CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)

Author:   Michael Gregg ,  Billy Haines
Publisher:   John Wiley & Sons Inc
ISBN:  

9781118083192


Pages:   552
Publication Date:   28 February 2012
Format:   Paperback
Availability:   Out of stock   Availability explained


Our Price $158.37 Quantity:  
Add to Cart

Share |

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)


Add your own review!

Overview

Get Prepared for CompTIA Advanced Security Practitioner (CASP) Exam Targeting security professionals who either have their CompTIA Security+ certification or are looking to achieve a more advanced security certification, this CompTIA Authorized study guide is focused on the new CompTIA Advanced Security Practitioner (CASP) Exam CAS-001. Veteran IT security expert and author Michael Gregg details the technical knowledge and skills you need to conceptualize, design, and engineer secure solutions across complex enterprise environments. He prepares you for aspects of the certification test that assess how well you apply critical thinking and judgment across a broad spectrum of security disciplines. Featuring clear and concise information on crucial security topics, this study guide includes examples and insights drawn from real-world experience to help you not only prepare for the exam, but also your career. You will get complete coverage of exam objectives for all topic areas including: Securing Enterprise-level Infrastructures Conducting Risk Management Assessment Implementing Security Policies and Procedures Researching and Analyzing Industry Trends Integrating Computing, Communications and Business Disciplines Additionally, you can download a suite of study tools to help you prepare including an assessment test, two practice exams, electronic flashcards, and a glossary of key terms. Go to www.sybex.com/go/casp and download the full set of electronic test prep tools.

Full Product Details

Author:   Michael Gregg ,  Billy Haines
Publisher:   John Wiley & Sons Inc
Imprint:   John Wiley & Sons Inc
Dimensions:   Width: 18.80cm , Height: 3.10cm , Length: 23.00cm
Weight:   0.820kg
ISBN:  

9781118083192


ISBN 10:   1118083199
Pages:   552
Publication Date:   28 February 2012
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Out of Stock Indefinitely
Availability:   Out of stock   Availability explained

