SlideShare a Scribd company logo
1 of 26
Meet the
panel
Director, Certification Product Management
CompTIA
Jeff Peters
Director of Brand and Content Marketing
Infosec
Patrick Lane
Today’s
webcast
➢ CompTIA Security+ (SY0-701) overview
➢ Security+ SY0-701 changes
➢ Security+ SY0-701 domains & exam
➢ Security+ training resources
➢ Q&A
CompTIA Security+ overview
What is CompTIA Security+?
CompTIA Security+ is a global certification that
validates the foundational cybersecurity skills
necessary to perform core security functions and
pursue an IT security career.
⮚ SY0-701 Release: November 7, 2023
⮚ SY0-601 Retirement: July 31, 2024
Cybersecurity job market overview
4.7M cyber pros globally in the workforce and a 3.4M global shortage
Global cybersecurity market value expected to grow from $155B in 2022
to $376B by 2029
Of organizations with a shortage of cybersecurity staff, 43% said
the biggest cause is not being able to find enough qualified talent
Global cybersecurity job market stats
Security+ 701 job market
By the numbers
➢ 700,000+ IT pros have received their
Security+ certification
➢ 24% of the total employed cybersecurity
workforce in the U.S. are Security+ certified
(CyberSeek)
➢ 13% of the total cybersecurity job openings
request Security+ in the job req (CyberSeek)
Job role stats
➢ 86,000+ job postings listed in
2023 requested Security+
➢ $80,000 median pay for
Security+ job roles in 2023
Security+ 701 differentiation
Value messages
Launch a successful cybersecurity career. Develop a core foundation of essential skills, paving the way for a
fulfilling career. More job roles use Security+ for baseline cybersecurity skills than any other certification in the industry.
Assess on-the-job skills. Security+ is one of the only ISO/ANSI-accredited early career cybersecurity certifications on the
market with hands-on, performance-based questions on the certification exam. These practical questions assess your
ability to effectively problem solve in real-life situations and demonstrate your expertise to potential
employers immediately.
Embrace the latest trends. Understand and use the most recent advancements in cybersecurity technology,
terms, techniques, and tools. By acquiring early career skills in the latest trends such as automation, zero trust, risk
analysis, operational technology, and IoT, you will be well-equipped to excel in the ever-evolving cybersecurity landscape.
What is it?
CompTIA Security+ is a global certification that validates the foundational cybersecurity skills necessary to
perform core security functions and pursue an IT security career.
CompTIA cybersecurity career pathway
CompTIA certifications align with the skill sets needed to support and manage IT and
cybersecurity. Enter where appropriate for you. Consider your experience and existing
certifications or course of study.
*Next version of CASP+ to be
renamed CompTIA SecurityX
(CAS-005) for the Q4 2024 release.
Security+ exam changes
Security+ 701: Core cybersecurity skills
Security+ 701 has been updated to reflect skills relevant to job roles tasked with baseline security
readiness and response to address today’s threats — and to prepare candidates to be more
proactive in preventing the next attack. The certification exam covers the same:
➢ Assessing the security posture of an enterprise environment and recommending and implementing
appropriate security solutions
➢ Monitoring and securing hybrid environments, including cloud, mobile, Internet of Things (IoT) and
operational technology (OT)
➢ Operating with an awareness of applicable regulations and policies, including principles of governance,
risk and compliance
➢ Identifying, analyzing and responding to security events and incidents
20% of exam objectives were updated to include:
1. Current trends: The latest trends in threats, attacks, vulnerabilities, automation, zero trust, risk, IoT, OT
and cloud environments are emphasized, as well as communication, reporting and teamwork.
2. Hybrid environments: The latest techniques for cybersecurity professionals working in hybrid
environments that are located in the cloud and on premises; cybersecurity professionals should be
familiar with both worlds.
How is 701 different from 601?
1. Similar skill level: Exam continues to identify early
career cybersecurity skills at the two-year level
2. SY0-701 has the same number of exam domains (5)
but fewer objectives (28 vs. 35) due to a more focused
job role in a maturing industry
3. Related job roles are similar, although the work of a
security administrator has become more defined, and
the skills performed are identified with more accuracy.
NICE work roles increased.
4. Several exam domains and exam objectives were re-
ordered and re-named to address instructional design
improvements
5. Bloom’s taxonomy indicates more application of skills and
slightly less analysis overall
6. Governance, risk and compliance (GRC) tasks are better
defined for cybersecurity professionals with more focus on
reporting and communication, as opposed to the minutia of
different regulatory standards and their processes.
Security+ 701 Security+ 601 equivalent
1.0 General Security Concepts
2.0 Threats, Vulnerabilities & Mitigations
3.0 Security Architecture
--
4.0 Security Operations
5.0 Security Program Management
and Oversight
12%
22%
18%
28%
20%
--
1.0 Threats, Attacks and Vulnerabilities
2.0 Architecture and Design
