Skip to:Content
|
Bottom
Cover image for Security administrator street smarts : a real world guide to CompTIA Security+ skills
Title:
Security administrator street smarts : a real world guide to CompTIA Security+ skills
Personal Author:
Publication Information:
Indianapolis, IN : Wiley Pub., 2007
ISBN:
9780470102589
General Note:
Accompanied by study guides : CompTIA security + study guide (QA76.3 M543 2006) : Security + Fast Pass (QA76.3 M5433 2004)

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010160694 QA76.3 M54 2007 Open Access Book Book
Searching...

On Order

Summary

Summary

Develop the skills you need in the real world

Hit the ground running with the street-smart training you'll find in this practical book. Using a "year in the life" approach, it gives you an inside look at the common responsibilities of security administrators, with key information organized around the actual day-to-day tasks, scenarios, and challenges you'll face in the field. This valuable training tool is loaded with hands-on, step-by-step exercises covering all phases of a security administrator's job, including:

Designing a secure network environment Creating and implementing standard security policies and practices Identifying insecure systems in current environment Providing training to on-site and remote users

An invaluable study tool

This no-nonsense book also covers the common tasks that CompTIA expects all of its Security+ candidates to know how to perform. So whether you're preparing for certification or seeking practical skills to break into the field, you'll find the instruction you need, including:

Performing an initial risk assessment Installing, updating, and running anti-virus Encrypting files and securing e-mail Creating new user accounts Deploying IPSec

The Street Smarts series is designed to help current or aspiring IT professionals put their certification to work for them. Full of practical, real world scenarios, each book features actual tasks from the field and then offers step-by-step exercises that teach the skills necessary to complete those tasks. And because the exercises are based upon exam objectives from leading technology certifications, each Street Smarts book can be used as a lab manual for certification prep.


Author Notes

David R. Miller , Security+, CISSP, and MCSE: Security, is a network engineer and IT security and project management consultant. He has written numerous books, curriculum, and training videos on topics such as network and wireless security, penetration testing, CISSP, and Security+.

Michael Gregg , Security+, CISSP, and CIW Security Analyst, is the president of Superior Solutions, Inc., an IT security consulting firm that performs security assessments and penetration testing for Fortune 1000® firms. He also holds numerous other certifications including MCT, CTT+, A+, Network+, and CEH, among others.


