SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Downloaden Sie, um offline zu lesen
CompTIA Security+ Certification Exam Objectives v. 7 1 of 24
Copyright 2013 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
Certification Exam
Objectives: SY0-401
INTRODUCTION
The CompTIA Security+ Certification is a vendor neutral credential. The CompTIA Security+
exam is an internationally recognized validation of foundation-level security skills and knowledge,
and is used by organizations and security professionals around the globe.
The CompTIA Security+ exam will certify that the successful candidate has the knowledge and
skills required to identify risk, to participate in risk mitigation activities, and to provide
infrastructure, application, information, and operational security. In addition, the successful
candidate will apply security controls to maintain confidentiality, integrity, and availability, identify
appropriate technologies and products, troubleshoot security events and incidents, and operate
with an awareness of applicable policies, laws, and regulations.
The CompTIA Security+ Certification is aimed at an IT security professional who has:
 A minimum of 2 years experience in IT administration with a focus on security
 Day to day technical information security experience
 Broad knowledge of security concerns and implementation including the topics in the
domain list below
CompTIA Security+ is accredited by ANSI to show compliance with the ISO 17024 Standard and,
as such, undergoes regular reviews and updates to the exam objectives. The following CompTIA
Security+ objectives reflect the subject areas in this edition of this exam, and result from subject
matter expert workshops and industry-wide survey results regarding the skills and knowledge
required of an information security professional with two years of experience.
This examination blueprint includes domain weighting, test objectives, and example content.
Example topics and concepts are included to clarify the test objectives and should not be
construed as a comprehensive listing of all the content of this examination.
The table below lists the domain areas measured by this examination and the approximate extent
to which they are represented in the examination:
Domain % of Examination
1.0 Network Security 20%
2.0 Compliance and Operational Security 18%
3.0 Threats and Vulnerabilities 20%
4.0 Application, Data and Host Security 15%
5.0 Access Control and Identity Management 15%
6.0 Cryptography 12%
Total 100%
CompTIA Security+ Certification Exam Objectives v. 7 2 of 24
Copyright 2013 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
CompTIA Authorized Materials Use Policy
CompTIA Certifications, LLC is not affiliated with and does not authorize, endorse or condone utilizing
any content provided by unauthorized third-party training sites, aka 'brain dumps'. Individuals who utilize
such materials in preparation for any CompTIA examination will have their certifications revoked and be
suspended from future testing in accordance with the CompTIA Candidate Agreement. In an effort to more
clearly communicate CompTIA’s exam policies on use of unauthorized study materials, CompTIA directs
all certification candidates to the CompTIA Certification Exam Policies webpage:
http://certification.comptia.org/Training/testingcenters/policies.aspx
Please review all CompTIA policies before beginning the study process for any CompTIA exam.
Candidates will be required to
abide by the CompTIA Candidate Agreement
(http://certification.comptia.org/Training/testingcenters/policies/agreement.aspx) at the time of exam
delivery.
If a candidate has a question as to whether study materials are considered unauthorized (aka brain dumps),
he/she should perform a search using CertGuard's
engine, found here:
http://www.certguard.com/search.asp
Or verify against this list:
http://certification.comptia.org/Training/testingcenters/policies/unauthorized.aspx
**Note: The lists of examples provided in bulleted format below each objective are not exhaustive lists.
Other examples of technologies, processes or tasks pertaining to each objective may also be included on the
exam although not listed or covered in this objectives document.
CompTIA is constantly reviewing the content of our exams and updating test questions to be sure our
exams are current and the security of the questions is protected. When necessary, we will publish updated
exams based on existing exam objectives. Please know that all related exam preparation materials will still
be valid.
CompTIA Security+ Certification Exam Objectives v. 7 3 of 24
Copyright 2013 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
1.0 Network Security
1.1 Implement security configuration parameters on network devices and other
technologies.
 Firewalls
 Routers
 Switches
 Load Balancers
 Proxies
 Web security gateways
 VPN concentrators
 NIDS and NIPS
o Behavior based
o Signature based
o Anomaly based
o Heuristic
 Protocol analyzers
 Spam filter
 UTM security appliances
o URL filter
o Content inspection
o Malware inspection
 Web application firewall vs. network firewall
 Application aware devices
o Firewalls
o IPS
o IDS
o Proxies
1.2 Given a scenario, use secure network administration principles.
 Rule-based management
 Firewall rules
 VLAN management
 Secure router configuration
 Access control lists
 Port Security
 802.1x
 Flood guards
 Loop protection
 Implicit deny
 Network separation
 Log analysis
 Unified Threat Management
1.3 Explain network design elements and components.
 DMZ
 Subnetting
 VLAN
 NAT
 Remote Access
 Telephony
CompTIA Security+ Certification Exam Objectives v. 7 4 of 24
Copyright 2013 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
 NAC
 Virtualization
 Cloud Computing
o Platform as a Service
o Software as a Service
o Infrastructure as a Service
o Private
o Public
o Hybrid
o Community
 Layered security / Defense in depth
1.4 Given a scenario, implement common protocols and services.
 Protocols
o IPSec
o SNMP
o SSH
o DNS
o TLS
o SSL
o TCP/IP
o FTPS
o HTTPS
o SCP
o ICMP
o IPv4
o IPv6
o iSCSI
o Fibre Channel
o FCoE
o FTP
o SFTP
o TFTP
o TELNET
o HTTP
o NetBIOS
 Ports
o 21
o 22
o 25
o 53
o 80
o 110
o 139
o 143
o 443
o 3389
 OSI relevance
1.5 Given a scenario, troubleshoot security issues related to wireless networking.
 WPA
 WPA2
 WEP
CompTIA Security+ Certification Exam Objectives v. 7 5 of 24
Copyright 2013 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
 EAP
 PEAP
 LEAP
 MAC filter
 Disable SSID broadcast
 TKIP
 CCMP
 Antenna Placement
 Power level controls
 Captive portals
 Antenna types
 Site surveys
 VPN (over open wireless)
2.0 Compliance and Operational Security
2.1 Explain the importance of risk related concepts.
 Control types
o Technical
o Management
o Operational
 False positives
 False negatives
 Importance of policies in reducing risk
o Privacy policy
o Acceptable use
o Security policy
o Mandatory vacations
o Job rotation
o Separation of duties
o Least privilege
 Risk calculation
o Likelihood
o ALE
o Impact
o SLE
o ARO
o MTTR
o MTTF
o MTBF
 Quantitative vs. qualitative
 Vulnerabilities
 Threat vectors
 Probability / threat likelihood
 Risk-avoidance, transference, acceptance, mitigation, deterrence
 Risks associated with Cloud Computing and Virtualization
 Recovery time objective and recovery point objective
2.2 Summarize the security implications of integrating systems and data with third
parties.
 On-boarding/off-boarding business partners
 Social media networks and/or applications
 Interoperability agreements
CompTIA Security+ Certification Exam Objectives v. 7 6 of 24
Copyright 2013 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
o SLA
o BPA
o MOU
o ISA
 Privacy considerations
 Risk awareness
 Unauthorized data sharing
 Data ownership
 Data backups
 Follow security policy and procedures
 Review agreement requirements to verify compliance and performance
standards
2.3 Given a scenario, implement appropriate risk mitigation strategies.
 Change management
 Incident management
 User rights and permissions reviews
 Perform routine audits
 Enforce policies and procedures to prevent data loss or theft
 Enforce technology controls
o Data Loss Prevention (DLP)
2.4 Given a scenario, implement basic forensic procedures.
 Order of volatility
 Capture system image
 Network traffic and logs
 Capture video
 Record time offset
 Take hashes
 Screenshots
 Witnesses
 Track man hours and expense
 Chain of custody
 Big Data analysis
2.5 Summarize common incident response procedures.
 Preparation
 Incident identification
 Escalation and notification
 Mitigation steps
 Lessons learned
 Reporting
 Recovery/reconstitution procedures
 First responder
 Incident isolation
o Quarantine
o Device removal
 Data breach
 Damage and loss control
2.6 Explain the importance of security related awareness and training.
 Security policy training and procedures
 Role-based training
CompTIA Security+ Certification Exam Objectives v. 7 7 of 24
Copyright 2013 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
 Personally identifiable information
 Information classification
o High
o Medium
o Low
o Confidential
o Private
o Public
 Data labeling, handling and disposal
 Compliance with laws, best practices and standards
 User habits
o Password behaviors
o Data handling
o Clean desk policies
o Prevent tailgating
o Personally owned devices
 New threats and new security trends/alerts
o New viruses
o Phishing attacks
o Zero-day exploits
 Use of social networking and P2P
 Follow up and gather training metrics to validate compliance and security
posture
2.7 Compare and contrast physical security and environmental controls.
 Environmental controls
o HVAC
o Fire suppression
o EMI shielding
o Hot and cold aisles
o Environmental monitoring
o Temperature and humidity controls
 Physical security
o Hardware locks
o Mantraps
o Video Surveillance
o Fencing
o Proximity readers
o Access list
o Proper lighting
o Signs
o Guards
o Barricades
o Biometrics
o Protected distribution (cabling)
o Alarms
o Motion detection
 Control types
o Deterrent
o Preventive
o Detective
o Compensating
o Technical
o Administrative
CompTIA Security+ Certification Exam Objectives v. 7 8 of 24
Copyright 2013 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
