CASP+ CompTIA Advanced Security Practitioner Study Guide – Exam CAS–004, Fourth Edition: Sybex Study Guide
Autor NH Tanneren Limba Engleză Paperback – 16 noi 2022
Din seria Sybex Study Guide
- 20% Preț: 204.34 lei
- 20% Preț: 204.48 lei
- Preț: 416.00 lei
- 20% Preț: 204.15 lei
- Preț: 260.97 lei
- 20% Preț: 272.31 lei
- 20% Preț: 458.75 lei
- 20% Preț: 336.65 lei
- 20% Preț: 205.15 lei
- 20% Preț: 267.06 lei
- Preț: 322.04 lei
- 20% Preț: 304.02 lei
- Preț: 351.32 lei
- Preț: 350.89 lei
- 20% Preț: 175.26 lei
- Preț: 325.22 lei
- Preț: 288.65 lei
- Preț: 375.72 lei
- 20% Preț: 392.01 lei
- 8% Preț: 439.48 lei
- Preț: 427.33 lei
- 8% Preț: 380.32 lei
- 8% Preț: 441.16 lei
- 20% Preț: 269.07 lei
- Preț: 322.04 lei
- Preț: 390.40 lei
- 20% Preț: 298.45 lei
- 20% Preț: 268.91 lei
- Preț: 257.89 lei
- 20% Preț: 376.86 lei
- 20% Preț: 309.98 lei
- 20% Preț: 221.89 lei
- 20% Preț: 281.57 lei
- 20% Preț: 276.82 lei
- 20% Preț: 278.23 lei
- Preț: 326.42 lei
- 20% Preț: 224.76 lei
- Preț: 294.97 lei
- Preț: 291.72 lei
- Preț: 321.94 lei
- 20% Preț: 254.30 lei
- 20% Preț: 251.37 lei
- Preț: 324.94 lei
- 20% Preț: 275.57 lei
- 20% Preț: 279.90 lei
- Preț: 407.96 lei
- 20% Preț: 289.13 lei
- Preț: 340.54 lei
- 20% Preț: 280.68 lei
Preț: 289.38 lei
Preț vechi: 361.73 lei
-20% Nou
Puncte Express: 434
Preț estimativ în valută:
55.38€ • 57.53$ • 46.00£
55.38€ • 57.53$ • 46.00£
Carte disponibilă
Livrare economică 11-25 ianuarie 25
Livrare express 31 decembrie 24 - 04 ianuarie 25 pentru 44.65 lei
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781119803164
ISBN-10: 1119803160
Pagini: 592
Dimensiuni: 187 x 232 x 31 mm
Greutate: 0.82 kg
Ediția:4th Edition
Editura: Sybex
Seria Sybex Study Guide
Locul publicării:Hoboken, United States
ISBN-10: 1119803160
Pagini: 592
Dimensiuni: 187 x 232 x 31 mm
Greutate: 0.82 kg
Ediția:4th Edition
Editura: Sybex
Seria Sybex Study Guide
Locul publicării:Hoboken, United States
Notă biografică
ABOUT THE AUTHORS NADEAN H. TANNER has been in the technology industry for over 20 years in a variety of positions from marketing to training to web development to hardware. She has worked in academia as an IT director and a postgraduate technology instructor. She has also been a trainer and consultant in advanced cybersecurity for Fortune 500 companies as well as the U.S. Department of Defense. Nadean is the author of CASP+ Practices Tests: Exam CAS-004 and Cybersecurity Blue Team Toolkit. JEFF T. PARKER, CISSP, CompTIA Project+, CySA+, is a certified technical trainer and consultant specializing in governance, risk management and compliance. Jeff's infosec roots began as a security engineer, a member of a HP consulting group in Boston, USA. Prior to becoming an author, Jeff was a Global IT Risk Manager residing for several years in Prague, Czech Republic, where he rolled out a new risk management strategy for a multinational logistics firm.
