Info
- SY0-701
- 750/900 to pass
- 90 min, max 90 questions
- Syllabus listed: https://assets.ctfassets.net/82ripq7fjls2/6TYWUym0Nudqa8nGEnegjG/0f9b974d3b1837fe85ab8e6553f4d623/CompTIA-Security-Plus-SY0-701-Exam-Objectives.pdf
- Prof messer video
Chapters
Chapter 1
1.1
1.2
- Confidentiality Integrity Availability Triad
- Non-Repudiation
- AAA
- CA
- Authorization Model
- Gap Analysis
- Zero Trust Security
- Physical Security
- Deception and Disruption
1.3
1.4
- Public Key Infrastructure
- Encryption Levels
- Asymmetric Cryptography
- Symmetric Cryptography
- Homomorphic Encryption
- TPM
- HSM
- Key Management System
- Secure Enclave
- Obfuscation
- Steganography
- Tokenization Obfuscation
- Data Masking
- Hash
- Salting
- Digital Signature
- Key Stretching
- Blockchain
- Digital Certificate
- Self Encrypting Device
- GNU Privacy Guard
- AES
- Key Distribution Center
Chapter 2
2.1
2.2
2.3
2.4
- Malware
- Physical Security Attacks
- Network Security
- Application Security
- Cryptography Security
- Password Cracking
- Indicator of Attack
2.5
Chapter 3
3.1
- Cloud Ownership Types
- Cloud Service Types
- Cloud Responsibility Matrix
- Maintenance Overhead
- Third Party Vendors
- Infrastructure as Code
- Serverless
- Microservices
- OSI Model
- Air Gapped Network
- Network Segmentation
- SDN
- On Premise
- Centralized
- Decentralized
- Containers
- Virtualization
- IoT
- ICS
- SCADA
- Real-Time Operating System
- Embedded Device
- High Availability
- Infrastructure Considerations
3.2
3.3
- Network Infrastructure Considerations
- Security Zone
- Attack Surface
- Network Infrastructure Considerations
- Failure Mode
- Device Attribute
- Jump Server
- Proxy Server
- Port Security
- Firewall
- VPN
- SSH
- RDP
- Tunnel
- SDN
- Secure Access Service Edge
- Network Security Controls
3.4
- Regulated Data
- Intellectual Property
- Data
- Privacy Regulations
- Data Classification Pyramid
- Data Sovereignty
- Geolocation
- Data Protection
3.5
Chapter 4
4.1
- Security Baseline
- Device Hardening
- Site Survey
- WIFI Heat Map
- MDM
- Mobile Device Security
- WPS
- Captive Portal
- Pre-Shared Key
- Bluetooth Low Energy
- Bluejacking
- WPA
- RADIUS
- WEP
- TKIP
- Counter Mode with Cipher Block Chaining Message Authentication Code Protocol
- PEAP
- AppSec
- Application Monitoring
- Regression Testing
4.2
4.3
- Vulnerability Scan
- Security Content Automation Protocol
- Static Analysis
- Dynamic Analysis
- CVE
- NVD
- Threat Feed
- OSINT
- STIX
- TAXII
- SHODAN
- ISO
- Darknet
- Penetration Testing
- Bug Bounty
- System Audit
- CVE
- Common Vulnerability Scoring System
- Security Remediation
- Security Validation
- Penetration Test Report
- Vulnerability Report
4.4
- Logging
- System Monitoring
- Application Monitoring
- Infrastructure Monitoring
- SNMP
- Network Management System
- Network Intrusion Detection System
- NIPS
- Log Aggregration
- Alerting
- Scanning
- Vulnerability Assessment
- Reporting
- Archiving
- SOC
- NetFlow
4.5
- Firewall
- Port
- HIPS
- HIDS
- OT
- Web Based Filtering
- OS Security
- Protocol
- DNS Filtering
- MIME
- PGP
- DMARC
- DKIM
- SPF
- Secure Email Gateway
- File Integrity Monitoring
- NAC
- EDR
- XDR
- User Behavior Analytics
4.6
- AD
- Kerberos
- NT LAN Manager
- Authentication
- OpenID
- OAuth
- Federated
- SAML
- SSO
- Interoperability
- Identity Attestation
- Access Control
- MFA
- Hard Authentication
- Soft Authentication
- Authentication Factors
- MFA
- Security Token
- Strong Password
- Password Manager
- Passwordless
- PAM
4.7
4.8
- IR
- Incident Response Process
- Attack Framework
- Security Awareness
- Tabletop Exercise
- Root Cause Analysis
- Threat Hunting
- Digital Forensics
- Legal Hold
- Chain of Custody
- Order of Volaility
- E-Discovery
- Right to Audit Clause
4.9
Chapter 5
5.1
- Guideline
- Policy
- ISO
- IEC
- NIST
- PCI DSS
- Password Standards
- Access Control Standards
- Physical Security Standards
- Encryption Standards
- Change Management Process
- Onboarding Process
- Offboarding Process
- Communication Playbook
- External Considerations
- Monitoring and Revision
- Governance Structure
- Data
5.2
- Risk
- Threat
- Vulnerability
- Risk Assessment
- Risk Analysis
- Calculating Equipment Cost
- Risk Register
- Risk Appetite
- Risk Management
- Risk Reporting
- Business Impact Analysis