2.8 Summarize risk management best practices.
 Business continuity concepts
o Business impact analysis
o Identification of critical systems and components
o Removing single points of failure
o Business continuity planning and testing
o Risk assessment
o Continuity of operations
o Disaster recovery
o IT contingency planning
o Succession planning
o High availability
o Redundancy
o Tabletop exercises
 Fault tolerance
o Hardware
o RAID
o Clustering
o Load balancing
o Servers
 Disaster recovery concepts
o Backup plans/policies
o Backup execution/frequency
o Cold site
o Hot site
o Warm site
2.9 Given a scenario, select the appropriate control to meet the goals of security.
 Confidentiality
o Encryption
o Access controls
o Steganography
 Integrity
o Hashing
o Digital signatures
o Certificates
o Non-repudiation
 Availability
o Redundancy
o Fault tolerance
o Patching
 Safety
o Fencing
o Lighting
o Locks
o CCTV
o Escape plans
o Drills
o Escape routes
o Testing controls
3.0 Threats and Vulnerabilities
3.1 Explain types of malware.
CompTIA Security+ Certification Exam Objectives v. 7 9 of 24
Copyright 2013 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
 Adware
 Virus
 Spyware
 Trojan
 Rootkits
 Backdoors
 Logic bomb
 Botnets
 Ransomware
 Polymorphic malware
 Armored virus
3.2 Summarize various types of attacks.
 Man-in-the-middle
 DDoS
 DoS
 Replay
 Smurf attack
 Spoofing
 Spam
 Phishing
 Spim
 Vishing
 Spear phishing
 Xmas attack
 Pharming
 Privilege escalation
 Malicious insider threat
 DNS poisoning and ARP poisoning
 Transitive access
 Client-side attacks
 Password attacks
o Brute force
o Dictionary attacks
o Hybrid
o Birthday attacks
o Rainbow tables
 Typo squatting/URL hijacking
 Watering hole attack
3.3 Summarize social engineering attacks and the associated effectiveness with
each attack.
 Shoulder surfing
 Dumpster diving
 Tailgating
 Impersonation
 Hoaxes
 Whaling
 Vishing
 Principles (reasons for effectiveness)
o Authority
o Intimidation
o Consensus/Social proof
CompTIA Security+ Certification Exam Objectives v. 7 10 of 24
Copyright 2013 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
o Scarcity
o Urgency
o Familiarity/liking
o Trust
3.4 Explain types of wireless attacks.
 Rogue access points
 Jamming/Interference
 Evil twin
 War driving
 Bluejacking
 Bluesnarfing
 War chalking
 IV attack
 Packet sniffing
 Near field communication
 Replay attacks
 WEP/WPA attacks
 WPS attacks
3.5 Explain types of application attacks.
 Cross-site scripting
 SQL injection
 LDAP injection
 XML injection
 Directory traversal/command injection
 Buffer overflow
 Integer overflow
 Zero-day
 Cookies and attachments
 LSO (Locally Shared Objects)
 Flash Cookies
 Malicious add-ons
 Session hijacking
 Header manipulation
 Arbitrary code execution / remote code execution
3.6 Analyze a scenario and select the appropriate type of mitigation and deterrent
techniques.
 Monitoring system logs
o Event logs
o Audit logs
o Security logs
o Access logs
 Hardening
o Disabling unnecessary services
o Protecting management interfaces and applications
o Password protection
o Disabling unnecessary accounts
 Network security
o MAC limiting and filtering
o 802.1x
o Disabling unused interfaces and unused application service ports
CompTIA Security+ Certification Exam Objectives v. 7 11 of 24
Copyright 2013 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
o Rogue machine detection
 Security posture
o Initial baseline configuration
o Continuous security monitoring
o Remediation
 Reporting
o Alarms
o Alerts
o Trends
 Detection controls vs. prevention controls
o IDS vs. IPS
o Camera vs. guard
3.7 Given a scenario, use appropriate tools and techniques to discover security
threats and vulnerabilities.
 Interpret results of security assessment tools
 Tools
o Protocol analyzer
o Vulnerability scanner
o Honeypots
o Honeynets
o Port scanner
o Passive vs. active tools
o Banner grabbing
 Risk calculations
o Threat vs. likelihood
 Assessment types
o Risk
o Threat
o Vulnerability
 Assessment technique
o Baseline reporting
o Code review
o Determine attack surface
o Review architecture
o Review designs
3.8 Explain the proper use of penetration testing versus vulnerability scanning.
 Penetration testing
o Verify a threat exists
o Bypass security controls
o Actively test security controls
o Exploiting vulnerabilities
 Vulnerability scanning
o Passively testing security controls
o Identify vulnerability
o Identify lack of security controls
o Identify common misconfigurations
o Intrusive vs. non-intrusive
o Credentialed vs. non-credentialed
o False positive
 Black box
 White box
 Gray box
CompTIA Security+ Certification Exam Objectives v. 7 12 of 24
Copyright 2013 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
4.0 Application, Data and Host Security
4.1 Explain the importance of application security controls and techniques.
 Fuzzing
 Secure coding concepts
o Error and exception handling
o Input validation
 Cross-site scripting prevention
 Cross-site Request Forgery (XSRF) prevention
 Application configuration baseline (proper settings)
 Application hardening
 Application patch management
 NoSQL databases vs. SQL databases
 Server-side vs. Client-side validation
4.2 Summarize mobile security concepts and technologies.
 Device security
o Full device encryption
o Remote wiping
o Lockout
o Screen-locks
o GPS
o Application control
o Storage segmentation
o Asset tracking
o Inventory control
o Mobile device management
o Device access control
o Removable storage
o Disabling unused features
 Application security
o Key management
o Credential management
o Authentication
o Geo-tagging
o Encryption
o Application whitelisting
o Transitive trust/authentication
 BYOD concerns
o Data ownership
o Support ownership
o Patch management
o Antivirus management
o Forensics
o Privacy
o On-boarding/off-boarding
o Adherence to corporate policies
o User acceptance
o Architecture/infrastructure considerations
o Legal concerns
o Acceptable use policy
o On-board camera/video
CompTIA Security+ Certification Exam Objectives v. 7 13 of 24
Copyright 2013 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
4.3 Given a scenario, select the appropriate solution to establish host security.
 Operating system security and settings
 OS hardening
 Anti-malware
o Antivirus
o Anti-spam
o Anti-spyware
o Pop-up blockers
 Patch management
 White listing vs. black listing applications
 Trusted OS
 Host-based firewalls
 Host-based intrusion detection
 Hardware security
o Cable locks
o Safe
o Locking cabinets
 Host software baselining
 Virtualization
o Snapshots
o Patch compatibility
o Host availability/elasticity
o Security control testing
o Sandboxing
4.4 Implement the appropriate controls to ensure data security.
 Cloud storage
 SAN
 Handling Big Data
 Data encryption
o Full disk
o Database
o Individual files
o Removable media
o Mobile devices
 Hardware based encryption devices
o TPM
o HSM
o USB encryption
o Hard drive
 Data in-transit, Data at-rest, Data in-use
 Permissions/ACL
 Data policies
o Wiping
o Disposing
o Retention
o Storage
4.5 Compare and contrast alternative methods to mitigate security risks in static
environments.
 Environments
o SCADA
o Embedded (Printer, Smart TV, HVAC control)
o Android
CompTIA Security+ Certification Exam Objectives v. 7 14 of 24
Copyright 2013 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
o iOS
o Mainframe
o Game consoles
o In-vehicle computing systems
 Methods
o Network segmentation
o Security layers
o Application firewalls
o Manual updates
o Firmware version control
o Wrappers
o Control redundancy and diversity
5.0 Access Control and Identity Management
5.1 Compare and contrast the function and purpose of authentication services.
 RADIUS
 TACACS+
 Kerberos
 LDAP
 XTACACS
 SAML
 Secure LDAP
5.2 Given a scenario, select the appropriate authentication, authorization or
access control.
 Identification vs. authentication vs. authorization
 Authorization
o Least privilege
o Separation of duties
o ACLs
o Mandatory access
o Discretionary access
o Rule-based access control
o Role-based access control
o Time of day restrictions
 Authentication
o Tokens
o Common access card
o Smart card
o Multifactor authentication
o TOTP
o HOTP
o CHAP
o PAP
o Single sign-on
o Access control
o Implicit deny
o Trusted OS
 Authentication factors
o Something you are
o Something you have
o Something you know
o Somewhere you are
CompTIA Security+ Certification Exam Objectives v. 7 15 of 24
Copyright 2013 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
o Something you do
 Identification
o Biometrics
o Personal identification verification card
o Username
 Federation
 Transitive trust/authentication
5.3 Install and configure security controls when performing account management,
based on best practices.
 Mitigate issues associated with users with multiple account/roles and/or
shared accounts
 Account policy enforcement
o Credential management
o Group policy
o Password complexity
o Expiration
o Recovery
o Disablement
o Lockout
o Password history
o Password reuse
o Password length
o Generic account prohibition
 Group based privileges
 User assigned privileges
 User access reviews
 Continuous monitoring
6.0 Cryptography
6.1 Given a scenario, utilize general cryptography concepts.
 Symmetric vs. asymmetric
 Session keys
 In-band vs. out-of-band key exchange
 Fundamental differences and encryption methods
o Block vs. stream
 Transport encryption
 Non-repudiation
 Hashing
 Key escrow
 Steganography
 Digital signatures
 Use of proven technologies
 Elliptic curve and quantum cryptography
 Ephemeral key
 Perfect forward secrecy
6.2 Given a scenario, use appropriate cryptographic methods.
 WEP vs. WPA/WPA2 and preshared key
 MD5
 SHA
CompTIA Security+ Certification Exam Objectives v. 7 16 of 24
Copyright 2013 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
 RIPEMD
 AES
 DES
 3DES
 HMAC
 RSA
 Diffie-Hellman
 RC4
 One-time pads
 NTLM
 NTLMv2
 Blowfish
 PGP/GPG
 TwoFish
 DHE
 ECDHE
 CHAP
 PAP
 Comparative strengths and performance of algorithms
 Use of algorithms/protocols with transport encryption
o SSL
o TLS
o IPSec
o SSH
o HTTPS
 Cipher suites
o Strong vs. weak ciphers
 Key stretching
o PBKDF2
o Bcrypt
6.3 Given a scenario, use appropriate PKI, certificate management and associated
