Cover image for Security Administrator Street Smarts : A Real World Guide to CompTIA Security+ Skills.
Security Administrator Street Smarts : A Real World Guide to CompTIA Security+ Skills.
Title:
Security Administrator Street Smarts : A Real World Guide to CompTIA Security+ Skills.
Author:
Miller, David R.
ISBN:
9781118113585
Personal Author:
Edition:
3rd ed.
Physical Description:
1 online resource (625 pages)
Contents:
Security Administrator Street Smarts: A Real World Guide to CompTIA Security+™ Skills -- CompTIA Discount Coupon -- Contents -- Introduction -- Phase 1: The Grunt Work of Security -- Task 1.1: Performing an Initial Risk Assessment -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 1.2: Determining Which Security Policy Is Most Important -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 1.3: Establishing a User-Awareness Program -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 1.4: Reviewing a Physical-Security Checklist -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 1.5: Understanding the Value of Documents -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Phase 2: Hardening Systems -- Task 2.1: Managing Services -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 2.2: Managing Ports -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 2.3: Patching the Operating System -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 2.4: Security Templates -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 2.5: Securing Autoruns -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 2.6: Securing Hardware Devices -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 2.7: Virtualization -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 2.8: Locking the Computer Using an Idle Time-out -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Phase 3: Malicious Software -- Task 3.1: Installing, Updating, and Running Antivirus Software -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 3.2: Using a Rootkit Checker.

Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 3.3: Adware -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 3.4: Using a Spyware Checker -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 3.5: Malicious Software Removal Tool -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 3.6: McAfee Site Advisor -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 3.7: ARP Poisoning with Cain & Abel -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 3.8: Attacking Authentication with Firesheep -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Phase 4: Secure Storage -- Task 4.1: The Encrypting File System -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 4.2: EFS Data Recovery -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 4.3: Implementing Syskey -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 4.4: Converting FAT to NTFS -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 4.5: Implementing Disk Fault Tolerance with RAID -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 4.6: Backing Up Data -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 4.7: Restoring Data from a Backup -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 4.8: Securing Shares -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 4.9: BitLocker Drive Encryption -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 4.10: Securing Data to Satisfy FIPS 140-2 Using PGP Desktop -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Phase 5: Managing User Accounts.

Task 5.1: Creating User Accounts -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 5.2: Implementing the Password Policy -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 5.3: Auditing Logons -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 5.4: Securing the Default User Accounts -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 5.5: Implementing a Deny Group -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Phase 6: Network Security -- Task 6.1: Deploying IPSec -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 6.2: Configuring the VPN Server -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 6.3: Configuring the VPN Client -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 6.4: Implementing Secure Remote Administration -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 6.5: Secure Administration Using Run As -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 6.6: Configuring a Packet Filter -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 6.7: Implementing 802.11 Wireless Security -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 6.8: Implementing an IPSec VPN Using AES -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 6.9: Implementing a Personal Firewall -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Phase 7: Securing Internet Activity -- Task 7.1: Configuring Internet Access -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 7.2: Using Internet Explorer Security Zones -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion.

Task 7.3: Configuring IE for Secure Use of Cookies -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 7.4: Using Internet Connection Sharing -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 7.5: Securing Email -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 7.6: Spam Management -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 7.7: Installing and Using a Digital Certificate -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 7.8: Certificate Backup and Management -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 7.9: Performing Secure File Exchange -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 7.10: Validating Downloads and Checking the Hash -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 7.11: Logging and Recording Internet Activity -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 7.12: Using HTTPS to Encrypt Web Traffic -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 7.13: Using Force-TLS to Add Security to Web Browsing -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Phase 8: Security Testing -- Task 8.1: Penetration Testing with Nessus -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 8.2: Penetration Testing with Retina -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 8.3: Performing Assessments with MBSA -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 8.4: Performing Security Assessments with IT Shavlik -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 8.5: Performing Internet Vulnerability Profiling -- Scenario -- Scope of Task.

Procedure -- Criteria for Completion -- Task 8.6: Tracking Hostile IPs -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 8.7: Investigating Netcat -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 8.8: Exploiting Vulnerabilities with Metasploit -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Phase 9: Investigating Incidents -- Task 9.1: Configuring an Audit Policy for Object Access -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 9.2: Reviewing the Audit Logs -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 9.3: Forcing a Memory Dump -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 9.4: Capturing Packets with the Packet Analyzer: Wireshark -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 9.5: Recovering Previous Versions of Files -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 9.6: Recovering Deleted Content from the File System -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Phase 10: Security Troubleshooting -- Task 10.1: Booting into Safe Mode -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 10.2: Implementing Last Known Good Configuration -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 10.3: Using System Restore -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 10.4: Sanitizing Media -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 10.5: Implementing a Host-Based Intrusion Detection System -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Index.
Abstract:
A step-by-step guide to the tasks involved in security administration If you aspire to a career in security administration, one of your greatest challenges will be gaining hands-on experience. This book takes you through the most common security admin tasks step by step, showing you the way around many of the roadblocks you can expect on the job. It offers a variety of scenarios in each phase of the security administrator's job, giving you the confidence of first-hand experience. In addition, this is an ideal complement to the brand-new, bestselling CompTIA Security+ Study Guide, 5th Edition or the CompTIA Security+ Deluxe Study Guide, 2nd Edition, the latest offerings from Sybex for CompTIA's Security+ SY0-301 exam. Targets security administrators who confront a wide assortment of challenging tasks and those seeking a career in security administration who are hampered by a lack of actual experience Walks you through a variety of common tasks, demonstrating step by step how to perform them and how to circumvent roadblocks you may encounter Features tasks that are arranged according to four phases of the security administrator's role: designing a secure network, creating and implementing standard security policies, identifying insecure systems in an existing environment, and training both onsite and remote users Ideal hands-on for those preparing for CompTIA's Security+ exam (SY0-301) This comprehensive workbook provides the next best thing to intensive on-the-job training for security professionals.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Added Author:
Electronic Access:
Click to View
Holds: Copies: