Introduction xv Chapter 1 Threats, Attacks, and Vulnerabilities 1 Chapter 2 Technologies and Tools 37 Chapter 3 Architecture and Design 75 Chapter 4 Identity and Access Management 111 Chapter 5 Risk Management 131 Chapter 6 Cryptography and PKI 163 Chapter 7 Practice Test 195 Appendix Answers to Practice Tests 215 Chapter 1: Threats, Attacks, and Vulnerabilities 216 Chapter 2: Technologies and Tools 238 Chapter 3: Architecture and Design 267 Chapter 4: Identity and Access Management 293 Chapter 5: Risk Management 309 Chapter 6: Cryptography and PKI 339 Chapter 7: Practice Test 368 Index 391
ABOUT THE AUTHORS S. Russell Christy, CompTIA Security+, CySA+, A+, Network+, Server+, is a Technical Trainer in Memphis, Tenn., delivering traditional and online classroom learning for adults, covering a wide variety of products. He specializes in Computer Maintenance and Network and Security; Microsoft Office applications; and Web and Print Design. For over 20 years he has deployed new desktops and operating systems, servers, network hardware and software, while simultaneously troubleshooting various hardware and software issues. Chuck Easttom is CEO and Chief Trainer for CEC-Security, which specializes in IT security training and CISP and Security+ exam preparation. He has over 18 years in the IT industry, 10 years teaching and training, and has authored 15 published books.