components.
 Certificate authorities and digital certificates
o CA
o CRLs
o OCSP
o CSR
 PKI
 Recovery agent
 Public key
 Private key
 Registration
 Key escrow
 Trust models
CompTIA Security+ Certification Exam Objectives v. 7 17 of 24
Copyright 2013 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
SECURITY+ ACRONYMS
3DES – Triple Digital Encryption Standard
AAA – Authentication, Authorization, and Accounting
ACL – Access Control List
AES - Advanced Encryption Standard
AES256 – Advanced Encryption Standards 256bit
AH - Authentication Header
ALE - Annualized Loss Expectancy
AP - Access Point
API - Application Programming Interface
ASP - Application Service Provider
ARO - Annualized Rate of Occurrence
ARP - Address Resolution Protocol
AUP - Acceptable Use Policy
BAC – Business Availability Center
BCP – Business Continuity Planning
BIA- Business Impact Analysis
BIOS – Basic Input / Output System
BPA – Business Partners Agreement
BPDU – Bridge Protocol Data Unit
BYOD – Bring Your Own Device
CA – Certificate Authority
CAC - Common Access Card
CAN - Controller Area Network
CAPTCHA- Completely Automated Public Turing Test to Tell
Computers and Humans Apart
CAR- Corrective Action Report
CCMP – Counter-Mode/CBC-Mac Protocol
CCTV - Closed-circuit television
CERT – Computer Emergency Response Team
CFB – Cipher Feedback
CHAP – Challenge Handshake Authentication Protocol
CIO-- Chief Information Officer
CIRT – Computer Incident Response Team
CMS – Content Management System
COOP – Continuity of Operation Planning
CP – Contingency Planning
CRC – Cyclical Redundancy Check
CRL – Certificate Signing Request
CSP – Cloud Service Provider
CompTIA Security+ Certification Exam Objectives v. 7 18 of 24
Copyright 2013 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
CSR – Control Status Register
CSRF – Cross-Site Request Forgery
CSU – Channel Service Unit
CTO- Chief Technology Officer
DAC – Discretionary Access Control
DBA– Database Administrator
DDOS – Distributed Denial of Service
DEP – Data Execution Prevention
DES – Digital Encryption Standard
DHCP – Dynamic Host Configuration Protocol
DHE – Data-Handling Electronics
DHE - Diffie-Hellman Ephemeral
DLL - Dynamic Link Library
DLP - Data Loss Prevention
DMZ – Demilitarized Zone
DNAT – Destination Network Address Transaction
DNS – Domain Name Service (Server)
DOS – Denial of Service
DRP – Disaster Recovery Plan
DSA – Digital Signature Algorithm
DSL - Digital Subscriber line
DSU – Data Service Unit
EAP - Extensible Authentication Protocol
ECC - Elliptic Curve Cryptography
ECDHE – Elliptic Curve Diffie-Hellman Exchange
ECDSA – Elliptic Curve Digital Signature Algorithm
EFS – Encrypted File System
EMI – Electromagnetic Interference
ESN- Electronic Serial Number
ESP – Encapsulated Security Payload
FACL- File System Access Control List
FDE– Full Disk Encryption
FTP – File Transfer Protocol
FTPS – Secured File Transfer Protocol
GCM – Galois Counter Mode
GPG – Gnu Privacy Guard
GPO – Group Policy Object
GPS – Global Positioning System
GPU - Graphic Processing Unit
GRE - Generic Routing Encapsulation
HDD – Hard Disk Drive
HIDS – Host Based Intrusion Detection System
CompTIA Security+ Certification Exam Objectives v. 7 19 of 24
Copyright 2013 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
HIPS – Host Based Intrusion Prevention System
HMAC – Hashed Message Authentication Code
HOTP – HMAC based One Time Password
HSM – Hardware Security Module
HTML – HyperText Markup Language
HTTP – Hypertext Transfer Protocol
HTTPS – Hypertext Transfer Protocol over SSL
HVAC – Heating, Ventilation Air Conditioning
IaaS - Infrastructure as a Service
ICMP - Internet Control Message Protocol
ICS – Industrial Control Systems
ID – Identification
IDF – Intermeidate Distribution Frame
IdP – Identity Provider
IDS – Intrusion Detection System
IKE – Internet Key Exchange
IM - Instant messaging
IMAP4 - Internet Message Access Protocol v4
IP - Internet Protocol
IPSEC – Internet Protocol Security
IR– Incident Response
IRC - Internet Relay Chat
IRP – Incident Response Procedure
ISA – Interconnection Security Agreement
ISP – Internet Service Provider
ISSO- Information Systems Security Officer
ITCP – IT Contingency Plan
IV - Initialization Vector
JBOD– Just a Bunch of Disks
KDC - Key Distribution Center
KEK – Key Encryption Key
L2TP – Layer 2 Tunneling Protocol
LAN – Local Area Network
LDAP – Lightweight Directory Access Protocol
LEAP – Lightweight Extensible Authentication Protocol
MaaS- Monitoring as a Service
MAC – Mandatory Access Control / Media Access Control
MAC - Message Authentication Code
MAN - Metropolitan Area Network
MBR – Master Boot Record
MD5 – Message Digest 5
MDF – Main Distribution Frame
CompTIA Security+ Certification Exam Objectives v. 7 20 of 24
Copyright 2013 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
MITM – Man-in-the-Middle
MOU – Memorandum of Understanding
MPLS – Multi-Protocol Layer Switch
MSCHAP – Microsoft Challenge Handshake Authentication
Protocol
MTBF – Mean Time Between Failures
MTTR – Mean Time to Recover
MTTF – Mean Time to Failure
MTU - Maximum Transmission Unit
NAC – Network Access Control
NAT – Network Address Translation
NDA – Non-Disclosure Agreement
NFC– Near Field Communication
NIDS – Network Based Intrusion Detection System
NIPS – Network Based Intrusion Prevention System
NIST – National Institute of Standards & Technology
NOS – Network Operating System
NTFS - New Technology File System
NTLM – New Technology LANMAN
NTP - Network Time Protocol
OAUTH – Open Authorization
OCSP – Online Certificate Status Protocol
OLA – Open License Agreement
OS – Operating System
OVAL – Open Vulnerability Assessment Language
P2P – Peer to Peer
PAC– Proxy Auto Configuration
PAM – Pluggable Authentication Modules
PAP – Password Authentication Protocol
PAT - Port Address Translation
PBKDF2 – Password Based Key Derivation Function 2
PBX – Private Branch Exchange
PCAP – Packet Capture
PEAP – Protected Extensible Authentication Protocol
PED - Personal Electronic Device
PFS – Perfect Forward Secrecy
PGP – Pretty Good Privacy
PII – Personally Identifiable Information
PIV – Personal Identity Verification
PKI – Public Key Infrastructure
POTS – Plain Old Telephone Service
PPP - Point-to-point Protocol
PPTP – Point to Point Tunneling Protocol
CompTIA Security+ Certification Exam Objectives v. 7 21 of 24
Copyright 2013 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
PSK – Pre-Shared Key
PTZ – Pan-Tilt-Zoom
RA – Recovery Agent
RA – Registration Authrity
RAD - Rapid application development
RADIUS – Remote Authentication Dial-in User Server
RAID – Redundant Array of Inexpensive Disks
RAS – Remote Access Server
RBAC – Role Based Access Control
RBAC – Rule Based Access Control
RC4 – RSA Variable Key Size Encryption Algorithm
RIPEMD – RACE Integrity Primitives Evaluation Message Digest
ROI – Return of Investment
RPO – Recovery Point Objective
RSA – Rivest, Shamir, & Adleman
RTO – Recovery Time Objective
RTP – Real-Time Transport Protocol
S/MIME – Secure / Multipurpose Internet Mail Extensions
SAML – Security Assertions Markup Language
SaaS - Software as a Service
SAN – Storage Area Network
SCADA – System Control and Data Acquisition
SCAP - Security Content Automation Protocol
SCEP- Simple Certificate Enrollment Protocol
SCSI - Small Computer System Interface
SDLC - Software Development Life Cycle
SDLM - Software Development Life Cycle Methodology
SEH – Structured Exception Handler
SHA – Secure Hashing Algorithm
SFTP – Secured File Transfer Protocol
SHTTP – Secure Hypertext Transfer Protocol
SIEM – Security Information and Event Management
SIM – Subscriber Identity Module
SLA – Service Level Agreement
SLE - Single Loss Expectancy
SMS - Short Message Service
SMTP – Simple Mail Transfer Protocol
SMTPS – Simple Mail Transfer Protocol Secure
SNMP - Simple Network Management Protocol
SOAP – Simple Object Access Protocol
SONET – Synchronous Optical Network Technologies
SPIM - Spam over Internet Messaging
CompTIA Security+ Certification Exam Objectives v. 7 22 of 24
Copyright 2013 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
SQL – Structured Query Language
SSD – Solid State Drive
SSH – Secure Shell
SSL – Secure Sockets Layer
SSO – Single Sign On
STP – Shielded Twisted Pair
TACACS+ – Terminal Access Controller Access Control System
TCP/IP – Transmission Control Protocol / Internet Protocol
TGT– Ticket Granting Ticket
TKIP - Temporal Key Integrity Protocol
TLS – Transport Layer Security
TOTP – Time-Based One-Time Password
TPM – Trusted Platform Module
TSIG – Transaction Signature
UAT - User Acceptance Testing
UEFI – Unified Extensible Firmware Interface
UDP- User Datagram Protocol
UPS - Uninterruptable Power Supply
URI- Uniform Resource Identifier
URL - Universal Resource Locator
USB – Universal Serial Bus
UTM- Unified Threat Management
UTP – Unshielded Twisted Pair
VDI – Virtualization Desktop Infrastructure
VLAN – Virtual Local Area Network
VLSM – Variable Length Subnet Masking
VoIP - Voice over IP
VPN – Virtual Private Network
VTC – Video Teleconferencing
WAF- Web-Application Firewall
WAP – Wireless Access Point
WEP – Wired Equivalent Privacy
WIDS – Wireless Intrusion Detection System
WIPS – Wireless Intrusion Prevention System
WPA – Wireless Protected Access
WPA2 – WiFi Protected Access 2
WPS – WiFi Protected Setup
WTLS – Wireless TLS
XML – Extensible Markup Language
XSRF- Cross-Site Request Forgery
XSS - Cross-Site Scripting
CompTIA Security+ Certification Exam Objectives v. 7 23 of 24
Copyright 2013 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
Suggested Classroom Equipment to have for Security+ Certification Training Equipment
 Router
 Firewall
 Access point
 Switch
 IDS/IPS
 Server
 Content filter
 Client
 Mobile device
 VPN concentrator
 All in one appliance
 Enterprise security managers / SIEM suite
 Load balancer
Spare parts/hardware
 Keyboards, mice
 Network cables
 Monitors
Tools
 WiFi analyzers
Software
 Backtrack
 Proxy server
 Kali/BackTrack
 Virtualization software
CompTIA Security+ Certification Exam Objectives v. 7 24 of 24
Copyright 2013 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
 Virtualized appliances
 Wireshark
 TCPdump
 NMAP
 OpenVAS
 Metasploit
 Backorifice
 Cain & Abel
 John the Ripper
 PF Sense
 Security Onion
 Roo
 Any UTM
Other
 Source Forge

