CompTIA Security+: Securing Networks
By Adil Ahmed
()
About this ebook
This is the 3rd installed of the CompTIA Security+ examination. This book will cover topics relevant to the exam on Securing Networks.
Related to CompTIA Security+
Related ebooks
Online Hacker Survival Guide Rating: 0 out of 5 stars0 ratingsCybersecurity Design Principles: Building Secure Resilient Architecture Rating: 0 out of 5 stars0 ratingsCISSP:Cybersecurity Operations and Incident Response: Digital Forensics with Exploitation Frameworks & Vulnerability Scans Rating: 0 out of 5 stars0 ratingsPython for Cybersecurity Cookbook: 80+ practical recipes for detecting, defending, and responding to Cyber threats (English Edition) Rating: 0 out of 5 stars0 ratingsComptia Network+ V6 Study Guide - Indie Copy Rating: 0 out of 5 stars0 ratingsA Big Security Fix and Performance Manual: The Essential Guide to Computer Security & Performance Rating: 0 out of 5 stars0 ratingsThe Quick Guide to Cloud Computing and Cyber Security Rating: 4 out of 5 stars4/5Security+ Boot Camp Study Guide Rating: 5 out of 5 stars5/5KALI LINUX: Mastering the Art of Ethical Hacking and Penetration Testing (2023 Guide) Rating: 0 out of 5 stars0 ratingsCyber Security for Beginners: How to Become a Cybersecurity Professional Without a Technical Background (2022 Guide for Newbies) Rating: 0 out of 5 stars0 ratingsCybersecurity for Beginners : Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide: 1 Rating: 0 out of 5 stars0 ratingsCybersecurity Enforcement and Monitoring Solutions: Enhanced Wireless, Mobile and Cloud Security Deployment Rating: 0 out of 5 stars0 ratingsFootprinting, Reconnaissance, Scanning and Enumeration Techniques of Computer Networks Rating: 0 out of 5 stars0 ratingsBackTrack: Testing Wireless Network Security Rating: 0 out of 5 stars0 ratingsBlind Spot: Smartphone and Computer Personal Security Guide Rating: 3 out of 5 stars3/5CompTIA Security +: Malware and Malware Infections Rating: 0 out of 5 stars0 ratingsCompTIA Security+: Network Attacks Rating: 5 out of 5 stars5/5Cyber Essentials: A guide to the Cyber Essentials and Cyber Essentials Plus certifications Rating: 0 out of 5 stars0 ratingsTCP/IP: Network+ Protocols And Campus LAN Switching Fundamentals Rating: 0 out of 5 stars0 ratings(ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests Rating: 0 out of 5 stars0 ratingsSecurity Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills Rating: 3 out of 5 stars3/5Comptia+ Network Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Practice Questions Rating: 0 out of 5 stars0 ratingsIt Strategies in the Post-Pandemic Era: Closed Loop Lifecycle Planning© Series Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Review Guide: Exam N10-007 Rating: 0 out of 5 stars0 ratingsHack Attacks Denied: A Complete Guide to Network Lockdown Rating: 4 out of 5 stars4/5Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit Rating: 3 out of 5 stars3/5
Computers For You
Mastering ChatGPT: 21 Prompts Templates for Effortless Writing Rating: 5 out of 5 stars5/5SQL QuickStart Guide: The Simplified Beginner's Guide to Managing, Analyzing, and Manipulating Data With SQL Rating: 4 out of 5 stars4/5How to Create Cpn Numbers the Right way: A Step by Step Guide to Creating cpn Numbers Legally Rating: 4 out of 5 stars4/5Creating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5Deep Search: How to Explore the Internet More Effectively Rating: 5 out of 5 stars5/5Grokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5CompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61 Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Practice Questions Rating: 2 out of 5 stars2/5The ChatGPT Millionaire Handbook: Make Money Online With the Power of AI Technology Rating: 0 out of 5 stars0 ratingsNetwork+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Ultimate Guide to Mastering Command Blocks!: Minecraft Keys to Unlocking Secret Commands Rating: 5 out of 5 stars5/5Procreate for Beginners: Introduction to Procreate for Drawing and Illustrating on the iPad Rating: 0 out of 5 stars0 ratingsPractical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5ChatGPT Ultimate User Guide - How to Make Money Online Faster and More Precise Using AI Technology Rating: 0 out of 5 stars0 ratingsAP Computer Science Principles Premium, 2024: 6 Practice Tests + Comprehensive Review + Online Practice Rating: 0 out of 5 stars0 ratingsChildhood Unplugged: Practical Advice to Get Kids Off Screens and Find Balance Rating: 0 out of 5 stars0 ratingsThe Professional Voiceover Handbook: Voiceover training, #1 Rating: 5 out of 5 stars5/5Dark Aeon: Transhumanism and the War Against Humanity Rating: 5 out of 5 stars5/5Elon Musk Rating: 4 out of 5 stars4/5Master Builder Roblox: The Essential Guide Rating: 4 out of 5 stars4/5101 Awesome Builds: Minecraft® Secrets from the World's Greatest Crafters Rating: 4 out of 5 stars4/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5
Reviews for CompTIA Security+
0 ratings0 reviews
Book preview
CompTIA Security+ - Adil Ahmed
Introduction
In this book, we're going to talk about securing your wired and wireless networks. We're going to start out with wired network devices, things like switches and routers, and then we'll move into the cabling that helps put all these networks together.
After that, we're going to start talking about wireless networks, and how we can better secure them and all the different types of attacks that exist for wireless networks.
So, it's really important to understand how to secure your networks properly so attackers can't do this to you.
Now, finally, we're going to round out this section by covering other types of wireless technology in addition to Wi-Fi, things like RFID, near-field communications, Bluetooth, satellite communication, GPS, cellular, and others.
So, let's get started.
Securing Network Devices
Network devices include things like switches, routers, firewalls, IDS, IPS, and more. Each of these different devices has its own vulnerabilities that have to be addressed. But for the Security+ exam, we're going to focus on the most common vulnerabilities across all of these different devices.
The first vulnerability we're going to talk about is default accounts. These are accounts that exist on a device straight out of the box when you buy it. So, for example, if you buy a small office, home office wireless access point, like a Linksys or a D-Link, or something like that, it's going to have some accounts already established on it. It might have one like admin or administrator or user, or something of that nature.
All of these default accounts are very easy to figure out and very easy to guess. And so, it's important for you to actually change these names so that they're not something that an attacker can easily guess. And then, all they have to do is guess your password.
Now, this applies to your organizations, as well. You want to make sure that your naming schemes aren't really easy to guess. Unfortunately, though, most organizations are going to use a common naming scheme for all of their users.
For example, most organizations like to use first name dot last name. So, if your name was Adam Ryan, you're Adam.Ryan@yourcompany.com. This makes for a great, normal, easy to understand naming scheme. That makes operations very easy.
But it also makes it fairly easy to guess.
Because if I see that Adam.Ryan@whatever.com is one email, then I can probably guess that Susan.Smith is also there. Or whoever else