CompTIA Security+ Certification Study Guide: Network Security Essentials
- 2h 55m
- Ahmed F. Sheikh
- Apress
- 2020
Prepare for the CompTIA Security+ certification exam that covers the skills required to perform core security functions and pursue a career in IT. You will learn the basic principles of network security.
Computer network vulnerabilities and threats are covered and you will learn how to safeguard computer networks. Network security planning, technology, and organization are discussed along with associated legal and ethical issues. Lesson objectives and instruction succinctly review each major topic, including: network fundamentals, operational and organizational security, risk management, wireless security, change management, physical security, forensics, network attacks, and much more.
What You Will Learn
- Identify the concepts of confidentiality, integrity, and availability
- Implement secure network administration principles
- Apply appropriate risk mitigation strategies
- Explain the impact of physical security on computer and network security
- Use assessment tools to discover security threats and vulnerabilities
- Implement appropriate security controls when performing account management
Who This Book Is For
Security professionals looking to get this credential, including systems administrators, network administrators, security administrators, junior IT auditors and penetration testers, security specialists, security consultants, security engineers, and more
About the Author
Ahmed Sheikh is a Fulbright alumnus and has earned a master's degree in electrical engineering from Kansas State University, USA. He is a seasoned IT expert with a specialty in network security planning and skills in cloud computing. Currently, he is working as IT Expert Engineer at a leading IT electrical company.
In this Book
-
General Security Concepts and Trends
-
Network Fundamentals and Infrastructure Security
-
Wireless and Intrusion Detection System Network Security
-
Role of People in Security—Operational and Organizational Security
-
Risk Management
-
Change Management and Disaster Recovery
-
Physical Security
-
Forensics, Legal Issues, and Privacy
-
Attacks
-
Network Attacks
-
Baseline and Secure Software Development
-
Email, Instant Messaging, and Web Components
-
Authentication and Remote Access
-
Access Control and Privilege Management
-
Cryptography
-
Public Key Infrastructure