Weitere ähnliche Inhalte

Was ist angesagt?

Keeping the World Connected with CompTIA Network+
Keeping the World Connected with CompTIA Network+Keeping the World Connected with CompTIA Network+
Keeping the World Connected with CompTIA Network+CompTIA
 
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseGlobal Online Trainings
 
Cyber Security Standards Update: Version 5 by Scott Mix
Cyber Security Standards Update: Version 5 by Scott MixCyber Security Standards Update: Version 5 by Scott Mix
Cyber Security Standards Update: Version 5 by Scott MixTheAnfieldGroup
 
NERC CIP Compliance 101 Workshop - Smart Grid Security East 2011
NERC CIP Compliance 101 Workshop - Smart Grid Security East 2011NERC CIP Compliance 101 Workshop - Smart Grid Security East 2011
NERC CIP Compliance 101 Workshop - Smart Grid Security East 2011dma1965
 
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleNERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleEnergySec
 
Rapid7 NERC-CIP Compliance Guide
Rapid7 NERC-CIP Compliance GuideRapid7 NERC-CIP Compliance Guide
Rapid7 NERC-CIP Compliance GuideRapid7
 
Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...
Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...
Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...TheAnfieldGroup
 
CV of Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan MMohan M
 
Mohd Kareem CV July 26 2015
Mohd Kareem  CV July 26 2015Mohd Kareem  CV July 26 2015
Mohd Kareem CV July 26 2015Mohammed Shoaib
 
Comp tia a_220-802_objectives
Comp tia a_220-802_objectivesComp tia a_220-802_objectives
Comp tia a_220-802_objectivessunil kumar
 
V&V Lessons Learnt under multiple Standards
V&V Lessons Learnt under multiple StandardsV&V Lessons Learnt under multiple Standards
V&V Lessons Learnt under multiple StandardsOak Systems
 
Afry software safety ISO26262 (Embedded @ Gothenburg Meetup)
Afry software safety ISO26262 (Embedded @ Gothenburg Meetup)Afry software safety ISO26262 (Embedded @ Gothenburg Meetup)
Afry software safety ISO26262 (Embedded @ Gothenburg Meetup)Dimitrios Platis
 
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...EnergySec
 
Information Security Audit Consultant
Information Security Audit  ConsultantInformation Security Audit  Consultant
Information Security Audit Consultantdcs HH
 
#ATAGTR2018 Presentation "Quality Engineering in DevOps Enabling Business Gro...
#ATAGTR2018 Presentation "Quality Engineering in DevOps Enabling Business Gro...#ATAGTR2018 Presentation "Quality Engineering in DevOps Enabling Business Gro...
#ATAGTR2018 Presentation "Quality Engineering in DevOps Enabling Business Gro...Agile Testing Alliance
 
Chapter 15 Presentation
Chapter 15 PresentationChapter 15 Presentation
Chapter 15 PresentationAmy McMullin
 
Gabriel Ong Resume 22112016
Gabriel Ong Resume 22112016Gabriel Ong Resume 22112016
Gabriel Ong Resume 22112016Gabriel Ong
 

Was ist angesagt? (20)

Keeping the World Connected with CompTIA Network+
Keeping the World Connected with CompTIA Network+Keeping the World Connected with CompTIA Network+
Keeping the World Connected with CompTIA Network+
 
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online Course
 
Cyber Security Standards Update: Version 5 by Scott Mix
Cyber Security Standards Update: Version 5 by Scott MixCyber Security Standards Update: Version 5 by Scott Mix
Cyber Security Standards Update: Version 5 by Scott Mix
 
NERC CIP Compliance 101 Workshop - Smart Grid Security East 2011
NERC CIP Compliance 101 Workshop - Smart Grid Security East 2011NERC CIP Compliance 101 Workshop - Smart Grid Security East 2011
NERC CIP Compliance 101 Workshop - Smart Grid Security East 2011
 
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleNERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
 
Rapid7 NERC-CIP Compliance Guide
Rapid7 NERC-CIP Compliance GuideRapid7 NERC-CIP Compliance Guide
Rapid7 NERC-CIP Compliance Guide
 
Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...
Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...
Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...
 
CV of Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan M
 
Mohd Kareem CV July 26 2015
Mohd Kareem  CV July 26 2015Mohd Kareem  CV July 26 2015
Mohd Kareem CV July 26 2015
 
Comp tia a_220-802_objectives
Comp tia a_220-802_objectivesComp tia a_220-802_objectives
Comp tia a_220-802_objectives
 
Resume
ResumeResume
Resume
 
V&V Lessons Learnt under multiple Standards
V&V Lessons Learnt under multiple StandardsV&V Lessons Learnt under multiple Standards
V&V Lessons Learnt under multiple Standards
 
Afry software safety ISO26262 (Embedded @ Gothenburg Meetup)
Afry software safety ISO26262 (Embedded @ Gothenburg Meetup)Afry software safety ISO26262 (Embedded @ Gothenburg Meetup)
Afry software safety ISO26262 (Embedded @ Gothenburg Meetup)
 
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
 
Information Security Audit Consultant
Information Security Audit  ConsultantInformation Security Audit  Consultant
Information Security Audit Consultant
 
#ATAGTR2018 Presentation "Quality Engineering in DevOps Enabling Business Gro...
#ATAGTR2018 Presentation "Quality Engineering in DevOps Enabling Business Gro...#ATAGTR2018 Presentation "Quality Engineering in DevOps Enabling Business Gro...
#ATAGTR2018 Presentation "Quality Engineering in DevOps Enabling Business Gro...
 
