Security+ Study Guide
Chapter 1: General Security Concepts
- Multi-Factor Authentication and Security
- Real World Scenario: Creating a Corporate Connection to a Business Partner
Chapter 2: Know Your Enemy
- New Attacks on the Way
- Real World Scenario: A Virus Out of Control
Chapter 3: Infrastructure and Connectivity
- ATT Wireless NOCs
- Real World Scenario: Dual-Homed Server-Based Proxy Firewall
- Real World Scenario: Users Installing Unauthorized Software
- Real World Scenario: Connecting Remote Network Users
- Real World Scenairo: SMTP Relaying in Action
- Real World Scenario: Remote File Transfers
- Real World Scenario: Using ICMP to Deal with Smurf Attacks
- Real World Scenario: The School Lab
Chapter 4: Monitoring Communications Activity
- Real World Scenario: These Network Audit Files Are Killing Me
- Real World Scenario: The E-Mail Incident
- Real World Scenario: The Virus That Keeps On Giving
Chapter 5: Implementing and Maintaining a Secure Network
- Real World scenario: Implementing a Secure Server Environment
- Real World Scenario: Connecting Windows Systems Remotely
- Real World Scenario: Does Anybody Really Like Spam?
- Real World Scenario: Where Did All These Strange IP Addresses Originate?
Chapter 6: Working with a Secure Network
- Real World Scenario: A Ghost in the Machine?
- Evaluating Your Security System
- Real World Scenario: Installing Biometric Devices
- Real World Scenario: Remote Diagnostic Support
- Real World Scenario: Securing Your Wireless Devices
- Real World Scenario: Conducting a Risk Assessment
Chapter 7: Cryptography Basics and Methods
- Real World Scenario: We're All Human, or Mr. Key's Wild Ride
- eBay Is a Great Place to Go Shopping
- Real World Scenario: Building a Security System
- Real World Scenario: Designing a CA Structure for Your Organization
Chapter 8: Cryptography Standards
- Real World Scenario: Working with Credit Card Information Online
- Real World Scenario: Securing UNIX Interactive Users
- Real World Scenario: What Do You Do About Forgetful Programmers?
- Real World Scenario: Selling the Company's Old Computers
Chapter 9: Security Policies and Procedures
- Real World Scenario: Some Protection Is Better Than None—Or Is It?
- Real World Scenario: Should I Buy the Computer Store's SLA for My New Laptop?
- Real World Scenario: Performing a Usage Audit
Chapter 10: Security Management
- Real World Scenario: When to Involve Law Enforcement
- Real World Scenario: Selling Your Old Computers
- Real world Scenario: Where Did My VAX Go?
- Real World Scenario: You Be the Judge
- Real world Scenario: Upgrading Your Servers
- Real World Scenario: Security Awareness Program