Table of Contents

Foreword xxi Introduction xxvii Assessment Test xliv Chapter 1 Cryptographic Tools and Techniques 1 The History of Cryptography 2 Cryptographic Services 3 Cryptographic Goals 3 Cryptographic Terms 4 Cipher Types and Methods 6 Symmetric Encryption 8 Data Encryption Standard 10 Triple-DES 11 Advanced Encryption Standard 12 International Data Encryption Algorithm 12 Rivest Cipher Algorithms 13 Asymmetric Encryption 13 Diffie-Hellman 14 RSA 15 Elliptic Curve Cryptography 16 El Gamal 16 Merkle-Hellman Knapsack 16 Hybrid Encryption 16 Hashing 17 Hashing and Message Digests 17 MD Series 19 SHA 19 HAVAL 19 Message Authentication Code 20 HMAC 20 Digital Signatures 20 Public Key Infrastructure 22 Certificate Authority 22 Registration Authority 23 Certificate Revocation List 23 Digital Certificates 24 Certificate Distribution 26 The Client's Role in PKI 26 Cryptographic Solutions 27 Application Layer Encryption 27 Transport Layer Encryption 28 Internet Layer Controls 28 Physical Layer Controls 29 Cryptographic Attacks 30 Summary 31 Exam Essentials 31 Review Questions 33 Chapter 2 Comprehensive Security Solutions 37 Advanced Network Design 39 Remote Access 40 Placement of Security Devices 41 SCADA 44 VoIP 45 TCP/IP 47 Network Interface Layer 48 Internet Layer 50 Transport Layer 55 Application Layer 57 Secure Communication Solutions 60 Secure Facility Solutions 66 Building Layouts 66 Facilities Management 67 Secure Network Infrastructure Design 67 Router Configuration 68 Enterprise Service Bus 69 Web Services Security 70 Summary 70 Exam Essentials 71 Review Questions 73 Chapter 3 Securing Virtualized, Distributed, and Shared Computing 77 Enterprise Security 79 Cloud Computing 81 Cloud Computing Models 82 Cloud Computing Providers 83 Benefits of Cloud Computing 83 Security of Cloud Computing 86 Cloud Computing Vulnerabilities 90 Virtualization 92 Virtualized Servers 93 Virtual LANs 97 Enterprise Storage 98 Summary 103 Exam Essentials 103 Review Questions 105 Chapter 4 Host Security 109 Firewalls and Access Control Lists 110 Host-Based Firewalls 114 Trusted Operating System 117 Endpoint Security Software 121 Anti-malware 124 Antivirus 124 Anti-spyware 126 Spam Filters 128 Host Hardening 129 Asset Management 133 Data Exfiltration 134 Intrusion Detection and Prevention 135 Summary 139 Exam Essentials 139 Review Questions 141 Chapter 5 Application Security and Penetration Testing 145 Application Security 147 Specific Application Issues 149 Cross-Site Scripting 150 Clickjacking 151 Session Management 151 Input Validation 152 SQL Injection 153 Application Sandboxing 154 Application Security Framework 154 Standard Libraries 155 Secure Coding Standards 156 Application Exploits 157 Escalation of Privilege 158 Improper Storage of Sensitive Data 159 Cookie Storage and Transmission 159 Process Handling at the Client and Server 160 Ajax 161 JavaScript 161 Buffer Overflow 162 Memory Leaks 163 Integer Overflow 163 Race Conditions (TOC/TOU) 163 Resource Exhaustion 164 Security Assessments and Penetration Testing 165 Test Methods 166 Penetration Testing Steps 166 Assessment Types 167 Assessment Areas 168 Security Assessment and Penetration Test Tools 170 Summary 182 Exam Essentials 182 Review Questions 184 Chapter 6 Risk Management 189 Risk Terminology 191 Identifying Vulnerabilities 192 Operational Risks 195 Risk in Business Models 195 Risk in External and Internal Influences 201 Risks with Data 204 The Risk Assessment Process 210 Asset Identification 210 Information Classification 212 Risk Assessment 213 Risk Analysis Options 217 Implementing Controls 218 Continuous Monitoring 219 Enterprise Security Architecture Frameworks 220 Best Practices for Risk Assessments 220 Summary 221 Exam Essentials 222 Review Questions 224 Chapter 7 Policies, Procedures, and Incident Response 229 A High-Level View of Documentation 231 The Policy Development Process 232 Policies and Procedures 233 Business Documents Used to Support Security 237 Documents and Controls Used for Sensitive Information 239 Why Security? 240 Personally Identifiable Information Controls 240 Data Breach 242 Policies Used to Manage Employees 243 Auditing Requirements and Frequency 247 The Incident Response Framework 248 Digital Forensics 250 The Role of Training and Employee Awareness 254 Summary 255 Exam Essentials 256 Review Questions 258 Chapter 8 Security Research and Analysis 263 Analyzing Industry Trends and Outlining Potential Impact 266 Performing Ongoing Research 266 Best Practices 270 New Technologies 273 Situational Awareness 281 Research Security Implications of New Business Tools 290 Global IA Industry Community 293 Research Security Requirements for Contracts 296 Carrying Out Relevant Analysis to Secure the Enterprise 298 Benchmarking 298 Prototyping and Testing Multiple Solutions 298 Cost-Benefit Analysis 299 Analyzing and Interpreting