Table of Contents

Introductionp. xix
Phase 1 The Grunt Work of Securityp. 1
Task 1.1 Performing an Initial Risk Assessmentp. 2
Scenariop. 3
Scope of Taskp. 3
Procedurep. 3
Criteria for Completionp. 8
Task 1.2 Determining Which Security Policy Is Most Importantp. 8
Scenariop. 8
Scope of Taskp. 9
Procedurep. 9
Criteria for Completionp. 12
Task 1.3 Establishing a User Awareness Programp. 13
Scenariop. 13
Scope of Taskp. 13
Procedurep. 14
Criteria for Completionp. 16
Task 1.4 Reviewing a Physical Security Checklistp. 16
Scenariop. 16
Scope of Taskp. 16
Procedurep. 17
Criteria for Completionp. 19
Task 1.5 Understanding the Value of Documentsp. 19
Scenariop. 19
Scope of Taskp. 19
Procedurep. 20
Criteria for Completionp. 22
Phase 2 Hardening Systemsp. 23
Task 2.1 Managing Servicesp. 24
Scenariop. 25
Scope of Taskp. 25
Procedurep. 26
Criteria for Completionp. 39
Task 2.2 Managing Portsp. 39
Scenariop. 39
Scope of Taskp. 40
Procedurep. 40
Criteria for Completionp. 50
Task 2.3 Patching the Operating Systemp. 51
Scenariop. 51
Scope of Taskp. 51
Procedurep. 51
Criteria for Completionp. 67
Task 2.4 Security Templatesp. 67
Scenariop. 67
Scope of Taskp. 68
Procedurep. 68
Criteria for Completionp. 77
Task 2.5 Securing Autorunsp. 77
Scenariop. 77
Scope of Taskp. 78
Procedurep. 78
Criteria for Completionp. 87
Phase 3 Protecting Against Malwarep. 89
Task 3.1 Installing, Updating, and Running Antivirus Softwarep. 90
Scenariop. 91
Scope of Taskp. 91
Procedurep. 91
Criteria for Completionp. 96
Task 3.2 Using a Rootkit Checkerp. 96
Scenariop. 97
Scope of Taskp. 97
Procedurep. 97
Criteria for Completionp. 102
Task 3.3 Using Adware Checkerp. 102
Scenariop. 102
Scope of Taskp. 103
Procedurep. 103
Criteria for Completionp. 106
Task 3.4 Using Spyware Checkerp. 106
Scenariop. 106
Scope of Taskp. 107
Procedurep. 107
Criteria for Completionp. 110
Phase 4 Secure Storagep. 111
Task 4.1 The Encrypting File Systemp. 112
Scenariop. 112
Scope of Taskp. 113
Procedurep. 113
Criteria for Completionp. 127
Task 4.2 EFS Data Recoveryp. 127
Scenariop. 127
Scope of Taskp. 127
Procedurep. 128
Criteria for Completionp. 131
Task 4.3 Implementing Syskeyp. 131
Scenariop. 132
Scope of Taskp. 132
Procedurep. 132
Criteria for Completionp. 134
Task 4.4 Converting FAT to NTFSp. 134
Scenariop. 135
Scope of Taskp. 135
Procedurep. 136
Criteria for Completionp. 145
Task 4.5 Implementing Disk Fault Tolerance with Raidp. 145
Scenariop. 146
Scope of Taskp. 146
Procedurep. 146
Criteria for Completionp. 151
Task 4.6 Backing Up Datap. 151
Scenariop. 152
Scope of Taskp. 152
Procedurep. 152
Criteria for Completionp. 160
Task 4.7 Restoring Data from a Backupp. 161
Scenariop. 161
Scope of Taskp. 161
Procedurep. 162
Criteria for Completionp. 166
Task 4.8 Securing Sharesp. 167
Scenariop. 167
Scope of Taskp. 167
Procedurep. 168
Criteria for Completionp. 177
Phase 5 Managing User Accountsp. 179
Task 5.1 Creating User Accountsp. 180
Scenariop. 180
Scope of Taskp. 181
Procedurep. 181
Criteria for Completionp. 187
Task 5.2 Implementing the Password Policyp. 187
Scenariop. 187
Scope of Taskp. 187
Procedurep. 188
Criteria for Completionp. 192
Task 5.3 Auditing Logonsp. 192
Scenariop. 192
Scope of Taskp. 192
Procedurep. 193
Criteria for Completionp. 199
Task 5.4 Securing the Default User Accountsp. 200
Scenariop. 200
Scope of Taskp. 200
Procedurep. 201
Criteria for Completionp. 208
Task 5.5 Implementing a Deny Groupp. 208
Scenariop. 208
Scope of Taskp. 208
Procedurep. 209
Criteria for Completionp. 214
Phase 6 Network Securityp. 215
Task 6.1 Deploying IPSecp. 217
Scenariop. 217
Scope of Taskp. 217
Procedurep. 218
Criteria for Completionp. 221
Task 6.2 Configuring the VPN Serverp. 221
Scenariop. 222
Scope of Taskp. 222
Procedurep. 223
Criteria for Completionp. 228
Task 6.3 Configuring the VPN Clientp. 228
Scenariop. 228
Scope of Taskp. 228
Procedurep. 229
