Table of Contents:
  • Cover
  • Title Page
  • Copyright Page
  • Contents
  • Acknowledgments
  • Check-In
  • Part I: Organizational Security
  • Chapter 1: Organizational Security and Compliance
  • Objective 1.01 Explain Risk-Related Concepts
  • Risk Control Types
  • Risk Assessment
  • Risk Management Options
  • False Positives and Negatives
  • Use Organizational Policies to Reduce Risk
  • Objective 1.02 Implement Appropriate Risk Mitigation Strategies
  • Change Management Policy
  • Incident Management and Response Policy
  • Perform Routine Audits
  • User Rights and Permissions Reviews
  • Whaling
  • Shoulder Surfing
  • Tailgating
  • Pharming
  • Spim
  • Vishing
  • Spam
  • Hoaxes
  • Objective 2.03 Execute Appropriate Incident Response Procedures
  • Preparation
  • Incident Identification
  • First Responders
  • Incident Isolation
  • Damage and Loss Control
  • Escalation Policy
  • Reporting and Notification
  • Mitigation and Recovery Steps
  • Lessons Learned
  • Objective 2.04 Implement Basic Forensic Procedures
  • Collection and Preservation of Evidence
  • Chapter 3: Business Continuity and Disaster Recovery
  • Objective 3.01 Compare and Contrast Aspects of Business Continuity
  • Recovery Plans
  • Objective 3.02 Execute Disaster Recovery Plans and Procedures
  • High Availability and Redundancy Planning
  • Fault Tolerance
  • Objective 3.03 Select the Appropriate Control to Meet the Goals of Security
  • Objective 3.04 Explain the Impact and Proper Use of Environmental Controls
  • Facility Construction Issues
  • Environmental Issues
  • Cable Shielding
  • Fire Suppression
  • Part II: Cryptography
  • Chapter 4: Cryptography and Encryption Basics
  • Objective 4.01 Utilize the Concepts of Cryptography
  • Information Assurance
  • Algorithms
  • Steganography
  • Digital Signatures
  • Basic Hashing Concepts
  • Message Digest Hashing
  • Secure Hash Algorithm (SHA)
  • RIPEMD
  • HMAC
  • Objective 4.02 Use and Apply Appropriate Cryptographic Tools and Products
  • Symmetric Encryption Algorithms
  • Asymmetric Encryption Algorithms
  • One-Time Pad
  • Quantum Cryptography
  • Implementing Encryption Protocols
  • Wireless Encryption
  • Chapter 5: Public Key Infrastructure
  • Objective 5.01 Explain the Core Concepts of Public Key Infrastructure
  • Digital Certificates
  • Certificate Authorities
  • Trust Models
  • Key Management and Storage
  • Data Loss Prevention and Regulatory Compliance
  • Objective 1.03 Integrate with Third Parties
  • Interoperability Agreements
  • Privacy Considerations
  • Risk Awareness
  • Unauthorized Data Sharing
  • Data Ownerships
  • Data Backup
  • Verification of Adherence
  • Chapter 2: Security Training and Incident Response
  • Objective 2.01 Explain the Importance of Security-Related Awareness and Training
  • Accessing Policy Documentation
  • Data and Documentation Policies
  • Best Practices for User Habits
  • Objective 2.02 Analyze and Differentiate Among Types of Social Engineering Attacks
  • Phishing