3.0 Implementation
4.0 Operations and Incident Response
5.0 Governance, Risk and Compliance
24%
21%
25%
16%
14%
Job role comparison
Security+ 701 job roles Security+ 601 job roles
Primary job roles:
• Security administrator
• Systems administrator
Secondary job roles:
• Help desk analyst
• Security engineer
• Security analyst
• NICE Work Roles (18)
Primary job roles:
• Security administrator
• Systems administrator
Secondary job roles:
• Help desk manager / analyst
• Security engineer / analyst
• Network / Cloud engineer
• DevOps / Software developer
• IT auditors
• IT project manager
Organizations assisted in SY0-701 development​
Subject matter experts (SMEs) from the following organizations assisted with the development of SY0-701.
Some of the biggest contributors are listed below. ​
 Wells Fargo​
 Nationwide​
 Johns Hopkins University Applied Physics
Laboratory​
 Fidelis Risk Advisory​
 Lippert Components​
 Cyber Warfare Tactics LLC​
 Organon​
 Blue Chip Talent​
 Deakin University​
 Growth Arbor​
 Linford and Company LLC​
 MindPoint Group​
 Brotherhood Mutual​
 SS&C Technologies
 Five9​
 Fidelity Investments​
 Zoom​
 Microsoft​
 SenseOn
 U.S. Navy Center for Information Dominance​
 L3Harris​
 SecureWorks​
 General Dynamics IT (GDIT)​
 Washington State Patrol​
 Contentful
 Deloitte​
Security+ exam domains
1.0 General Security Concepts
SY0-701 Exam objectives
1.1 Compare and contrast various types of security controls.​
1.2 Summarize fundamental security concepts.​
1.3 Explain the importance of change management processes and the impact to
security.​
1.4 Explain the importance of using appropriate cryptographic solutions.​
2.0 Threats, Vulnerabilities & Mitigations
SY0-701 Exam objectives
2.1 Compare and contrast common threat actors and motivations.​
2.2 Explain common threat vectors and attack surfaces.​
2.3 Explain various types of vulnerabilities.​
2.4 Given a scenario, analyze indicators of malicious activity.​
2.5 Explain the purpose of mitigation techniques used to secure the enterprise.​
3.0 Security Architecture
SY0-701 Exam objectives
3.1 Compare and contrast security implications of different architecture models.​
3.2 Given a scenario, apply security principles to secure enterprise infrastructure.​
3.3 Compare and contrast concepts and strategies to protect data.​
3.4 Explain the importance of resilience and recovery in security architecture.​
4.0 Security Operations
SY0-701 Exam objectives
4.1 Given a scenario, apply common security techniques to computing resources.​
4.2 Explain the security implications of proper hardware, software and data asset
management.​
4.3 Explain various activities associated with vulnerability management.​
4.4 Explain security alerting and monitoring concepts and tools.​
4.5 Given a scenario, modify enterprise capabilities to enhance security.​
4.6 Given a scenario, implement and maintain identity and access management.​
4.7 Explain the importance of automation and orchestration related to secure
operations.​
4.8 Explain appropriate incident response activities.​
4.9 Given a scenario, use data sources to support an investigation.​
5.0 Security Program Management & Oversight
SY0-701 Exam objectives
5.1 Summarize elements of effective security governance.​
5.2 Explain elements of the risk management process.​
5.3 Explain the processes associated with third-party risk assessment and
management.​
5.4 Summarize elements of effective security compliance.​
5.5 Explain types and purposes of audits and assessments.​
5.6 Given a scenario, implement security awareness practices.​
Security+ SY0-701 exam details
Item Description
Exam code SY0-701
Launch date November 7, 2023
Availability Worldwide
Retail price $392 USD
Testing Provider Pearson VUE Testing Centers, OnVUE
Question types Performance based and multiple choice
# of questions Maximum of 90 questions
Length of exam 90 minutes
Passing score 750 (on a scale of 100-900)
Languages English, with Japanese, Portuguese and Spanish to follow
Recommended
experience
CompTIA Network+ and two years of experience working in a security/systems administrator job role
Exam retirement SY0-701 to retire July 31, 2024 (English) with other languages to follow
Security+ training resources
CompTIA Authorized Training Partner
Two ways to train for your Security+ certification:
Security+ Boot Camp
➢ 90-day extended access to Boot Camp
components, including class recordings
➢ 100% Satisfaction Guarantee
➢ Exam Pass Guarantee
➢ Exam voucher
➢ Free 90-day Infosec Skills subscription (access
to 1,400+ additional courses and labs)
➢ Hands-on cyber ranges and labs
➢ Knowledge Transfer Guarantee
➢ Onsite proctoring of exam
➢ Pre-study learning path
➢ Unlimited practice exam attempts
Infosec Skills subscription
➢ 190+ role-guided learning paths (e.g.,
Security+, CySA+, Incident Response,
Ethical Hacking)
➢ 100s of hands-on labs in cloud-hosted
cyber ranges
➢ Custom certification practice exams (e.g.,
Security+, CySA+)
➢ Skill assessments
➢ Infosec peer community support
Questions?
About us
Infosec puts people at the center of
cybersecurity through role-guided
training that’s accessible and engaging.
We help IT and security professionals
advance their careers with skills
development and certifications while
empowering all employees with security
awareness and phishing training to stay
cyber-safe at work and home.
www.infosecinstitute.com