Trend Data to Anticipate Cyber Defense Aids 299 Reviewing Effectiveness of Existing Security 299 Reverse Engineering or Deconstructing Existing Solutions 301 Analyzing Security Solutions to Ensure They Meet Business Needs 301 Conducting a Lessons Learned/After-Action Review 302 Using Judgment to Solve Difficult Problems 303 Conducting Network Traffic Analysis 303 Summary 304 Exam Essentials 305 Review Questions 306 Chapter 9 Enterprise Security Integration 311 Integrate Enterprise Disciplines to Achieve Secure Solutions 313 The Role of Governance in Achieving Enterprise Security 315 Interpreting Security Requirements and Goals to Communicate with Other Disciplines 317 Guidance to Management 320 Establish Effective Collaboration within Teams to Implement Secure Solutions 322 Disciplines 325 Explain the Security Impact of Interorganizational Change 328 Security Concerns of Interconnecting Multiple Industries 330 Design Considerations During Mergers, Acquisitions, and De-mergers 331 Assuring Third-Party Products Only Introduce Acceptable Risk 332 Network Secure Segmentation and Delegation 334 Integration of Products and Services 336 Summary 337 Exam Essentials 338 Review Questions 339 Chapter 10 Security Controls for Communication and Collaboration 343 Selecting and Distinguishing the Appropriate Security Controls 345 Unified Communication Security 345 VoIP Security 354 VoIP Implementation 356 Remote Access 357 Enterprise Configuration Management of Mobile Devices 358 Secure External Communications 359 Secure Implementation of Collaboration Platforms 360 Prioritizing Traffic with QoS 362 Mobile Devices 363 Advanced Authentication Tools, Techniques, and Concepts 365 Federated Identity Management 365 XACML 366 SOAP 366 SSO 367 Service Provisioning Markup Language 368 Certificate-Based Authentication 369 Carrying Out Security Activities across the Technology Life Cycle 370 End-to-End Solution Ownership 370 Understanding the Results of Solutions in Advance 371 Systems Development Life Cycle 373 Addressing Emerging Threats and Security Trends 375 Validating System Designs 376 Summary 378 Exam Essentials 378 Review Questions 380 Appendix A CASP Lab Manual 385 What You'll Need 386 Lab A1: Download, Verify, and Install a Virtual Environment 389 Lab A2: Explore Your Virtual Network 392 Lab A3: Port Scanning 396 Lab A4: Introduction to a Protocol Analyzer 400 Lab A5: Web Vulnerabilities 406 Lab A6: Introduction to the Nessus Vulnerability Scanner 408 Lab A7: Verify a Baseline Security Configuration 411 Lab A8: Basic Introduction to Windows Forensic Tools 413 Lab A9: Introduction to Helix 421 Lab A10: Introduction to Hashing 425 Lab A11: File Encryption 428 Lab A12: Cracking Encrypted Files 429 Lab A13: Intrusion Detection 431 Lab A14: An Introduction to Signature-Based Scanning 433 Lab A15: Rootkit Detection 437 Lab A16: Threat Modeling 440 Lab A17: Introduction to the Metasploit Framework 442 Lab A18: Social Engineering 445 Lab A19: Routing, Switching, and Security 449 Lab A20: Further Exploration 460 Appendix B Answers to Review Questions 463 Chapter 1: Cryptographic Tools and Techniques 464 Chapter 2: Comprehensive Security Solutions 465 Chapter 3: Securing Virtualized, Distributed, and Shared Computing 466 Chapter 4: Host Security 467 Chapter 5: Application Security and Penetration Testing 468 Chapter 6: Risk Management 469 Chapter 7: Policies, Procedures, and Incident Response 471 Chapter 8: Security Research and Analysis 472 Chapter 9: Enterprise Security Integration 473 Chapter 10: Security Controls for Communication and Collaboration 474 Appendix C About the Additional Study Tools 475 Additional Study Tools 476 Sybex Test Engine 476 Electronic Flashcards 476 PDF of Glossary of Terms 476 Adobe Reader 476 System Requirements 477 Using the Study Tools 477 Troubleshooting 477 Customer Care 478 Index 479

Reviews

Author Information

Michael Gregg is the COO of Superior Solutions, Inc. (www.thesolutionfirm.com), a Houston-based consulting firm that performs security assessments and penetration testing for Fortune 1000 companies. He is an expert on security, networking, and Internet technologies, and has written over 14 books on IT security. Michael holds the following certifications: CISSP, CISA, CISM, MCSE, MCT, CTT+, A+, Network+, Security+, CNA, CCNA, CIW Security Analyst, CCE, CEH, CHFI, CEI, DCNP, ES Dragon IDS, ES Advanced Dragon IDS, and SSCP. Billy Haines, CCNA Security, CISSP Associate, is a systems engineer for a science, engineering, technology, and applications company in the greater San Diego area. Prior to that, he was a network security vulnerability technician with the U.S. Navy, specializing in advanced networking, intrusion detection, vulnerability management, information assurance, and comprehensive defense-in-depth implementation.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List