Difference between revisions of "About Security+ Essentials"

From Techotopia
Jump to: navigation, search
Line 1: Line 1:
 
<table border="0" cellspacing="0" width="100%">
 
<table border="0" cellspacing="0" width="100%">
 
<tr>
 
<tr>
<td width="20%">[[Table of Contents|Previous]]<td align="center">[[Security+ Essentials|Table of Contents]]<td width="20%" align="right">[[Mandatory, Discretionary, Role and Rule Based Access Control|Next]]</td>
+
<td width="20%">[[Security+ Essentials|Previous]]<td align="center">[[Security+ Essentials|Table of Contents]]<td width="20%" align="right">[[Mandatory, Discretionary, Role and Rule Based Access Control|Next]]</td>
 
<tr>
 
<tr>
 
<td width="20%">Table of Contents<td align="center"><td width="20%" align="right">Mandatory, Discretionary, Role and Rule Based Access Control</td>
 
<td width="20%">Table of Contents<td align="center"><td width="20%" align="right">Mandatory, Discretionary, Role and Rule Based Access Control</td>

Revision as of 16:09, 3 March 2008

PreviousTable of ContentsNext
Table of ContentsMandatory, Discretionary, Role and Rule Based Access Control


Ever since people have begun to connect computer systems together (be it via local area networks, wide area networks or the internet) the issue of IT Security has become a matter of concern for everyone, from the home user to the small to medium business (SMB) to the global enterprise. Without a comprehensive information security strategy individuals and organization are at risk compromized confidential data and loss of business as a result of malicious damage to operating systems and data.

Security+ Essentials is designed to provide the knowledge needed by IT professionals to pass the CompTIA Security+ exam. That said, the book is also of considerable use to anyone with a need to understand the concepts involved in creating and maintaining a secure IT environment of any size.

Security+ Essentials is largely a platform agnostic book and as such many of the concepts described apply equally to a range of popular operating systems including Windows, Linux, MacOS X and UNIX.

On completion of this book it is intended that the reader will have a clear understanding of both the threats faced by IT infrastructures together with a basic understanding of the steps involved in planning, implementing and maintaining a comprehensive multi-layered IT security strategy.