Cuprins
Introduction xxv
Assessment Test xxxv
Chapter 1 Risk Management 1
Risk Terminology 4
The Risk Assessment Process 6
Asset Identification 6
Information Classification 8
Risk Assessment 9
Risk Assessment Options 14
Implementing Controls 16
Policies Used to Manage Employees 17
Pre-Employment Policies 18
Employment Policies 18
End of Employment and Termination Procedures 20
Cost-Benefit Analysis 21
Continuous Monitoring 22
Enterprise Security Architecture Frameworks and Governance 23
Training and Awareness for Users 24
Best Practices for Risk Assessments 25
Business Continuity Planning and Disaster Recovery 27
Reviewing the Effectiveness of Existing Security Controls 28
Conducting Lessons Learned and After-Action Reviews 30
Creation, Collection, and Analysis of Metrics 31
Metrics 31
Trend Data 32
Analyzing Security Solutions to Ensure They Meet Business Needs 32
Testing Plans 33
Internal and External Audits 34
Using Judgment to Solve Difficult Problems 35
Summary 35
Exam Essentials 36
Review Questions 38
Chapter 2 Configure and Implement Endpoint Security Controls 43
Hardening Techniques 45
Address Space Layout Randomization Use 47
Hardware Security Module and Trusted Platform Module 48
Trusted Operating Systems 52
Compensating Controls 55
Summary 57
Exam Essentials 58
Review Questions 59
Chapter 3 Security Operations Scenarios 63
Threat Management 66
Types of Intelligence 66
Threat Hunting 67
Threat Emulation 67
Actor Types 67
Intelligence Collection Methods 71
Open-Source
Intelligence 71
Human Intelligence and Social Engineering 73
Frameworks 74
MITRE Adversarial Tactics, Techniques and Common Knowledge 74
ATT&CK for Industrial Control Systems 75
Cyber Kill Chain 76
Diamond Model of Intrusion Analysis 76
Indicators of Compromise 77
Reading the Logs 77
Intrusion Detection and Prevention 78
Notifications and Responses to IoCs 79
Response 80
Summary 85
Exam Essentials 85
Review Questions 86
Chapter 4 Security Ops: Vulnerability Assessments and Operational Risk 91
Terminology 97
Vulnerability Management 98
Security Content Automation Protocol 103
Self-Assessment vs. Third-Party Vendor Assessment 105
Patch Management 108
Information Sources 110
Tools 112
Assessments 124
Penetration Testing 129
Assessment Types 131
Vulnerabilities 134
Buffer Overflow 134
Integer Overflow 135
Memory Leaks 136
Race Conditions (TOC/TOU) 136
Resource Exhaustion 137
Data Remnants 138
Use of Third-Party Libraries 138
Code Reuse 138
Cryptographic Vulnerabilities 138
Broken Authentication 139
Security Misconfiguration 140
Inherently Vulnerable System/Application 140
Client-Side Processing vs. Server-Side Processing 141
Attacks 145
Proactive Detection 153
Incident Response 153
Countermeasures 153
Deceptive Technology 154
USB Key Drops 155
Simulation 155
Security Data Analytics 155
Application Control 156
Allow and Block Lists 157
Security Automation 157
Physical Security 158
Summary 159
Exam Essentials 160
Review Questions 161
Chapter 5 Compliance and Vendor Risk 165
Shared Responsibility in Cloud Computing 168
Cloud Service/Infrastructure Models 169
Cloud Computing Providers and Hosting Options 169
Benefits of Cloud Computing 171
Security of On-Demand/Elastic Cloud Computing 174
Geographic Location 175
Infrastructure 175
Compute 175
Storage 175
Networking 176
Managing and Mitigating Risk 182
Security Concerns of Integrating Diverse Industries 185
Regulations, Accreditations, and Standards 187
PCI DSS 187
GDPR 190
ISO 192
CMMI 193
NIST 194
COPPA 195
CSA-STAR 196
HIPAA, SOX, and GLBA 197
Contract and Agreement Types 198
Third-Party Attestation of Compliance 202
Legal Considerations 203
Summary 204
Exam Essentials 205
Review Questions 206
Chapter 6 Cryptography and PKI 211
The History of Cryptography 216
Cryptographic Goals and Requirements 217
Supporting Security Requirements 218
Compliance and Policy Requirements 219
Privacy and Confidentiality Requirements 219
Integrity Requirements 220
Nonrepudiation 220
Risks with Data 221
Data at Rest 221
Data in Transit 222
Data in Process/Data in Use 222
Hashing 223
Message Digest 225
Secure Hash Algorithm 225
Message Authentication Code 226
Hashed Message Authentication Code 226
RACE Integrity Primitives Evaluation Message Digest 226
Poly1305 226
Symmetric Algorithms 227
Data Encryption Standard 230
Triple DES 231
Rijndael and the Advanced Encryption Standard 231
ChaCha 232
Salsa20 232
International Data Encryption Algorithm 232
Rivest Cipher Algorithms 233
Counter Mode 233
Asymmetric Encryption 233
Diffie-Hellman 235
RSA 236
Elliptic Curve Cryptography 237
ElGamal 238
Hybrid Encryption and Electronic Data Exchange (EDI) 238
Public Key Infrastructure Hierarchy 239
