CompTIA Security+ SY0-201 Video Mentor (Anglais) Broché – 15 avril 2010
|Neuf à partir de||Occasion à partir de|
Descriptions du produit
Présentation de l'éditeur
Learn exam essentials from the Expert
The fast, powerful way to prepare for your CompTIA Security+ exam!
Get all the hands-on training you need to pass the CompTIA Security+ exam, get certified, and move forward in your IT career! This easy-to-use DVD walks you through the skills and concept you’ll need to master and pass the Security+ SY0-201 exam. This DVD contains more than 5 hours of expert-led videos designed to build and test your knowledge of Security+ and a whole lot more!
Thorough coverage of the following topics:
- Understanding general cryptography concepts
- Creating symmetric and asymmetric keys and learning how to use them together
- Comparing protocol analyzers and statistical analyzers
- Understanding the benefits and limitations of Public Key Infrastructure (PKI) and certificates
- Reviewing the foundations of TCP/IP, including TCP and UDP protocols, ports and system services, and IPv6
- Examining IPsec, including its operational modes
- Mitigating against weak passwords and other network vulnerabilities
About the Shon Harris Security Series
This DVD package is part of a complete library of books, online services, and videos designed to help security professionals enhance their skills and prepare for their certification exams. Every product in this series reflects Shon Harris’s unsurpassed experience in teaching IT security professionals.
Detailed lessons: Each video begins with a lesson that covers Security+ concepts that will be demonstrated in the lab portions of the videos.
Lab examples: Walk through labs with the presenter to learn important setups and configurations.
Commands: Go beyond the graphical interface with important commands.
Biographie de l'auteur
Shon Harris is the president and owner of Logical Security, Inc., a security consultant, a former engineer in the Air Force’s Information Warfare unit, an instructor, and an author. She has authored two best-selling CISSP books, is a coauthor to the book, Gray Hat Hacking, and is the author of many articles and periodicals. Shon was recognized as one of the top 25 women in the Information Security field by Information Security magazine.
Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.
Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.
Détails sur le produit
Commentaires en ligne
Commentaires client les plus utiles sur Amazon.com (beta)
The first lesson on symmetric and asymmetric algorithms lets you appreciate the big differences and the comparative advantages of each. Relatively more time is spent on the asymmetric methods, which takes us into public key cryptography. Yes, this might seem like magic the first time you meet it, but it rests on the simple asymmetry between the computational cost of multiplying two [prime] numbers to get a resultant product and the cost of starting with that product and trying to find the primes that produced it. But from the videos the take home message is that you don't need to remember, or even understand in the first place, any intricate maths to follow how PKI is implemented.
The steganography lesson demonstrates how steg is fundamentally different from cryptography. As you will find from the lesson, cryptography is about hiding data by encrypting it; however the resultant encrypted bits are assumed to be known to an attacker to be encrypted. Whereas steg tries to hide the very existence of a secret by obscuring it in low order bits of another message [like an image].
Of all the lessons, the one on steg is really only for your general interest. In day to day computer security tasks, steg is rarely used or met. It's just something to be aware of, as a pedagogic construct.
There's not much mention of plenum, HVAC, CAT5 or that it's probably a good idea to lock-up the server/computer room, nor do they touch the Organizational Security Domain. And that's a good thing. Not that those things aren't important...it's just that those aren't the hardest concepts you are going to see on the test. The harder technical concepts are indeed, covered here, and very well. The labs are invaluable as you get a visual demonstration of the concepts, some in Windows and some in Linux.
I particularly like the Hacking Data Hiding with NTFS ADS lab and Passwords cracking with Cain demo. It's like having a private class available to you whenever you want.
The accompanying manual, slim though it might be is no light-weight. It is densely packed with truly helpful information, such as references to commands used in the labs, terminology and notes as to what exam domains and modules are being touched (primarily 2- Network Infrastructure and 5- Cryptography).
The ability to directly reference a relevant PDF version of the manual from within the course is a nice touch too.
Given the quality of instruction here, I am disappointed by the production values regarding audio as they are inexplicably low for an $85.00 MSRP DVD. Sounds sometimes like it was recorded over a satellite phone. There's a tinny whistling in a tunnel effect that's quite annoying... not to mention the breath "puffs" and hurried script reading. Don Keeber's rapid fire lesson delivery is evocative of being stuck in an hotel elevator with an insurance salesman from the planet Vulcan. Mike Lester, who presides over the labs (which are great hands-on demonstrations) is the complete opposite. His delivery is reminiscent of sitting in an amicable colleagues cube and getting instruction...complete with the "ugh, ugh, the, umms" and the fat fingered "oops" that go with it. As to Shon Harris, (who is a wonderful teacher and writer) she gives a 2 minute introduction and unfortunately, that's about it other than a few interjections here and there. I suppose you have to buy the CISSP course to actually get the mistress of Information Security herself. :-)
Please don't shy away, these gentlemen offer great expertise and they will teach you quite a bit. It's just they are hard to listen to sometimes. But fret not...there is a convenient pause button. I use it profusely to go over and repeat dialog that runs a bit fast paced and/or is mumbled. So, it's by no means a show stopper.
CompTIA Security+ SY0-201 Video Mentor is a very valuable adjunct to the later stages of your study schedule. I use it a lot and have dramatically clarified my understanding of the concepts covered.
One of my favorite areas on this DVD is the Steganography section. I appreciated the in-depth coverage it provided in the 40-minute lecture, in addition to providing a lab. This went into much better depth than I have seen with other resources, including the detailed discussion of how it works and numerous illustrations to emphasis the important points. As a security professional, I also loved the fact that an entire module was spent covering passwords. This is so often overlooked!
As seen by the list of topics, this DVD concentrates on the two most difficult yet important areas for Security+ candidates to understand: cryptography and networking. Shon Harris and her team have a real knack for taking such complex topics, breaking them down into understandable language, and then illustrating how they actually work in real life.
This DVD has an accompanying book with the high level concepts covered on the DVD, as well as each module has a PDF tab with the same information in soft copy. The Security+ Video Mentor is a very helpful tool for anyone studying for this certification (and also if you aren't!)
Detailed lessons: Each video begins with a lesson that covers Security+ concepts that will be demonstrated in the lab portions of the videos. Lab examples: Walk through labs with the presenter to learn important setups and configurations. Commands: Go beyond the graphical interface with important commands.
My recommendation is that you use this DVD as a quick introduction to the then study at least one traditional book on this exam. This could be a book by Shon Harris (who did this video presentation) or perhaps you'd rather get a book by a different author that would cover the same material but use different words, different presentations.
In addition, I did not understand why there was a lesson for Steganography. Was it more important than any other domains, i.e., Access Control, Assessment & Audit, Organizational Security, etc? Furthermore, there were only 65 pages rather than 96 pages as advertised.