tailieunhanh - CompTIA SY0-201 Security+ Exam Guide phần 1

Tổng an khái niệm i. Thuật ngữ bảo mật cơ bản ii. Khái niệm cơ bản an ninh iii. Truy cập điều khiển iv. Xác thực hoạt động tổ chức an ninh i. Chính sách, tiêu chuẩn, hướng dẫn, và thủ tục ii. An ninh Perimeter iii. Logic truy cập Controls iv. | SY0 - 201 CompTIA SY0-201 Security Exam Guide Version Leading The Way in IT Testing And Certification Tools Leading the way in IT testing and certification tools - 1 - SY0 - 201 Table of Contents 1. Security Concepts General Security Concepts i. Basic Security Terminology ii. Security Basics iii. Access Control iv. Authentication Operational Organizational Security i. Policies Standards Guidelines and Procedures ii. The Security Perimeter iii. Logical Access Controls iv. Access Control Policies v. Social Engineering vi. Phishing vii. Vishing viii. Shoulder Surfing ix. Dumpster Diving x. Hoaxes xi. Organizational Policies and Procedures xii. Security Policies xiii. Privacy xiv. Service Level Agreements xv. Human Resources Policies xvi. Code of Ethics 2. Cryptography and Applications Cryptography i. Algorithms ii. Hashing iii. SHA iv. Message Digest v. Hashing Summary ẠỊẠ vi. Symmetric Encryption vii. DES viii. 3DES ix. AES x. CAST xi. RC xii. Blowfish Leading the way in IT testing and certification tools - 2 - SY0 - 201 xiii. IDEA xiv. Symmetric Encryption Summary xv. Asymmetric Encryption xvi. RSA xvii. Diffie-Hellman xviii. ElGamal xix. ECC xx. Asymmetric Encryption Summary xxi. Steganography xxii. Cryptography Algorithm Use xxiii. Confidentiality xxiv. Integrity xxv. Nonrepudiation xxvi. Authentication xxvii. Digital Signatures xxviii. Key Escrow xxix. Cryptographic Applications Public Key Infrastructure i. The Basics of Public Key Infrastructures ii. Certificate Authorities iii. Registration Authorities iv. Local Registration Authorities v. Certificate Repositories vi. Trust and Certificate Verification vii. Digital Certificates viii. Certificate Attributes ix. Certificate Extensions x. Certificate Lifecycles xi. Centralized or Decentralized Infrastructures xii. Hardware Storage Devices xiii. Private Key Protection xiv. Key Recovery xv. Key Escrow xvi. Public Certificate Authorities xvii. In-house .