Certificate Authority 240
Registration Authority 241
Digital Certificates 241
Certificate Revocation List 243
Certificate Types 243
Certificate Distribution 244
The Client's Role in PKI 245
Implementation of Cryptographic Solutions 247
Application Layer Encryption 248
Transport Layer Encryption 249
Internet Layer Controls 250
Additional Authentication Protocols 251
Cryptocurrency 252
Digital Signatures 252
Recognizing Cryptographic Attacks 254
Troubleshooting Cryptographic Implementations 256
Summary 259
Exam Essentials 259
Review Questions 261
Chapter 7 Incident Response and Forensics 265
The Incident Response Framework 268
Event Classifications 268
Triage Events 269
Pre-Escalation Tasks 270
The Incident Response Process 270
Response Playbooks and Processes 273
Communication Plan and Stakeholder Management 274
Forensic Concepts 277
Principles, Standards, and Practices 278
The Forensic Process 279
Forensic Analysis Tools 283
File Carving Tools 284
Binary Analysis Tools 284
Analysis Tools 286
Imaging Tools 288
Hashing Utilities 289
Live Collection vs. Postmortem Tools 290
Summary 294
Exam Essentials 294
Review Questions 295
Chapter 8 Security Architecture 301
Security Requirements and Objectives for a Secure Network Architecture 310
Services 310
Segmentation 334
Deperimeterization/Zero Trust 344
Merging Networks from Various Organizations 352
Software-Defined Networking 357
Organizational Requirements for Infrastructure Security Design 358
Scalability 358
Resiliency 359
Automation 359
Containerization 360
Virtualization 361
Content Delivery Network 361
Integrating Applications Securely into an Enterprise Architecture 362
Baseline and Templates 362
Software Assurance 367
Considerations of Integrating Enterprise Applications 370
Integrating Security into the Development Life Cycle 373
Data Security Techniques for Securing Enterprise Architecture 384
Data Loss Prevention 384
Data Loss Detection 387
Data Classification, Labeling, and Tagging 388
Obfuscation 390
Anonymization 390
Encrypted vs. Unencrypted 390
Data Life Cycle 391
Data Inventory and Mapping 391
Data Integrity Management 391
Data Storage, Backup, and Recovery 392
Security Requirements and Objectives for Authentication and Authorization Controls 394
Credential Management 394
Password Policies 396
Federation 398
Access Control 399
Protocols 401
Multifactor Authentication 403
One-Time Passwords 404
Hardware Root of Trust 404
Single Sign-On 405
JavaScript Object Notation Web Token 405
Attestation and Identity Proofing 406
Summary 406
Exam Essentials 407
Review Questions 410
Chapter 9 Secure Cloud and Virtualization 415
Implement Secure Cloud and Virtualization Solutions 418
Virtualization Strategies 419
Deployment Models and Considerations 425
Service Models 429
Cloud Provider Limitations 433
Extending Appropriate On-Premises Controls 433
Storage Models 439
How Cloud Technology Adoption Impacts Organization Security 445
Automation and Orchestration 445
Encryption Configuration 445
Logs 446
Monitoring Configurations 447
Key Ownership and Location 448
Key Life-Cycle Management 448
Backup and Recovery Methods 449
Infrastructure vs. Serverless Computing 450
Software-Defined Networking 450
Misconfigurations 451
Collaboration Tools 451
Bit Splitting 461
Data Dispersion 461
Summary 461
Exam Essentials 462
Review Questions 463
Chapter 10 Mobility and Emerging Technologies 467
Emerging Technologies and Their Impact on Enterprise Security and Privacy 471
Artificial Intelligence 472
Machine Learning 472
Deep Learning 472
Quantum Computing 473
Blockchain 473
Homomorphic Encryption 474
Distributed Consensus 475
Big Data 475
Virtual/Augmented Reality 475
3D Printing 476
Passwordless Authentication 476
Nano Technology 477
Biometric Impersonation 477
Secure Enterprise Mobility Configurations 478
Managed Configurations 479
Deployment Scenarios 486
Mobile Device Security Considerations 487
Security Considerations for Technologies, Protocols, and Sectors 495
Embedded Technologies 495
ICS/Supervisory Control and Data Acquisition 496
Protocols 498
Sectors 499
Summary 500
Exam Essentials 500
Review Questions 501
Appendix Answers to Review Questions 505
Chapter 1: Risk Management 506
Chapter 2: Configure and Implement Endpoint Security Controls 507
Chapter 3: Security Operations Scenarios 509
Chapter 4: Security Ops: Vulnerability Assessments and Operational Risk 511
Chapter 5: Compliance and Vendor Risk 513
Chapter 6: Cryptography and PKI 514
Chapter 7: Incident Response and Forensics 516
Chapter 8: Security Architecture 519
Chapter 9: Secure Cloud and Virtualization 522
Chapter 10: Mobility and Emerging Technologies 524
Index 529