CompTIA Security+ Study Guide: Exam SY0-101, 3rd, Deluxe Edition
* Clear and concise information on crucial security topics
* Six practical exams and over 600 practice questions, more than any other CompTIA Security+ book on the market
* Special Security Administrator's Troubleshooting Guide appendix
* Practical examples and hands-on labs to prepare you for the real world
* Leading-edge exam preparation software, including a test engine and electronic flashcards
Inside, find authoritative and coverage of all key exam topics, including:
* General security concepts
* Communication security
* Infrastructure security
* Basics of cryptography
* Operational and organizational security
This book has been reviewed and approved as CompTIA Authorized Quality Curriculum (CAQC). Students derive a number of important study advantages with CAQC materials, including coverage of all exam objectives, implementation of important instructional design principles, and instructional reviews that help students assess their learning comprehension and readiness for the exam.
Featured on the CD
SYBEX TEST ENGINE: Test your knowledge with advanced testing software. Includes all chapter review questions plus bonus exams.
ELECTRONIC FLASHCARDS: Reinforce your understanding with flashcards that can run on your PC, Pocket PC, or Palm device.
Chapter 1: General Security Concepts.
Chapter 2: Identifying Potential Risks.
Chapter 3: Infrastructure and Connectivity.
Chapter 4: Monitoring Activity and Intrusion Detection.
Chapter 5: Implementing and Maintaining a Secure Network.
Chapter 6: Securing the Network and Environment.
Chapter 7: Cryptography Basics, Methods, and Standards.
Chapter 8: Security Policies and Procedures.
Chapter 9: Security Management.
Appendix: Security+ Practical Application.
Emmett Dulaney has written several certification books on Windows, Security, IT project management, and UNIX. He is the certification columnist for Redmond Magazine and CramSession.com.
- Covers the 2006 exam refresh, with up-to-the-minute material as well as added hands-on elements and labs to help prepare students for what will happen on the job
- The Security+ exam has long been a starting point for security professionals who want to enhance their position in the job market, and is good preparation for more difficult and expensive certifications like CISSP
- Using the popular Sybex Study Guide approach, this book presents clear, concise information on crucial security topics, a leading-edge test engine and electronic flashcards on CD-ROM, and four additional bonus exams as well as a special Security Administrator’s Troubleshooting Guide
- Covers general security concepts, communication security, infrastructure security, basics of cryptography, and operational/organizational security
- Bonus Material: 4 additional bonus exams and special Security Administrators’ Troubleshooting Guide appendix
Do you think you've discovered an error in this book? Please check the list of errata below to see if we've already addressed the error. If not, please submit the error via our Errata Form. We will attempt to verify your error; if you're right, we will post a correction below.
line 8 from bottom, another typo:
"This is a common problem . . . where people regularly used shared resources."
To match the verb tense at the beginning of sentence, "used" should be "use."
Under "The Internet Layer," the third header:
"Internet Control Management Protocol (ICMP)" should read:
"Internet Control Message Protocol (ICMP)"
The last sentence before the figure:
"Wireless Transport Layer Security (WTLS) is the security layer of the Windows Application Protocol..."
"Wireless Transport Layer Security (WTLS) is the security layer of the Wireless Application Protocol..."
line 6 has a typo:
"Macintosh systems seem to be most the most vulnerable . . ."
"Macintosh systems seem to be the most vulnerable . . ."
Figure 6.12 for Biba model lists "No Read Up, No Write Down"
"No Write Up, No Read Down" per text above
There are several errors of arithmetic in the beginning of the second-to-last paragraph.
It should read:
"If you used a four-character password, this would be 62x62x62x62, or approximately 14 million password possibilities. If you used five characters in your password, this would give you 62 to the fifth power, or approximately 920 million, password possibilities. If you used a 10-character password, this would give you 62 to the tenth power, or 8.4x1017 (a very big number), possibilities."
The last sentence on the page, which continues on p.308, also contains errors. It should read:
"A five-character password would have 26 to the fifth power, or over 11 million, and a 10-character password would have 26 to the tenth power, or 1.4x1014."
In the second NOTE on the page, one of the listed security protocols is misidentified.
For "IPS," read "IPSec."
Under the header "CMP," the fourth sentence,
"XKMS is being developed and enhanced as a cooperative standard of the World Wide Web Committee (W3C)." should read:
"...of the World Wide Web Consortium (W3C)."
In the "NOTE," the second sentence:
"Prime numbers are numbers...such as 1,2,3,7,11,13,17." Should read:
"Prime numbers are numbers...such as 2,3,5,7,11,13,17."
In the second sentence, "The IEFT" should be "The IETF."
Under "Enforcing Privilege Management," second paragraph:
in the first sentence, insert a comma between "privilege escalation" and "single sign-on initiatives."