects
Chapter 3: Application and Networking-Based Attacks
- Application Attacks
- Server-Side Web Application Attacks
- Client-Side Application Attacks
- Impartial Overflow Attacks
- Networking-Based Attacks
- Denial of Service (DoS)
- Interception
- Poisoning
- Attacks on Access Rights
Chapter Summary
Key Terms
Review Questions
Hands-On Projects
Case Projects
Part 3: Application, Data, and Host Security
Chapter 4: Host, Application, and Data Security
- Securing the Host
- Securing Devices
- Securing the Operating System Software
- Securing with Antimalware
- Securing Static Environments
- Application Security
- Application Development Security
- Application Hardening and Patch Management
- Securing Data
Chapter Summary
Key Terms
Review Questions
Hands-On Projects
Case Projects
Part 4: Cryptography
Chapter 5: Basic Cryptography
- Defining Cryptography
- What Is Cryptography?
- Cryptography and Security
- Cryptographic Algorithms
- Hash Algorithms
- Symmetric Cryptographic Algorithms
- Asymmetric Cryptographic Algorithms
- Using Cryptography
- Encryption through Software
- Hardware Encryption
Chapter Summary
Key Terms
Review Questions
Hands-On Projects
Case Projects
Chapter 6: Advanced Cryptography
- Digital Certificates
- Defining Digital Certificates
- Managing Digital Certificates
- Types of Digital Certificates
- Public Key Infrastructure (PKI)
- What Is Public Key Infrastructure (PKI)?
- Public Key Cryptography Standards (PKCS)
- Trust Models
- Managing PKI
- Key Management
- Key Storage
- Key Usage
- Key Handling Procedures
- Cryptographic Transport Protocols
- Secure Sockets Layer (SSL)
- Transport Layer Security (TLS)
- Secure Shell (SSH)
- Hypertext Transport Protocol Secure (HTTPS)
- IP Security (IPsec)
Chapter Summary
Key Terms
Review Questions
Hands-On Projects
Case Projects
Part 5: Network Security
Chapter 7: Network Security Fundamentals
- Security Through Network Devices
- Standard Network Devices
- Network Security Hardware
- Security Through Network Technologies
- Network Address Translation (NAT)
- Network Access Control (NAC)
- Security Through Network Design Elements
- Demilitarized Zone (DMZ)
- Subnetting
- Virtual LANs (VLANs)
- Remote Access
Chapter Summary
Key Terms
Review Questions
Hands-On Projects
Case Projects
Chapter 8: Administering a Secure Network
- Common Network Protocols
- Internet Control Message Protocol (ICMP)
- Simple Network Management Protocol (SNMP)
- Domain Name System (DNS)
- File Transfer Protocols
- Storage Protocols
- NetBIOS
- Telnet
- IPv6
- Network Administration Principles
- Device Security
- Monitoring and Analyzing Logs
- Network Design Management
- Port Security
- Securing Network Applications and Platforms
- IP Telephony
- Virtualization
- Cloud Computing
Chapter Summary
Key Terms
Review Questions
Hands-On Projects
Case Projects
Part 6: Mobile Security
Chapter 9: Wireless Network Security
- Wireless Attacks
- Bluetooth Attacks
- Near Field Communication (NFC) Attacks
- Wireless Local Area Network (WLAN) Attacks
- Vulnerabilities of IEEE Wireless Security
- Wired Equivalent Privacy (WEP)
- Wi-Fi Protected Setup (WPS)
- MAC Address Filtering
- Disabling SSID Broadcasts
- Wireless Security Solutions
- Wi-Fi Protected Access (WPA)
- Wi-Fi Protected Access 2 (WPA2)
- Additional Wireless Security Protections
Chapter Summary
Key Terms
Review Questions
Hands-On Projects
Case Projects
Chapter 10: Mobile Device Security
- Types of Mobile Devices
- Portable Computers
- Tablets
- Smartphones
- Wearable Technology
- Legacy Devices
- Mobile Device Removable Storage
- Mobile Device Risks
- Limited Physical Security
- Connecting to Public Networks
- Location Tracking
- Installing Unsecured Applications
- Accessing Untrusted Content
- Bring Your Own Device (BYOD) Risks
- Securing Mobile Devices
- Device Setup
- Device and App Management
- Device Loss or Theft
- Mobile Device App Security
- BYOD Security
Chapter Summary
Key Terms
Review Questions
Hands-On Projects
Case Projects
Part 7: Access Control and Identity Management
Chapter 11: Access Control Fundamentals
- What Is Access Control?
- Access Control Terminology
- Access Control Models
- Best Practices for Access Control
- Implementing Access Control
- Access Control Lists (ACLs)
- Group Policies
- Account Restrictions
- Authentication Services
- RADIUS
- Kerberos
- Terminal Access Control Access Control System (TACACS)
- Lightweight Directory Access Protocol (LDAP)
- Security Assertion Markup Language (SAML)
Chapter Summary
Key Terms
Review Questions
Hands-On Projects
Case Projects
Chapter 12: Authentication and Account Management
- Authentication Credentials
- What You Know: Passwords
- What You Have: Tokens, Cards, and Cell Phones
- What You Are: Biometrics
- What You Do: Behavioral Biometrics
- Where You Are: Geolocation
- Single Sign-on
- Microsoft Account
- OpenID
- Open Authorization (OAuth)
- Account Management
Chapter Summary
Key Terms
Review Questions
Hands-On Projects
Case Projects
Part 8: Compliance and Operational Security
Chapter 13: Business Continuity
- What Is Business Continuity?
- Disaster Recovery
- Disaster Recovery Plan (DRP)
- Redundancy and Fault Tolerance
- Data Backups
- Environmental Controls
- Fire Suppression
- Electromagnetic Interference (EMI) Shielding
- HVAC
- Incident Response
- Forensics
- Incident Response Procedures
Chapter Summary
Key Terms
Review Questions
Hands-On Projects
Case Projects
Chapter 14: Risk Mitigation
- Controlling Risk
- Privilege Management
- Change Management
- Incident Management
- Risk Calculation
- Reducing Risk Through Policies
- What Is a Security Policy?
- Balancing Trust and Control
- Designing a Security Policy
- Types of Security Policies
- Awareness and Training
- Compliance
- User Practices
- Threat Awareness
- Training Techniques
Chapter Summary
Key Terms
Review Questions
Hands-On Projects
Case Projects
Chapter 15: Vulnerability Assessment
- Assessing Vulnerabilities
- What Is Vulnerability Assessment?
- Assessment Techniques
- Assessment Tools
- Vulnerability Scanning vs. Penetration Testing
- Vulnerability Scanning
- Penetration Testing
- Third-Party Integration
- Mitigating and Deterring Attacks
- Creating a Security Posture
- Selecting Appropriate Controls
- Configuring Controls
- Hardening
- Reporting
Chapter Summary
Key Terms
Review Questions
Hands-On Projects
Case Projects
Appendix A: CompTIA SY0-401 Certification Exam Objectives
Appendix B: Downloads and Tools for Hands-On Projects
Appendix C: Security Websites
Appendix D: Selected TCP/IP Ports and Their Threats
Appendix E: Information Security Community Site
People also search for Security Guide to Network Security Fundamentals 5th:
comptia security+ guide to network security fundamentals 5th edition
security+ guide to network security fundamentals 7th edition pdf
security+ guide to network security fundamentals 6th edition pdf
security+ guide to network security fundamentals 7th edition
security+ guide to network security fundamentals 6th edition
Tags:
Mark Ciampa,Security Guide,Network Security
Reviews
There are no reviews yet.