图书简介
A Sybex guide to Windows Security concepts, perfect for IT beginners Security is one of the most important components to every company’s computer network. That’s why the Security Fundamentals MTA Certification is so highly sought after. Filling IT positions is a top problem in today’s businesses, so this certification could be your first step toward a stable and lucrative IT career. Security Fundamentals is your guide to developing a strong foundational understanding of Windows security, so you can take your IT career to the next level and feel confident going into the certification exam. Security Fundamentals features approachable discussion of core security concepts and topics, and includes additional learning tutorials and tools. This book covers everything you need to know about security layers, authentication, authorization, security policies, and protecting your server and client. Each chapter closes with a quiz so you can test your knowledge before moving to the next section. Learn everything you need for the Security Fundamentals MTA Certification Understand core security principles, including security layers and network security Learn essential concepts in physical security, internet security, and wireless security Identify the different types of hardware firewalls and their characteristics Test your knowledge and practice for the exam with quiz questions in every chapter IT professionals looking to understand more about networking will gain the knowledge to effectively secure a client and server, and to confidently explain basic security concepts. Thanks to the tools and tips in this Sybex title, you will be able to apply your new IT security skills in real world situations and on exam day.
Introduction xix Lesson 1 Understanding Security Layers 1 Introducing Core Security Principles 3 Understanding Confidentiality 4 Understanding Integrity 4 Understanding Availability 5 Understanding the Principle of Least Privilege 7 Understanding Separation of Duties 9 Understanding an Attack Surface 10 Performing an Attack Surface Analysis 10 Understanding Social Engineering 12 Linking Cost with Security 13 Understanding Physical Security as the First Line of Defense 14 Understanding Site Security 14 Understanding Computer Security 19 Performing Threat Modeling 23 Skill Summary 25 Knowledge Assessment 27 Multiple Choice 27 Fill in the Blank 29 Matching and Identification 29 Build List 30 Business Case Scenarios 30 Scenario 1-1: Designing a Physical Security Solution 30 Scenario 1-2: Securing a Mobile Device 30 Scenario 1-3: Understanding Confidentiality, Integrity, and Availability 30 Scenario 1-4: Managing Social Engineering 30 Lesson 2 Understanding Authentication, Authorization, and Accounting 33 Starting Security with Authentication 35 Configuring Multifactor Authentication 36 Authentication Based on What a User Owns or Possesses 38 Authentication Based on a User’s Physical Traits 38 Introducing RADIUS and TACACS+ 39 Running Programs as an Administrator 40 Introducing Directory Services with Active Directory 41 Understanding Domain Controllers 42 Understanding NTLM 43 Understanding Kerberos 44 Using Organizational Units 44 Understanding Objects 46 Using Groups 49 Understanding Web Server Authentication 52 Comparing Rights and Permissions 52 Understanding NTFS 54 Using NTFS Permissions 54 Understanding Effective NTFS Permissions 56 Understanding Inheritance 60 Copying and Moving Files 62 Using Folder and File Owners 62 Sharing Drives and Folders 64 Share a Folder 64 Understanding Special Shares and Administrative Shares 66 Introducing the Registry 67 Access Registry Permissions 70 Using Encryption to Protect Data 70 Types of Encryption 71 Introducing Public Key Infrastructure (PKI) 72 Encrypting Email 78 Encrypting Files with EFS 79 Encrypting Disks in Windows 82 Understanding IPsec 87 Encrypting with VPN Technology 89 Introducing Smart Cards 92 Set Up a Virtual TPM Smart Card Environment 93 Create a Certificate Template 93 Create a TPM Virtual Smart Card 94 Enroll for the Certificate on the TPM Virtual Smart Card 94 Configuring Biometrics, Windows Hello, and Microsoft Passport 95 Set Up Windows Hello Facial Recognition 96 Set Up Windows Hello Fingerprint Reader 96 Using Auditing to Complete the Security Picture 97 Audit Files and Folders 100 Skill Summary 101 Knowledge Assessment 105 Multiple Choice 105 Fill in the Blank 107 Business Case Scenarios 108 Scenario 2-1: Understanding Biometrics 108 Scenario 2-2: Limiting Auditing 108 Scenario 2-3: Assigning NTFS Permissions 108 Scenario 2-4: Using EFS 108 Lesson 3 Understanding Security Policies 111 Using Password Policies to Enhance Security 113 Using Password Complexity to Make a Stronger Password 113 Using Account Lockout to Prevent Hacking 114 Examining Password Length 115 Using Password History to Enforce Security 115 Setting Time Between Password Changes 116 Using Password Group Policies to Enforce Password Security 118 Configuring and Applying Password Settings Objects 119 Establishing Password Procedures 121 Understanding Common Attack