Chapter 15 Presentation
Chapter 15 PresentationChapter 15 Presentation
Chapter 15 Presentation
 
Adarsh Resume ISO27001
Adarsh Resume ISO27001Adarsh Resume ISO27001
Adarsh Resume ISO27001
 
Gabriel Ong Resume 22112016
Gabriel Ong Resume 22112016Gabriel Ong Resume 22112016
Gabriel Ong Resume 22112016
 
johndemunnik_MAY2016
johndemunnik_MAY2016johndemunnik_MAY2016
johndemunnik_MAY2016
 

Andere mochten auch

CompTIA Security+ Objectives
CompTIA Security+ ObjectivesCompTIA Security+ Objectives
CompTIA Security+ Objectivessombat nirund
 
Comptia Security+ Exam Notes
Comptia Security+ Exam NotesComptia Security+ Exam Notes
Comptia Security+ Exam NotesVijayanand Yadla
 
Chapter 5 Presentation
Chapter 5 PresentationChapter 5 Presentation
Chapter 5 PresentationAmy McMullin
 
Chapter 8 Presentaion
Chapter 8 PresentaionChapter 8 Presentaion
Chapter 8 PresentaionAmy McMullin
 
Chapter 6 Presentation
Chapter 6 PresentationChapter 6 Presentation
Chapter 6 PresentationAmy McMullin
 
Chapter 9 PowerPoint
Chapter 9 PowerPointChapter 9 PowerPoint
Chapter 9 PowerPointAmy McMullin
 
Chapter 7 Presentation
Chapter 7 PresentationChapter 7 Presentation
Chapter 7 PresentationAmy McMullin
 
Chapter 11 Presentation
Chapter 11 PresentationChapter 11 Presentation
Chapter 11 PresentationAmy McMullin
 
Chapter 12 Presentation
Chapter 12 PresentationChapter 12 Presentation
Chapter 12 PresentationAmy McMullin
 
Chapter 1 Presentation
Chapter 1 PresentationChapter 1 Presentation
Chapter 1 PresentationAmy McMullin
 
Chapter 2 Presentation
Chapter 2 PresentationChapter 2 Presentation
Chapter 2 PresentationAmy McMullin
 
Chapter 3 Presentation
Chapter 3 PresentationChapter 3 Presentation
Chapter 3 PresentationAmy McMullin
 
A+ Chapter 3 Review
A+ Chapter 3 ReviewA+ Chapter 3 Review
A+ Chapter 3 ReviewAmy McMullin
 
The Osi Model And Layers
The Osi Model And LayersThe Osi Model And Layers
The Osi Model And LayersKathleenSSmith
 
CompTIA Security+ ce certificate
CompTIA Security+ ce certificateCompTIA Security+ ce certificate
CompTIA Security+ ce certificateLuigi Cristiani
 

Andere mochten auch (18)

PACE-IT, Security+ 2.5: Incident Response Concepts
PACE-IT, Security+ 2.5: Incident Response ConceptsPACE-IT, Security+ 2.5: Incident Response Concepts
PACE-IT, Security+ 2.5: Incident Response Concepts
 
CompTIA Security+ Objectives
CompTIA Security+ ObjectivesCompTIA Security+ Objectives
CompTIA Security+ Objectives
 
Comptia Security+ Exam Notes
Comptia Security+ Exam NotesComptia Security+ Exam Notes
Comptia Security+ Exam Notes
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Chapter 5 Presentation
Chapter 5 PresentationChapter 5 Presentation
Chapter 5 Presentation
 
Chapter 8 Presentaion
Chapter 8 PresentaionChapter 8 Presentaion
Chapter 8 Presentaion
 
Chapter 6 Presentation
Chapter 6 PresentationChapter 6 Presentation
Chapter 6 Presentation
 
Chapter 9 PowerPoint
Chapter 9 PowerPointChapter 9 PowerPoint
Chapter 9 PowerPoint
 
Chapter 7 Presentation
Chapter 7 PresentationChapter 7 Presentation
Chapter 7 Presentation
 
Chapter 11 Presentation
Chapter 11 PresentationChapter 11 Presentation
Chapter 11 Presentation
 
Chapter 12 Presentation
Chapter 12 PresentationChapter 12 Presentation
Chapter 12 Presentation
 
Chapter 1 Presentation
Chapter 1 PresentationChapter 1 Presentation
Chapter 1 Presentation
 
Chapter 2 Presentation
Chapter 2 PresentationChapter 2 Presentation
Chapter 2 Presentation
 
Chapter 3 Presentation
Chapter 3 PresentationChapter 3 Presentation
Chapter 3 Presentation
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
A+ Chapter 3 Review
A+ Chapter 3 ReviewA+ Chapter 3 Review
A+ Chapter 3 Review
 
The Osi Model And Layers
The Osi Model And LayersThe Osi Model And Layers
The Osi Model And Layers
 
CompTIA Security+ ce certificate
CompTIA Security+ ce certificateCompTIA Security+ ce certificate
CompTIA Security+ ce certificate
 

Ähnlich wie Comptia security-sy0-401

Comptia networkplus-recert-rc0-n06-objectives
Comptia networkplus-recert-rc0-n06-objectivesComptia networkplus-recert-rc0-n06-objectives
Comptia networkplus-recert-rc0-n06-objectivesMajid Ali
 
CompTIA Security+ Certification | Sec+
CompTIA Security+ Certification | Sec+ CompTIA Security+ Certification | Sec+
CompTIA Security+ Certification | Sec+ SagarNegi10
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM
 
Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...Hassan EL ALLOUSSI
 
CompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examCompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examInfosec
 
Security+ Course Overview (2008)
Security+ Course Overview (2008)Security+ Course Overview (2008)
Security+ Course Overview (2008)GTS Learning, Inc.
 
Cybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT EquipmentCybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT EquipmentOnward Security
 
3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment QuestionnairePriyanka Aash
 
Audit Practice at CipherTechs
Audit Practice at CipherTechsAudit Practice at CipherTechs
Audit Practice at CipherTechsMordecai Kraushar
 
Didiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Kusumadihardja
 
محتويات مادة آمن الشبكات
محتويات مادة آمن الشبكاتمحتويات مادة آمن الشبكات
محتويات مادة آمن الشبكاتeng_SamMoh
 
Cyber review-guide
Cyber review-guideCyber review-guide
Cyber review-guideaqazad
 
Penetration and hacking training brief
Penetration and hacking training briefPenetration and hacking training brief
Penetration and hacking training briefBill Nelson
 
CompTIA CySA+ domains and their Weightage.pptx
CompTIA CySA+ domains and their Weightage.pptxCompTIA CySA+ domains and their Weightage.pptx
CompTIA CySA+ domains and their Weightage.pptxInfosectrain3
 
Lunch and Learn: June 29, 2010
Lunch and Learn: June 29, 2010Lunch and Learn: June 29, 2010
Lunch and Learn: June 29, 2010prevalentnetworks
 
From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...NetIQ
 
CompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to knowCompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to knowInfosec
 
CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to knowCompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to knowInfosec
 
CompTIA+A++Core+1+(220-1101)+Exam+Objectives.pdf
CompTIA+A++Core+1+(220-1101)+Exam+Objectives.pdfCompTIA+A++Core+1+(220-1101)+Exam+Objectives.pdf
CompTIA+A++Core+1+(220-1101)+Exam+Objectives.pdfstudyaccountlinux
 

Ähnlich wie Comptia security-sy0-401 (20)

Comptia networkplus-recert-rc0-n06-objectives
Comptia networkplus-recert-rc0-n06-objectivesComptia networkplus-recert-rc0-n06-objectives
Comptia networkplus-recert-rc0-n06-objectives
 
CompTIA Security+ Certification | Sec+
CompTIA Security+ Certification | Sec+ CompTIA Security+ Certification | Sec+
CompTIA Security+ Certification | Sec+
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...
 
CompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examCompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the exam
 
Security+ Course Overview (2008)
Security+ Course Overview (2008)Security+ Course Overview (2008)
Security+ Course Overview (2008)
 
Cybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT EquipmentCybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT Equipment
 
3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire
 
Audit Practice at CipherTechs
Audit Practice at CipherTechsAudit Practice at CipherTechs
Audit Practice at CipherTechs
 
Didiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - English
 
محتويات مادة آمن الشبكات
محتويات مادة آمن الشبكاتمحتويات مادة آمن الشبكات
محتويات مادة آمن الشبكات
 
Cyber review-guide
Cyber review-guideCyber review-guide
Cyber review-guide
 
Penetration and hacking training brief
Penetration and hacking training briefPenetration and hacking training brief
Penetration and hacking training brief
 
CompTIA CySA+ domains and their Weightage.pptx
CompTIA CySA+ domains and their Weightage.pptxCompTIA CySA+ domains and their Weightage.pptx
CompTIA CySA+ domains and their Weightage.pptx
 
Lunch and Learn: June 29, 2010
Lunch and Learn: June 29, 2010Lunch and Learn: June 29, 2010
Lunch and Learn: June 29, 2010
 
From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...
 
CompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to knowCompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to know
 
CMMC Breakdown
CMMC BreakdownCMMC Breakdown
CMMC Breakdown
 
CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to knowCompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
 
CompTIA+A++Core+1+(220-1101)+Exam+Objectives.pdf
CompTIA+A++Core+1+(220-1101)+Exam+Objectives.pdfCompTIA+A++Core+1+(220-1101)+Exam+Objectives.pdf
CompTIA+A++Core+1+(220-1101)+Exam+Objectives.pdf
 

Kürzlich hochgeladen

Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilVinayVitekari
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 

Kürzlich hochgeladen (20)

Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 

Comptia security-sy0-401

  • 1. CompTIA Security+ Certification Exam Objectives v. 7 1 of 24 Copyright 2013 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice. Certification Exam Objectives: SY0-401 INTRODUCTION The CompTIA Security+ Certification is a vendor neutral credential. The CompTIA Security+ exam is an internationally recognized validation of foundation-level security skills and knowledge, and is used by organizations and security professionals around the globe. The CompTIA Security+ exam will certify that the successful candidate has the knowledge and skills required to identify risk, to participate in risk mitigation activities, and to provide infrastructure, application, information, and operational security. In addition, the successful candidate will apply security controls to maintain confidentiality, integrity, and availability, identify appropriate technologies and products, troubleshoot security events and incidents, and operate with an awareness of applicable policies, laws, and regulations. The CompTIA Security+ Certification is aimed at an IT security professional who has:  A minimum of 2 years experience in IT administration with a focus on security  Day to day technical information security experience  Broad knowledge of security concerns and implementation including the topics in the domain list below CompTIA Security+ is accredited by ANSI to show compliance with the ISO 17024 Standard and, as such, undergoes regular reviews and updates to the exam objectives. The following CompTIA Security+ objectives reflect the subject areas in this edition of this exam, and result from subject matter expert workshops and industry-wide survey results regarding the skills and knowledge required of an information security professional with two years of experience. This examination blueprint includes domain weighting, test objectives, and example content. Example topics and concepts are included to clarify the test objectives and should not be construed as a comprehensive listing of all the content of this examination. The table below lists the domain areas measured by this examination and the approximate extent to which they are represented in the examination: Domain % of Examination 1.0 Network Security 20% 2.0 Compliance and Operational Security 18% 3.0 Threats and Vulnerabilities 20% 4.0 Application, Data and Host Security 15% 5.0 Access Control and Identity Management 15% 6.0 Cryptography 12% Total 100%
  • 2. CompTIA Security+ Certification Exam Objectives v. 7 2 of 24 Copyright 2013 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice. CompTIA Authorized Materials Use Policy CompTIA Certifications, LLC is not affiliated with and does not authorize, endorse or condone utilizing any content provided by unauthorized third-party training sites, aka 'brain dumps'. Individuals who utilize such materials in preparation for any CompTIA examination will have their certifications revoked and be suspended from future testing in accordance with the CompTIA Candidate Agreement. In an effort to more clearly communicate CompTIA’s exam policies on use of unauthorized study materials, CompTIA directs all certification candidates to the CompTIA Certification Exam Policies webpage: http://certification.comptia.org/Training/testingcenters/policies.aspx Please review all CompTIA policies before beginning the study process for any CompTIA exam. Candidates will be required to abide by the CompTIA Candidate Agreement (http://certification.comptia.org/Training/testingcenters/policies/agreement.aspx) at the time of exam delivery. If a candidate has a question as to whether study materials are considered unauthorized (aka brain dumps), he/she should perform a search using CertGuard's engine, found here: http://www.certguard.com/search.asp Or verify against this list: http://certification.comptia.org/Training/testingcenters/policies/unauthorized.aspx **Note: The lists of examples provided in bulleted format below each objective are not exhaustive lists. Other examples of technologies, processes or tasks pertaining to each objective may also be included on the exam although not listed or covered in this objectives document. CompTIA is constantly reviewing the content of our exams and updating test questions to be sure our exams are current and the security of the questions is protected. When necessary, we will publish updated exams based on existing exam objectives. Please know that all related exam preparation materials will still be valid.
  • 3. CompTIA Security+ Certification Exam Objectives v. 7 3 of 24 Copyright 2013 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice. 1.0 Network Security 1.1 Implement security configuration parameters on network devices and other technologies.  Firewalls  Routers  Switches  Load Balancers  Proxies  Web security gateways  VPN concentrators  NIDS and NIPS o Behavior based o Signature based o Anomaly based o Heuristic  Protocol analyzers  Spam filter  UTM security appliances o URL filter o Content inspection o Malware inspection  Web application firewall vs. network firewall  Application aware devices o Firewalls o IPS o IDS o Proxies 1.2 Given a scenario, use secure network administration principles.  Rule-based management  Firewall rules  VLAN management  Secure router configuration  Access control lists  Port Security  802.1x  Flood guards  Loop protection  Implicit deny  Network separation  Log analysis  Unified Threat Management 1.3 Explain network design elements and components.  DMZ  Subnetting  VLAN  NAT  Remote Access  Telephony
  • 4. CompTIA Security+ Certification Exam Objectives v. 7 4 of 24 Copyright 2013 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice.  NAC  Virtualization  Cloud Computing o Platform as a Service o Software as a Service o Infrastructure as a Service o Private o Public o Hybrid o Community  Layered security / Defense in depth 1.4 Given a scenario, implement common protocols and services.  Protocols o IPSec o SNMP o SSH o DNS o TLS o SSL o TCP/IP o FTPS o HTTPS o SCP o ICMP o IPv4 o IPv6 o iSCSI o Fibre Channel o FCoE o FTP o SFTP o TFTP o TELNET o HTTP o NetBIOS  Ports o 21 o 22 o 25 o 53 o 80 o 110 o 139 o 143 o 443 o 3389  OSI relevance 1.5 Given a scenario, troubleshoot security issues related to wireless networking.  WPA  WPA2  WEP
  • 5. CompTIA Security+ Certification Exam Objectives v. 7 5 of 24 Copyright 2013 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice.  EAP  PEAP  LEAP  MAC filter  Disable SSID broadcast  TKIP  CCMP  Antenna Placement  Power level controls  Captive portals  Antenna types  Site surveys  VPN (over open wireless) 2.0 Compliance and Operational Security 2.1 Explain the importance of risk related concepts.  Control types o Technical o Management o Operational  False positives  False negatives  Importance of policies in reducing risk o Privacy policy o Acceptable use o Security policy o Mandatory vacations o Job rotation o Separation of duties o Least privilege  Risk calculation o Likelihood o ALE o Impact o SLE o ARO o MTTR o MTTF o MTBF  Quantitative vs. qualitative  Vulnerabilities  Threat vectors  Probability / threat likelihood  Risk-avoidance, transference, acceptance, mitigation, deterrence  Risks associated with Cloud Computing and Virtualization  Recovery time objective and recovery point objective 2.2 Summarize the security implications of integrating systems and data with third parties.  On-boarding/off-boarding business partners  Social media networks and/or applications  Interoperability agreements
  • 6. CompTIA Security+ Certification Exam Objectives v. 7 6 of 24 Copyright 2013 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice. o SLA o BPA o MOU o ISA  Privacy considerations  Risk awareness  Unauthorized data sharing  Data ownership  Data backups  Follow security policy and procedures  Review agreement requirements to verify compliance and performance standards 2.3 Given a scenario, implement appropriate risk mitigation strategies.  Change management  Incident management  User rights and permissions reviews  Perform routine audits  Enforce policies and procedures to prevent data loss or theft  Enforce technology controls o Data Loss Prevention (DLP) 2.4 Given a scenario, implement basic forensic procedures.  Order of volatility  Capture system image  Network traffic and logs  Capture video  Record time offset  Take hashes  Screenshots  Witnesses  Track man hours and expense  Chain of custody  Big Data analysis 2.5 Summarize common incident response procedures.  Preparation  Incident identification  Escalation and notification  Mitigation steps  Lessons learned  Reporting  Recovery/reconstitution procedures  First responder  Incident isolation o Quarantine o Device removal  Data breach  Damage and loss control 2.6 Explain the importance of security related awareness and training.  Security policy training and procedures  Role-based training
  • 7. CompTIA Security+ Certification Exam Objectives v. 7 7 of 24 Copyright 2013 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice.  Personally identifiable information  Information classification o High o Medium o Low o Confidential o Private o Public  Data labeling, handling and disposal  Compliance with laws, best practices and standards  User habits o Password behaviors o Data handling o Clean desk policies o Prevent tailgating o Personally owned devices  New threats and new security trends/alerts o New viruses o Phishing attacks o Zero-day exploits  Use of social networking and P2P  Follow up and gather training metrics to validate compliance and security posture 2.7 Compare and contrast physical security and environmental controls.  Environmental controls o HVAC o Fire suppression o EMI shielding o Hot and cold aisles o Environmental monitoring o Temperature and humidity controls  Physical security o Hardware locks o Mantraps o Video Surveillance o Fencing o Proximity readers o Access list o Proper lighting o Signs o Guards o Barricades o Biometrics o Protected distribution (cabling) o Alarms o Motion detection  Control types o Deterrent o Preventive o Detective o Compensating o Technical o Administrative
