06184nam 22008173u 450 991096219580332120251117090548.01-283-17720-X97866131772091-118-11358-6(CKB)2550000000040607(EBL)693686(OCoLC)747412540(SSID)ssj0000541133(PQKBManifestationID)11391003(PQKBTitleCode)TC0000541133(PQKBWorkID)10498608(PQKB)10670831(WaSeSS)Ind00025751(MiAaPQ)EBC693686(EXLCZ)99255000000004060720130418d2011|||| u|| |engur|n|---|||||txtccrSecurity Administrator Street Smarts A Real World Guide to CompTIA Security+ Skills3rd ed.Hoboken Wiley20111 online resource (625 p.)Street smarts seriesSybex serious skillsDescription based upon print version of record.1-118-06116-0 Includes index.CompTIA Discount Coupon; Security Administrator Street Smarts: A Real World Guide to CompTIA Security+TM Skills; Contents; Introduction; Phase 1: The Grunt Work of Security; Task 1.1: Performing an Initial Risk Assessment; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.2: Determining Which Security Policy Is Most Important; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.3: Establishing a User-Awareness Program; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.4: Reviewing a Physical-Security Checklist; Scenario; Scope of TaskProcedureCriteria for Completion; Task 1.5: Understanding the Value of Documents; Scenario; Scope of Task; Procedure; Criteria for Completion; Phase 2: Hardening Systems; Task 2.1: Managing Services; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.2: Managing Ports; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.3: Patching the Operating System; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.4: Security Templates; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.5: Securing Autoruns; Scenario; Scope of TaskProcedureCriteria for Completion; Task 2.6: Securing Hardware Devices; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.7: Virtualization; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.8: Locking the Computer Using an Idle Time-out; Scenario; Scope of Task; Procedure; Criteria for Completion; Phase 3: Malicious Software; Task 3.1: Installing, Updating, and Running Antivirus Software; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.2: Using a Rootkit Checker; Scenario; Scope of Task; Procedure; Criteria for CompletionTask 3.3: AdwareScenario; Scope of Task; Procedure; Criteria for Completion; Task 3.4: Using a Spyware Checker; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.5: Malicious Software Removal Tool; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.6: McAfee Site Advisor; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.7: ARP Poisoning with Cain & Abel; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.8: Attacking Authentication with Firesheep; Scenario; Scope of Task; Procedure; Criteria for CompletionPhase 4: Secure StorageTask 4.1: The Encrypting File System; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.2: EFS Data Recovery; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.3: Implementing Syskey; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.4: Converting FAT to NTFS; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.5: Implementing Disk Fault Tolerance with RAID; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.6: Backing Up Data; Scenario; Scope of Task; ProcedureCriteria for CompletionA step-by-step guide to the tasks involved in security administration If you aspire to a career in security administration, one of your greatest challenges will be gaining hands-on experience. This book takes you through the most common security admin tasks step by step, showing you the way around many of the roadblocks you can expect on the job. It offers a variety of scenarios in each phase of the security administrator's job, giving you the confidence of first-hand experience. In addition, this is an ideal complement to the brand-new, bestselling CompTIA Security+ Study Guide,Serious skills.Computer networks --Security measures --Examinations --Study guidesComputer security --Examinations --Study guidesElectronic data processing personnel --CertificationElectronic data processing personnelCertificationStudy guidesComputer securityExaminationsStudy guidesComputer networksExaminationsSecurity measuresEngineering & Applied SciencesHILCCComputer ScienceHILCCComputer networks --Security measures --Examinations --Study guides.Computer security --Examinations --Study guides.Electronic data processing personnel --Certification.Electronic data processing personnelCertificationComputer securityExaminationsComputer networksExaminationsSecurity measures.Engineering & Applied SciencesComputer Science005.8COM055000bisacshMiller David R1856645Gregg Michael884346AU-PeELAU-PeELAU-PeELBOOK9910962195803321Security Administrator Street Smarts4456276UNINA