Page 9 - StudyBook.pdf
P. 9
Foreword
This book’s primary goal is to help you prepare to take and pass CompTIA’s Security+ exam. Our sec-
ondary purpose in writing this book is to provide exam candidates like you with knowledge and skills that
go beyond the minimum requirements for passing the exam, and help to prepare you to work in the real
world of computer and network security.
What Is CompTIA Security+?
Computer and network security is the hottest subspecialty in the IT field today, and a number of product
vendors and vendor-neutral organizations offer certification exams to allow IT professionals to test their
knowledge and skills in basic security practices and standards.The Computing Technology Industry
Association (CompTIA) has positioned itself for the last two decades as a leading trade association devoted
to promoting standards and providing IT education. One of CompTIA’s primary roles has been develop-
ment of vendor-neutral certification exams to evaluate the skill sets of current and aspiring IT profes-
sionals.
CompTIA’s certifications are well regarded within the IT community, particularly as validation of
basic credentials that can be used by employers in screening candidates for entry-level positions. Microsoft,
Cisco, Novell, and other vendors allow the use of CompTIA certifications in some of their own certifica-
tion programs as electives or substitution for one of their exams. For example, the CompTIA A+ and
Network+ certifications can be applied toward Microsoft’s MCSA certification.
One advantage of the CompTIA exams that make them especially popular is the fact that unlike most
vendor-specific exams, they are considered to be lifetime certifications that do not expire; once you’ve
obtained a CompTIA certification, you never have to renew it.
Path to Security+
Only one exam is required to obtain the certification; however, it is a relatively comprehensive exam that
covers a wide range of security concepts, including:
■ General security concepts
■ Communications security
■ Infrastructure security
■ Basics of cryptography
■ Operational/organizational security
xv