More Related Content

What's hot

Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMEAlienVault
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecturePriyanka Aash
 
Threat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptxThreat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptxInfosec
 
Introduction: CISSP Certification
Introduction: CISSP CertificationIntroduction: CISSP Certification
Introduction: CISSP CertificationSam Bowne
 
Join the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptxJoin the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptxInfosec
 
CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to knowCompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to knowInfosec
 
Security Policies
Security PoliciesSecurity Policies
Security Policiesphanleson
 
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...Edureka!
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceDavid J Rosenthal
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmPriyanka Aash
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation centerMuhammad Sahputra
 
Dragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations CenterDragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations CenterDragos, Inc.
 
Cisco Integrated Selling Process Presentation
Cisco Integrated Selling Process PresentationCisco Integrated Selling Process Presentation
Cisco Integrated Selling Process PresentationContent Rules, Inc.
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited ResourcesLogRhythm
 
Cybersecurity Fundamental Course by Haris Chughtai.pdf
Cybersecurity Fundamental Course by Haris Chughtai.pdfCybersecurity Fundamental Course by Haris Chughtai.pdf
Cybersecurity Fundamental Course by Haris Chughtai.pdfHaris Chughtai
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Sqrrl
 
cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architectureBirendra Negi ☁️
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)Vijilan IT Security solutions
 

What's hot (20)

Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
 
Threat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptxThreat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptx
 
Introduction: CISSP Certification
Introduction: CISSP CertificationIntroduction: CISSP Certification
Introduction: CISSP Certification
 
Join the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptxJoin the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptx
 
CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to knowCompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
 
Security Policies
Security PoliciesSecurity Policies
Security Policies
 
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
Dragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations CenterDragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations Center
 
Cisco Integrated Selling Process Presentation
Cisco Integrated Selling Process PresentationCisco Integrated Selling Process Presentation
Cisco Integrated Selling Process Presentation
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources
 
Cybersecurity Fundamental Course by Haris Chughtai.pdf
Cybersecurity Fundamental Course by Haris Chughtai.pdfCybersecurity Fundamental Course by Haris Chughtai.pdf
Cybersecurity Fundamental Course by Haris Chughtai.pdf
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architecture
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
 

Similar to 2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx

CompTIA Security+: Everything you need to know about the SY0-601 update
CompTIA Security+: Everything you need to know about the SY0-601 updateCompTIA Security+: Everything you need to know about the SY0-601 update
CompTIA Security+: Everything you need to know about the SY0-601 updateInfosec
 
Meeting the Cybersecurity Skills Challenge with CompTIA Security+
Meeting the Cybersecurity Skills Challenge with CompTIA Security+Meeting the Cybersecurity Skills Challenge with CompTIA Security+
Meeting the Cybersecurity Skills Challenge with CompTIA Security+CompTIA
 
CompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to knowCompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to knowInfosec
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec trainInfosecTrain
 
4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdfJose R
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxYoisRoberthTapiadeLa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxVictoriaChavesta
 
CompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examCompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examInfosec
 
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...PECB
 
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...CompTIA
 
What’s New in CYSA+ Exam (CSO-002).pdf
What’s New in CYSA+ Exam (CSO-002).pdfWhat’s New in CYSA+ Exam (CSO-002).pdf
What’s New in CYSA+ Exam (CSO-002).pdfinfosec train
 
Cyber-Security Certifications
Cyber-Security CertificationsCyber-Security Certifications
Cyber-Security CertificationsNithin Sai
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Needsimplyme12345
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quanticoTuan Phan
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security StrategyAndrew Byers
 