Criteria for Completionp. 233
Task 6.4 Implementing Secure Remote Administrationp. 233
Scenariop. 233
Scope of Taskp. 233
Procedurep. 234
Criteria for Completionp. 240
Task 6.5 Secure Administration Using Run Asp. 241
Scenariop. 242
Scope of Taskp. 242
Procedurep. 242
Criteria for Completionp. 247
Task 6.6 Configuring a Packet Filterp. 247
Scenariop. 247
Scope of Taskp. 248
Procedurep. 248
Criteria for Completionp. 252
Task 6.7 Implementing 802.11 Wireless Securityp. 252
Scenariop. 253
Scope of Taskp. 253
Procedurep. 253
Criteria for Completionp. 264
Phase 7 Securing Internet Activityp. 265
Task 7.1 Configuring Internet Accessp. 266
Scenariop. 267
Scope of Taskp. 267
Procedurep. 267
Criteria for Completionp. 270
Task 7.2 Using Internet Explorer Security Zonesp. 270
Scenariop. 270
Scope of Taskp. 270
Procedurep. 271
Criteria for Completionp. 274
Task 7.3 Configuring IE for Secure Use of Cookiesp. 274
Scenariop. 274
Scope of Taskp. 274
Procedurep. 275
Criteria for Completionp. 276
Task 7.4 Using Internet Connection Sharingp. 276
Scenariop. 276
Scope of Taskp. 276
Procedurep. 277
Criteria for Completionp. 280
Task 7.5 Securing E-mailp. 281
Scenariop. 281
Scope of Taskp. 281
Procedurep. 282
Criteria for Completionp. 285
Task 7.6 Spam Managementp. 286
Scenariop. 286
Scope of Taskp. 286
Procedurep. 286
Criteria for Completionp. 290
Task 7.7 Installing and Using a Digital Certificatep. 290
Scenariop. 290
Scope of Taskp. 291
Procedurep. 291
Criteria for Completionp. 294
Task 7.8 Certificate Backup and Managementp. 294
Scenariop. 294
Scope of Taskp. 294
Procedurep. 295
Criteria for Completionp. 298
Task 7.9 Performing Secure File Exchangep. 298
Scenariop. 298
Scope of Taskp. 299
Procedurep. 299
Criteria for Completionp. 303
Task 7.10 Validating Downloads and Checking the Hashp. 303
Scenariop. 303
Scope of Taskp. 304
Procedurep. 304
Criteria for Completionp. 306
Phase 8 Security Testingp. 307
Task 8.1 Penetration Testing with Nessusp. 308
Scenariop. 308
Scope of Taskp. 309
Procedurep. 309
Criteria for Completionp. 313
Task 8.2 Penetration Testing with Retinap. 314
Scenariop. 314
Scope of Taskp. 314
Procedurep. 314
Criteria for Completionp. 319
Task 8.3 Performing Assessments with Microsoft Baseline Security Analyzerp. 320
Scenariop. 320
Scope of Taskp. 320
Procedurep. 320
Criteria for Completionp. 323
Task 8.4 Performing Security Assessments with HFNetChkp. 323
Scenariop. 324
Scope of Taskp. 324
Procedurep. 324
Criteria for Completionp. 326
Task 8.5 Performing Internet Vulnerability Profilingp. 326
Scenariop. 327
Scope of Taskp. 327
Procedurep. 327
Criteria for Completionp. 331
Phase 9 Investigating Incidentsp. 333
Task 9.1 Configuring an Audit Policy for Object Accessp. 335
Scenariop. 335
Scope of Taskp. 335
Procedurep. 336
Criteria for Completionp. 345
Task 9.2 Reviewing the Audit Logsp. 345
Scenariop. 345
Scope of Taskp. 345
Procedurep. 346
Criteria for Completionp. 354
Task 9.3 Forcing a Memory Dumpp. 354
Scenariop. 354
Scope of Taskp. 354
Procedurep. 355
Criteria for Completionp. 362
Task 9.4 Capturing Packets with the Packet Analyzer: Etherealp. 362
Scenariop. 363
Scope of Taskp. 364
Procedurep. 364
Criteria for Completionp. 372
Task 9.5 Recovering Previous Versions of Filesp. 372
Scenariop. 373
Scope of Taskp. 373
Procedurep. 373
Criteria for Completionp. 387
Phase 10 Security Troubleshootingp. 389
Task 10.1 Booting into Safe Modep. 391
Scenariop. 391
Scope of Taskp. 391
Procedurep. 392
Criteria for Completionp. 395
Task 10.2 Implementing Last Known Good Configurationp. 395
Scenariop. 395
Scope of Taskp. 395
Procedurep. 396
Criteria for Completionp. 398
Task 10.3 Using System Restorep. 398
Scenariop. 399
Scope of Taskp. 399
Procedurep. 399
Criteria for Completionp. 405
Task 10.4 Sanitizing Mediap. 406
Scenariop. 406
Scope of Taskp. 406
Procedurep. 407
Criteria for Completionp. 410
Indexp. 411
Go to:Top of Page