Home   FAQs   New Arrivals   Specials   Pricing & Shipping   Location   Corporate Services   Why Choose Bookware?  
Call our store: 9955 5567 (from within Sydney) or 1800 734 567 (from outside Sydney)
 View Cart   Check Out   
Browse by Subject
 TAFE Accounting
 TAFE I.T./Computing
 TAFE - Other
 Windows 8
 Adobe CS6
 CCNA 2012
 CCNP 2012
 Web Design
 Project Management
 Mobile Devices
 Windows Server 2012
 SQL Server 2012
Economics and Business
 Business Information Systems
 Human Resources

Security+ Training Guide

by: Todd King; David Bittlingmeier

On-line Price: $14.95 (includes GST)

package 736

80%Off Retail Price

You save: $60.00

CLEARANCE Item - Special discount - limited stock!
N.Sydney : In Stock

Retail Price: $74.95

Publisher: QUE,2003/03/30


ISBN: 0789728362
ISBN13: 9780789728364

Add to Shopping Cart

Todd King currently serves as Chief Executive Officer for SYS Consulting and Training, Inc., a Denver-based computer-consulting firm. He has specialized in several areas of networking, including network design, analysis, and security. Prior to starting SYS, Inc., Todd was in the United States Air Force as a survival instructor. He currently holds a B.S. in marketing from Florida State University and an A.A. Instructor of Technology and an A.A. in Survival and Rescue Operations from the Community College of the Air Force. His professional certifications include MCSE on Windows 2000, MCSE +Internet on NT 4, MCSA, MCT, CCNP, CCDP, CNX, A+, Net+, iNet+, CTT, and Security+.


Table of Contents


  How This Book Helps You. What the Security+ Exam Covers. Hardware and Software You?ll Need. Advice on Taking the Exam. Que Certification.

      Study and Exam Prep Tips.

  Learning Styles. Study Tips. Exam Prep Tips. Final Considerations.


          1. General Security Concepts.

  Introduction. A Brief History of Networks and Security. Basic Terminology. Access Control Techniques. Authentication Methods. Identifying Nonessential Services and Protocols. Attacks. Malicious Code. Social Engineering. Auditing.

      2. Communication Security.

  Introduction. Recognizing and Administering Remote and Wireless Access. Recognizing and Administering Security Controls?Email Communications. Recognizing and Administering Security Controls?Web Presence. Recognizing and Administering Security Controls?Directory. Recognizing and Administering Security Controls?File Transfer. Recognizing and Administering Security Controls?Wireless. Recognizing Vulnerabilities and Taking Action?Instant Messaging.

      3. Devices, Media, and Topology Security.

  Introduction. Understanding the Basic Security Concepts of Network and System Devices. Understanding the Basic Security Concepts of Media. Understanding the Concepts of Security Topologies.

      4. Intrusion Detection, Baselines, and Hardening.

  Introduction. Network-Based Intrusion Detection. Host-Based Intrusion Detection. Honeypots. Incident Response. Understanding Security Baselines.

      5. Cryptography Algorithms.

  Introduction. Encryption Algorithms. Concepts of Using Encryption.

      6. PKI and Key Management.

  Introduction. Digital Certificates. Revocation. Trust Models. Identifying and Differentiating Standards and Protocols. Understanding and Explaining Key Management/Certificate Lifecycle.

      7. Physical Security, Disaster Recovery, and Business Continuity.

  Introduction. Physical Security. Disaster Recovery and Disaster Recovery Plans. Business Continuity.

      8. Security Policy and Procedures.

  Introduction. Security Policy.

      9. Security Management.

  Introduction. Privilege Management. Forensics. Risk Identification. Change Management. Awareness. Documentation.


          Fast Facts.

  Introductory Note: Learn Key Terms! General Security Concepts. Communications Security. Infrastructure Security. Basics of Cryptography. Operational/Organizational Security.

      Practice Exam.

  Exam Questions. Answers to Exam Questions.


          Appendix A. Security Resources.

Appendix B. Glossary.

Appendix C. General Security Resources and Bibliography.

  1. General Security Concepts. 2. Communication Security. 3. Devices, Media, and Topology Security. 4. Intrusion Detection, Baselines, and Hardening. 5. Cryptography Algorithms. 6. PKI and Key Management. 7. Physical Security, Disaster Recovery, and Business Continuity. 8. Security Policy and Procedures. 9. Security Management.

      Appendix D. Overview of the Certification Process.

  Description of the Path to Certification. About the Security+ Certification Program.

      Appendix E. What?s on the CD-ROM.

  PrepLogic Practice Tests, Preview Edition.

      Appendix F. Using the PrepLogic Practice Tests, Preview Edition Software.

  Exam Simulation. Question Quality. Interface Design. Effective Learning Environment. Software Requirements. Installing PrepLogic Practice Tests, Preview Edition. Removing PrepLogic Practice Tests, Preview Edition from Your Computer. Using PrepLogic Practice Tests, Preview Edition. Customer Service. Product Suggestions and Comments. License Agreement.