  • 8. CompTIA Security+ Certification Exam Objectives v. 7 8 of 24 Copyright 2013 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice. 2.8 Summarize risk management best practices.  Business continuity concepts o Business impact analysis o Identification of critical systems and components o Removing single points of failure o Business continuity planning and testing o Risk assessment o Continuity of operations o Disaster recovery o IT contingency planning o Succession planning o High availability o Redundancy o Tabletop exercises  Fault tolerance o Hardware o RAID o Clustering o Load balancing o Servers  Disaster recovery concepts o Backup plans/policies o Backup execution/frequency o Cold site o Hot site o Warm site 2.9 Given a scenario, select the appropriate control to meet the goals of security.  Confidentiality o Encryption o Access controls o Steganography  Integrity o Hashing o Digital signatures o Certificates o Non-repudiation  Availability o Redundancy o Fault tolerance o Patching  Safety o Fencing o Lighting o Locks o CCTV o Escape plans o Drills o Escape routes o Testing controls 3.0 Threats and Vulnerabilities 3.1 Explain types of malware.
  • 9. CompTIA Security+ Certification Exam Objectives v. 7 9 of 24 Copyright 2013 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice.  Adware  Virus  Spyware  Trojan  Rootkits  Backdoors  Logic bomb  Botnets  Ransomware  Polymorphic malware  Armored virus 3.2 Summarize various types of attacks.  Man-in-the-middle  DDoS  DoS  Replay  Smurf attack  Spoofing  Spam  Phishing  Spim  Vishing  Spear phishing  Xmas attack  Pharming  Privilege escalation  Malicious insider threat  DNS poisoning and ARP poisoning  Transitive access  Client-side attacks  Password attacks o Brute force o Dictionary attacks o Hybrid o Birthday attacks o Rainbow tables  Typo squatting/URL hijacking  Watering hole attack 3.3 Summarize social engineering attacks and the associated effectiveness with each attack.  Shoulder surfing  Dumpster diving  Tailgating  Impersonation  Hoaxes  Whaling  Vishing  Principles (reasons for effectiveness) o Authority o Intimidation o Consensus/Social proof
  • 10. CompTIA Security+ Certification Exam Objectives v. 7 10 of 24 Copyright 2013 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice. o Scarcity o Urgency o Familiarity/liking o Trust 3.4 Explain types of wireless attacks.  Rogue access points  Jamming/Interference  Evil twin  War driving  Bluejacking  Bluesnarfing  War chalking  IV attack  Packet sniffing  Near field communication  Replay attacks  WEP/WPA attacks  WPS attacks 3.5 Explain types of application attacks.  Cross-site scripting  SQL injection  LDAP injection  XML injection  Directory traversal/command injection  Buffer overflow  Integer overflow  Zero-day  Cookies and attachments  LSO (Locally Shared Objects)  Flash Cookies  Malicious add-ons  Session hijacking  Header manipulation  Arbitrary code execution / remote code execution 3.6 Analyze a scenario and select the appropriate type of mitigation and deterrent techniques.  Monitoring system logs o Event logs o Audit logs o Security logs o Access logs  Hardening o Disabling unnecessary services o Protecting management interfaces and applications o Password protection o Disabling unnecessary accounts  Network security o MAC limiting and filtering o 802.1x o Disabling unused interfaces and unused application service ports
  • 11. CompTIA Security+ Certification Exam Objectives v. 7 11 of 24 Copyright 2013 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice. o Rogue machine detection  Security posture o Initial baseline configuration o Continuous security monitoring o Remediation  Reporting o Alarms o Alerts o Trends  Detection controls vs. prevention controls o IDS vs. IPS o Camera vs. guard 3.7 Given a scenario, use appropriate tools and techniques to discover security threats and vulnerabilities.  Interpret results of security assessment tools  Tools o Protocol analyzer o Vulnerability scanner o Honeypots o Honeynets o Port scanner o Passive vs. active tools o Banner grabbing  Risk calculations o Threat vs. likelihood  Assessment types o Risk o Threat o Vulnerability  Assessment technique o Baseline reporting o Code review o Determine attack surface o Review architecture o Review designs 3.8 Explain the proper use of penetration testing versus vulnerability scanning.  Penetration testing o Verify a threat exists o Bypass security controls o Actively test security controls o Exploiting vulnerabilities  Vulnerability scanning o Passively testing security controls o Identify vulnerability o Identify lack of security controls o Identify common misconfigurations o Intrusive vs. non-intrusive o Credentialed vs. non-credentialed o False positive  Black box  White box  Gray box
  • 12. CompTIA Security+ Certification Exam Objectives v. 7 12 of 24 Copyright 2013 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice. 4.0 Application, Data and Host Security 4.1 Explain the importance of application security controls and techniques.  Fuzzing  Secure coding concepts o Error and exception handling o Input validation  Cross-site scripting prevention  Cross-site Request Forgery (XSRF) prevention  Application configuration baseline (proper settings)  Application hardening  Application patch management  NoSQL databases vs. SQL databases  Server-side vs. Client-side validation 4.2 Summarize mobile security concepts and technologies.  Device security o Full device encryption o Remote wiping o Lockout o Screen-locks o GPS o Application control o Storage segmentation o Asset tracking o Inventory control o Mobile device management o Device access control o Removable storage o Disabling unused features  Application security o Key management o Credential management o Authentication o Geo-tagging o Encryption o Application whitelisting o Transitive trust/authentication  BYOD concerns o Data ownership o Support ownership o Patch management o Antivirus management o Forensics o Privacy o On-boarding/off-boarding o Adherence to corporate policies o User acceptance o Architecture/infrastructure considerations o Legal concerns o Acceptable use policy o On-board camera/video
  • 13. CompTIA Security+ Certification Exam Objectives v. 7 13 of 24 Copyright 2013 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice. 4.3 Given a scenario, select the appropriate solution to establish host security.  Operating system security and settings  OS hardening  Anti-malware o Antivirus o Anti-spam o Anti-spyware o Pop-up blockers  Patch management  White listing vs. black listing applications  Trusted OS  Host-based firewalls  Host-based intrusion detection  Hardware security o Cable locks o Safe o Locking cabinets  Host software baselining  Virtualization o Snapshots o Patch compatibility o Host availability/elasticity o Security control testing o Sandboxing 4.4 Implement the appropriate controls to ensure data security.  Cloud storage  SAN  Handling Big Data  Data encryption o Full disk o Database o Individual files o Removable media o Mobile devices  Hardware based encryption devices o TPM o HSM o USB encryption o Hard drive  Data in-transit, Data at-rest, Data in-use  Permissions/ACL  Data policies o Wiping o Disposing o Retention o Storage 4.5 Compare and contrast alternative methods to mitigate security risks in static environments.  Environments o SCADA o Embedded (Printer, Smart TV, HVAC control) o Android
  • 14. CompTIA Security+ Certification Exam Objectives v. 7 14 of 24 Copyright 2013 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice. o iOS o Mainframe o Game consoles o In-vehicle computing systems  Methods o Network segmentation o Security layers o Application firewalls o Manual updates o Firmware version control o Wrappers o Control redundancy and diversity 5.0 Access Control and Identity Management 5.1 Compare and contrast the function and purpose of authentication services.  RADIUS  TACACS+  Kerberos  LDAP  XTACACS  SAML  Secure LDAP 5.2 Given a scenario, select the appropriate authentication, authorization or access control.  Identification vs. authentication vs. authorization  Authorization o Least privilege o Separation of duties o ACLs o Mandatory access o Discretionary access o Rule-based access control o Role-based access control o Time of day restrictions  Authentication o Tokens o Common access card o Smart card o Multifactor authentication o TOTP o HOTP o CHAP o PAP o Single sign-on o Access control o Implicit deny o Trusted OS  Authentication factors o Something you are o Something you have o Something you know o Somewhere you are
  • 15. CompTIA Security+ Certification Exam Objectives v. 7 15 of 24 Copyright 2013 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice. o Something you do  Identification o Biometrics o Personal identification verification card o Username  Federation  Transitive trust/authentication 5.3 Install and configure security controls when performing account management, based on best practices.  Mitigate issues associated with users with multiple account/roles and/or shared accounts  Account policy enforcement o Credential management o Group policy o Password complexity o Expiration o Recovery o Disablement o Lockout o Password history o Password reuse o Password length o Generic account prohibition  Group based privileges  User assigned privileges  User access reviews  Continuous monitoring 6.0 Cryptography 6.1 Given a scenario, utilize general cryptography concepts.  Symmetric vs. asymmetric  Session keys  In-band vs. out-of-band key exchange  Fundamental differences and encryption methods o Block vs. stream  Transport encryption  Non-repudiation  Hashing  Key escrow  Steganography  Digital signatures  Use of proven technologies  Elliptic curve and quantum cryptography  Ephemeral key  Perfect forward secrecy 6.2 Given a scenario, use appropriate cryptographic methods.  WEP vs. WPA/WPA2 and preshared key  MD5  SHA
  • 16. CompTIA Security+ Certification Exam Objectives v. 7 16 of 24 Copyright 2013 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice.  RIPEMD  AES  DES  3DES  HMAC  RSA  Diffie-Hellman  RC4  One-time pads  NTLM  NTLMv2  Blowfish  PGP/GPG  TwoFish  DHE  ECDHE  CHAP  PAP  Comparative strengths and performance of algorithms  Use of algorithms/protocols with transport encryption o SSL o TLS o IPSec o SSH o HTTPS  Cipher suites o Strong vs. weak ciphers  Key stretching o PBKDF2 o Bcrypt 6.3 Given a scenario, use appropriate PKI, certificate management and associated components.  Certificate authorities and digital certificates o CA o CRLs o OCSP o CSR  PKI  Recovery agent  Public key  Private key  Registration  Key escrow  Trust models
