Difference between revisions of "About Security+ Essentials"
Line 1: | Line 1: | ||
<table border="0" cellspacing="0" width="100%"> | <table border="0" cellspacing="0" width="100%"> | ||
<tr> | <tr> | ||
− | <td width="20%">[[ | + | <td width="20%">[[Security+ Essentials|Previous]]<td align="center">[[Security+ Essentials|Table of Contents]]<td width="20%" align="right">[[Mandatory, Discretionary, Role and Rule Based Access Control|Next]]</td> |
<tr> | <tr> | ||
<td width="20%">Table of Contents<td align="center"><td width="20%" align="right">Mandatory, Discretionary, Role and Rule Based Access Control</td> | <td width="20%">Table of Contents<td align="center"><td width="20%" align="right">Mandatory, Discretionary, Role and Rule Based Access Control</td> |
Revision as of 16:09, 3 March 2008
Previous | Table of Contents | Next |
Table of Contents | Mandatory, Discretionary, Role and Rule Based Access Control |
Ever since people have begun to connect computer systems together (be it via local area networks, wide area networks or the internet) the issue of IT Security has become a matter of concern for everyone, from the home user to the small to medium business (SMB) to the global enterprise. Without a comprehensive information security strategy individuals and organization are at risk compromized confidential data and loss of business as a result of malicious damage to operating systems and data.
Security+ Essentials is designed to provide the knowledge needed by IT professionals to pass the CompTIA Security+ exam. That said, the book is also of considerable use to anyone with a need to understand the concepts involved in creating and maintaining a secure IT environment of any size.
Security+ Essentials is largely a platform agnostic book and as such many of the concepts described apply equally to a range of popular operating systems including Windows, Linux, MacOS X and UNIX.
On completion of this book it is intended that the reader will have a clear understanding of both the threats faced by IT infrastructures together with a basic understanding of the steps involved in planning, implementing and maintaining a comprehensive multi-layered IT security strategy.