Methods 122 Protecting Domain User Account Passwords 125 Install Hyper-V and Isolated User Mode on Windows 10 126 Enable Device Guard and Credential Guard 126 Skill Summary 127 Knowledge Assessment 129 Multiple Choice 129 Fill in the Blank 131 Business Case Scenarios 131 Scenario 3-1: Understanding Long Passwords 131 Scenario 3-2: Using Keys and Passwords 132 Scenario 3-3: Managing User Accounts 132 Scenario 3-4: Configuring a Local Security Policy 132 Lesson 4 Understanding Network Security 133 Using Dedicated Firewalls to Protect a Network 135 Understanding the OSI Model 136 Types of Hardware Firewalls and Their Characteristics 140 Understanding When to Use a Hardware Firewall Instead of a Software Firewall 143 Understanding Stateful Inspection and Stateless Inspection 145 Using Isolation to Protect the Network 146 Understanding VLANs 146 Understanding Routing 148 Understanding Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) 154 Understanding Honeypots 155 Understanding DMZ 156 Understanding NAT 159 Understanding VPN 160 Understanding Other VPN Protocols 162 Understanding Server and Domain Isolation 164 Protecting Data with Protocol Security 165 Understanding Tunneling 166 Understanding DNS Security Extensions (DNSSEC) 167 Understanding Protocol Spoofing 168 Understanding Network Sniffing 168 Understanding Common Attack Methods 170 Understanding Denial-of-Service (DoS) Attacks 173 Securing the Wireless Network 175 Understanding Service Set IDentifier (SSID) 176 Understanding Keys 176 Understanding MAC Filters 178 Understanding the Advantages and Disadvantages of Specific Security Types 178 Skill Summary 179 Knowledge Assessment 182 Multiple Choice 182 Fill in the Blank 184 Business Case Scenarios 185 Scenario 4-1: Using Windows Firewall 185 Scenario 4-2: Using a Routing Table 185 Scenario 4-3: Using Ports 185 Scenario 4-4: Accessing and Configuring Wireless Settings 185 Lesson 5 Protecting the Server and Client 187 Protecting the Client Computer 189 Protecting Your Computer from Malware 189 Configuring Windows Updates 196 Understanding User Account Control (UAC) 200 Using Windows Firewall 203 Using Offline Files 207 Locking Down a Client Computer 207 Managing Client Security Using Windows Defender 208 Remove a Quarantined Item 210 Schedule a Windows Defender Scan 212 Protecting Your Email 213 Managing Spam 214 Email Spoofing 215 Relaying Email 216 Securing Internet Explorer 216 Understanding Cookies and Privacy Settings 216 Using Content Zones 219 Understanding Phishing and Pharming 222 Understanding Secure Sockets Layer (SSL) and Certificates 223 Configuring Microsoft Edge 223 Protecting Your Server 225 Separating Services 225 Using a Read-Only Domain Controller (RODC) 226 Hardening Servers 226 Understanding Secure Dynamic DNS 227 Using Security Baselines 227 Using Security Templates 228 Using Security Compliance Manager 232 Locking Down Devices to Run Only Trusted Applications 235 Access AppLocker 236 Create and Test an AppLocker Rule 238 Export the Local Policy 240 Import the Local Policy 240 Managing Windows Store Apps 241 Configuring the Windows Store 242 Implementing Windows Store Apps 244 Implementing Windows Store for Business 246 Skill Summary 248 Knowledge Assessment 251 Multiple Choice 251 Fill in the Blank 254 Business Case Scenarios 255 Scenario 5-1: Enforcing Physical Security 255 Scenario 5-2: Programming Backdoors 255 Scenario 5-3: Configuring a Windows Defender Quarantine 255 Scenario 5-4: Protecting Your Resources 255 Scenario 5-5: Reviewing Windows Updates 255 Appendix Answer Key 257 Lesson 1: Understanding Security Layers 258 Answers to Knowledge Assessment 258 Answers to Business Case Scenarios 259 Lesson 2: Understanding Authentication, Authorization, and Accounting 260 Answers to Knowledge Assessment 260 Answers to Business Case Scenarios 261 Lesson 3: Understanding Security Policies 263 Answers to Knowledge Assessment 263 Answers to Business Case Scenarios 264 Lesson 4: Understanding Network Security 266 Answers to Knowledge Assessment 266 Answers to Business Case Scenarios 267 Lesson 5: Protecting the Server and Client 270 Answers to Knowledge Assessment 270 Answers to Business Case Scenarios 271 Index 273
Trade Policy 买家须知
- 关于产品:
- ● 正版保障:本网站隶属于中国国际图书贸易集团公司,确保所有图书都是100%正版。
- ● 环保纸张:进口图书大多使用的都是环保轻型张,颜色偏黄,重量比较轻。
- ● 毛边版:即书翻页的地方,故意做成了参差不齐的样子,一般为精装版,更具收藏价值。
关于退换货:
- 由于预订产品的特殊性,采购订单正式发订后,买方不得无故取消全部或部分产品的订购。
- 由于进口图书的特殊性,发生以下情况的,请直接拒收货物,由快递返回:
- ● 外包装破损/发错货/少发货/图书外观破损/图书配件不全(例如:光盘等)
并请在工作日通过电话400-008-1110联系我们。
- 签收后,如发生以下情况,请在签收后的5个工作日内联系客服办理退换货:
- ● 缺页/错页/错印/脱线
关于发货时间:
- 一般情况下:
- ●【现货】 下单后48小时内由北京(库房)发出快递。
- ●【预订】【预售】下单后国外发货,到货时间预计5-8周左右,店铺默认中通快递,如需顺丰快递邮费到付。
- ● 需要开具发票的客户,发货时间可能在上述基础上再延后1-2个工作日(紧急发票需求,请联系010-68433105/3213);
- ● 如遇其他特殊原因,对发货时间有影响的,我们会第一时间在网站公告,敬请留意。
关于到货时间:
- 由于进口图书入境入库后,都是委托第三方快递发货,所以我们只能保证在规定时间内发出,但无法为您保证确切的到货时间。
- ● 主要城市一般2-4天
- ● 偏远地区一般4-7天
关于接听咨询电话的时间:
- 010-68433105/3213正常接听咨询电话的时间为:周一至周五上午8:30~下午5:00,周六、日及法定节假日休息,将无法接听来电,敬请谅解。
- 其它时间您也可以通过邮件联系我们:customer@readgo.cn,工作日会优先处理。
关于快递:
- ● 已付款订单:主要由中通、宅急送负责派送,订单进度查询请拨打010-68433105/3213。
本书暂无推荐
本书暂无推荐