  • 17. CompTIA Security+ Certification Exam Objectives v. 7 17 of 24 Copyright 2013 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice. SECURITY+ ACRONYMS 3DES – Triple Digital Encryption Standard AAA – Authentication, Authorization, and Accounting ACL – Access Control List AES - Advanced Encryption Standard AES256 – Advanced Encryption Standards 256bit AH - Authentication Header ALE - Annualized Loss Expectancy AP - Access Point API - Application Programming Interface ASP - Application Service Provider ARO - Annualized Rate of Occurrence ARP - Address Resolution Protocol AUP - Acceptable Use Policy BAC – Business Availability Center BCP – Business Continuity Planning BIA- Business Impact Analysis BIOS – Basic Input / Output System BPA – Business Partners Agreement BPDU – Bridge Protocol Data Unit BYOD – Bring Your Own Device CA – Certificate Authority CAC - Common Access Card CAN - Controller Area Network CAPTCHA- Completely Automated Public Turing Test to Tell Computers and Humans Apart CAR- Corrective Action Report CCMP – Counter-Mode/CBC-Mac Protocol CCTV - Closed-circuit television CERT – Computer Emergency Response Team CFB – Cipher Feedback CHAP – Challenge Handshake Authentication Protocol CIO-- Chief Information Officer CIRT – Computer Incident Response Team CMS – Content Management System COOP – Continuity of Operation Planning CP – Contingency Planning CRC – Cyclical Redundancy Check CRL – Certificate Signing Request CSP – Cloud Service Provider
  • 18. CompTIA Security+ Certification Exam Objectives v. 7 18 of 24 Copyright 2013 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice. CSR – Control Status Register CSRF – Cross-Site Request Forgery CSU – Channel Service Unit CTO- Chief Technology Officer DAC – Discretionary Access Control DBA– Database Administrator DDOS – Distributed Denial of Service DEP – Data Execution Prevention DES – Digital Encryption Standard DHCP – Dynamic Host Configuration Protocol DHE – Data-Handling Electronics DHE - Diffie-Hellman Ephemeral DLL - Dynamic Link Library DLP - Data Loss Prevention DMZ – Demilitarized Zone DNAT – Destination Network Address Transaction DNS – Domain Name Service (Server) DOS – Denial of Service DRP – Disaster Recovery Plan DSA – Digital Signature Algorithm DSL - Digital Subscriber line DSU – Data Service Unit EAP - Extensible Authentication Protocol ECC - Elliptic Curve Cryptography ECDHE – Elliptic Curve Diffie-Hellman Exchange ECDSA – Elliptic Curve Digital Signature Algorithm EFS – Encrypted File System EMI – Electromagnetic Interference ESN- Electronic Serial Number ESP – Encapsulated Security Payload FACL- File System Access Control List FDE– Full Disk Encryption FTP – File Transfer Protocol FTPS – Secured File Transfer Protocol GCM – Galois Counter Mode GPG – Gnu Privacy Guard GPO – Group Policy Object GPS – Global Positioning System GPU - Graphic Processing Unit GRE - Generic Routing Encapsulation HDD – Hard Disk Drive HIDS – Host Based Intrusion Detection System
  • 19. CompTIA Security+ Certification Exam Objectives v. 7 19 of 24 Copyright 2013 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice. HIPS – Host Based Intrusion Prevention System HMAC – Hashed Message Authentication Code HOTP – HMAC based One Time Password HSM – Hardware Security Module HTML – HyperText Markup Language HTTP – Hypertext Transfer Protocol HTTPS – Hypertext Transfer Protocol over SSL HVAC – Heating, Ventilation Air Conditioning IaaS - Infrastructure as a Service ICMP - Internet Control Message Protocol ICS – Industrial Control Systems ID – Identification IDF – Intermeidate Distribution Frame IdP – Identity Provider IDS – Intrusion Detection System IKE – Internet Key Exchange IM - Instant messaging IMAP4 - Internet Message Access Protocol v4 IP - Internet Protocol IPSEC – Internet Protocol Security IR– Incident Response IRC - Internet Relay Chat IRP – Incident Response Procedure ISA – Interconnection Security Agreement ISP – Internet Service Provider ISSO- Information Systems Security Officer ITCP – IT Contingency Plan IV - Initialization Vector JBOD– Just a Bunch of Disks KDC - Key Distribution Center KEK – Key Encryption Key L2TP – Layer 2 Tunneling Protocol LAN – Local Area Network LDAP – Lightweight Directory Access Protocol LEAP – Lightweight Extensible Authentication Protocol MaaS- Monitoring as a Service MAC – Mandatory Access Control / Media Access Control MAC - Message Authentication Code MAN - Metropolitan Area Network MBR – Master Boot Record MD5 – Message Digest 5 MDF – Main Distribution Frame
  • 20. CompTIA Security+ Certification Exam Objectives v. 7 20 of 24 Copyright 2013 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice. MITM – Man-in-the-Middle MOU – Memorandum of Understanding MPLS – Multi-Protocol Layer Switch MSCHAP – Microsoft Challenge Handshake Authentication Protocol MTBF – Mean Time Between Failures MTTR – Mean Time to Recover MTTF – Mean Time to Failure MTU - Maximum Transmission Unit NAC – Network Access Control NAT – Network Address Translation NDA – Non-Disclosure Agreement NFC– Near Field Communication NIDS – Network Based Intrusion Detection System NIPS – Network Based Intrusion Prevention System NIST – National Institute of Standards & Technology NOS – Network Operating System NTFS - New Technology File System NTLM – New Technology LANMAN NTP - Network Time Protocol OAUTH – Open Authorization OCSP – Online Certificate Status Protocol OLA – Open License Agreement OS – Operating System OVAL – Open Vulnerability Assessment Language P2P – Peer to Peer PAC– Proxy Auto Configuration PAM – Pluggable Authentication Modules PAP – Password Authentication Protocol PAT - Port Address Translation PBKDF2 – Password Based Key Derivation Function 2 PBX – Private Branch Exchange PCAP – Packet Capture PEAP – Protected Extensible Authentication Protocol PED - Personal Electronic Device PFS – Perfect Forward Secrecy PGP – Pretty Good Privacy PII – Personally Identifiable Information PIV – Personal Identity Verification PKI – Public Key Infrastructure POTS – Plain Old Telephone Service PPP - Point-to-point Protocol PPTP – Point to Point Tunneling Protocol
  • 21. CompTIA Security+ Certification Exam Objectives v. 7 21 of 24 Copyright 2013 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice. PSK – Pre-Shared Key PTZ – Pan-Tilt-Zoom RA – Recovery Agent RA – Registration Authrity RAD - Rapid application development RADIUS – Remote Authentication Dial-in User Server RAID – Redundant Array of Inexpensive Disks RAS – Remote Access Server RBAC – Role Based Access Control RBAC – Rule Based Access Control RC4 – RSA Variable Key Size Encryption Algorithm RIPEMD – RACE Integrity Primitives Evaluation Message Digest ROI – Return of Investment RPO – Recovery Point Objective RSA – Rivest, Shamir, & Adleman RTO – Recovery Time Objective RTP – Real-Time Transport Protocol S/MIME – Secure / Multipurpose Internet Mail Extensions SAML – Security Assertions Markup Language SaaS - Software as a Service SAN – Storage Area Network SCADA – System Control and Data Acquisition SCAP - Security Content Automation Protocol SCEP- Simple Certificate Enrollment Protocol SCSI - Small Computer System Interface SDLC - Software Development Life Cycle SDLM - Software Development Life Cycle Methodology SEH – Structured Exception Handler SHA – Secure Hashing Algorithm SFTP – Secured File Transfer Protocol SHTTP – Secure Hypertext Transfer Protocol SIEM – Security Information and Event Management SIM – Subscriber Identity Module SLA – Service Level Agreement SLE - Single Loss Expectancy SMS - Short Message Service SMTP – Simple Mail Transfer Protocol SMTPS – Simple Mail Transfer Protocol Secure SNMP - Simple Network Management Protocol SOAP – Simple Object Access Protocol SONET – Synchronous Optical Network Technologies SPIM - Spam over Internet Messaging
  • 22. CompTIA Security+ Certification Exam Objectives v. 7 22 of 24 Copyright 2013 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice. SQL – Structured Query Language SSD – Solid State Drive SSH – Secure Shell SSL – Secure Sockets Layer SSO – Single Sign On STP – Shielded Twisted Pair TACACS+ – Terminal Access Controller Access Control System TCP/IP – Transmission Control Protocol / Internet Protocol TGT– Ticket Granting Ticket TKIP - Temporal Key Integrity Protocol TLS – Transport Layer Security TOTP – Time-Based One-Time Password TPM – Trusted Platform Module TSIG – Transaction Signature UAT - User Acceptance Testing UEFI – Unified Extensible Firmware Interface UDP- User Datagram Protocol UPS - Uninterruptable Power Supply URI- Uniform Resource Identifier URL - Universal Resource Locator USB – Universal Serial Bus UTM- Unified Threat Management UTP – Unshielded Twisted Pair VDI – Virtualization Desktop Infrastructure VLAN – Virtual Local Area Network VLSM – Variable Length Subnet Masking VoIP - Voice over IP VPN – Virtual Private Network VTC – Video Teleconferencing WAF- Web-Application Firewall WAP – Wireless Access Point WEP – Wired Equivalent Privacy WIDS – Wireless Intrusion Detection System WIPS – Wireless Intrusion Prevention System WPA – Wireless Protected Access WPA2 – WiFi Protected Access 2 WPS – WiFi Protected Setup WTLS – Wireless TLS XML – Extensible Markup Language XSRF- Cross-Site Request Forgery XSS - Cross-Site Scripting
  • 23. CompTIA Security+ Certification Exam Objectives v. 7 23 of 24 Copyright 2013 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice. Suggested Classroom Equipment to have for Security+ Certification Training Equipment  Router  Firewall  Access point  Switch  IDS/IPS  Server  Content filter  Client  Mobile device  VPN concentrator  All in one appliance  Enterprise security managers / SIEM suite  Load balancer Spare parts/hardware  Keyboards, mice  Network cables  Monitors Tools  WiFi analyzers Software  Backtrack  Proxy server  Kali/BackTrack  Virtualization software
  • 24. CompTIA Security+ Certification Exam Objectives v. 7 24 of 24 Copyright 2013 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice.  Virtualized appliances  Wireshark  TCPdump  NMAP  OpenVAS  Metasploit  Backorifice  Cain & Abel  John the Ripper  PF Sense  Security Onion  Roo  Any UTM Other  Source Forge