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOpsInfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOpsVMware Tanzu
 

Similar to 2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx (20)

CompTIA Security+: Everything you need to know about the SY0-601 update
CompTIA Security+: Everything you need to know about the SY0-601 updateCompTIA Security+: Everything you need to know about the SY0-601 update
CompTIA Security+: Everything you need to know about the SY0-601 update
 
Meeting the Cybersecurity Skills Challenge with CompTIA Security+
Meeting the Cybersecurity Skills Challenge with CompTIA Security+Meeting the Cybersecurity Skills Challenge with CompTIA Security+
Meeting the Cybersecurity Skills Challenge with CompTIA Security+
 
CompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to knowCompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to know
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec train
 
4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Activity1 c1
Activity1 c1Activity1 c1
Activity1 c1
 
CompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examCompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the exam
 
Under Defense
Under DefenseUnder Defense
Under Defense
 
CompTIA PenTest+ BETA EXAM CODE PT1-001
CompTIA PenTest+BETA EXAM CODE PT1-001CompTIA PenTest+BETA EXAM CODE PT1-001
CompTIA PenTest+ BETA EXAM CODE PT1-001
 
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...
 
What’s New in CYSA+ Exam (CSO-002).pdf
What’s New in CYSA+ Exam (CSO-002).pdfWhat’s New in CYSA+ Exam (CSO-002).pdf
What’s New in CYSA+ Exam (CSO-002).pdf
 
Cyber-Security Certifications
Cyber-Security CertificationsCyber-Security Certifications
Cyber-Security Certifications
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Need
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quantico
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOpsInfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
 

More from Infosec

AWS Certified DevOps Engineer: What it is and how to get certified
AWS Certified DevOps Engineer: What it is and how to get certifiedAWS Certified DevOps Engineer: What it is and how to get certified
AWS Certified DevOps Engineer: What it is and how to get certifiedInfosec
 
AWS Cloud Operations Administrator: What it is and how to get certified
AWS Cloud Operations Administrator: What it is and how to get certifiedAWS Cloud Operations Administrator: What it is and how to get certified
AWS Cloud Operations Administrator: What it is and how to get certifiedInfosec
 
AWS Certified Security - Specialty: What it is and how to get certified
AWS Certified Security - Specialty: What it is and how to get certifiedAWS Certified Security - Specialty: What it is and how to get certified
AWS Certified Security - Specialty: What it is and how to get certifiedInfosec
 
AWS Certified Solutions Architect Webinar.pptx
AWS Certified Solutions Architect Webinar.pptxAWS Certified Solutions Architect Webinar.pptx
AWS Certified Solutions Architect Webinar.pptxInfosec
 
Infosec and AWS - A new way to train for your AWS certification (1).pptx
Infosec and AWS - A new way to train for your AWS certification (1).pptxInfosec and AWS - A new way to train for your AWS certification (1).pptx
Infosec and AWS - A new way to train for your AWS certification (1).pptxInfosec
 
How AI and ChatGPT are changing cybersecurity forever.pptx
How AI and ChatGPT are changing cybersecurity forever.pptxHow AI and ChatGPT are changing cybersecurity forever.pptx
How AI and ChatGPT are changing cybersecurity forever.pptxInfosec
 
NCSAM 2023 Webinar.pptx
NCSAM 2023 Webinar.pptxNCSAM 2023 Webinar.pptx
NCSAM 2023 Webinar.pptxInfosec
 
Skills training value: How to differentiate your staff and your organization ...
Skills training value: How to differentiate your staff and your organization ...Skills training value: How to differentiate your staff and your organization ...
Skills training value: How to differentiate your staff and your organization ...Infosec
 
Learning ≠ Education: How people really learn and what it means for security ...
Learning ≠ Education: How people really learn and what it means for security ...Learning ≠ Education: How people really learn and what it means for security ...
Learning ≠ Education: How people really learn and what it means for security ...Infosec
 
Security awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter mostSecurity awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter mostInfosec
 
How to do application security right
How to do application security rightHow to do application security right
How to do application security rightInfosec
 
A public discussion about privacy careers: Training, certification and experi...
A public discussion about privacy careers: Training, certification and experi...A public discussion about privacy careers: Training, certification and experi...
A public discussion about privacy careers: Training, certification and experi...Infosec
 
Learn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident responseLearn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident responseInfosec
 
Get started in cybersecurity in 2022
Get started in cybersecurity in 2022Get started in cybersecurity in 2022
Get started in cybersecurity in 2022Infosec
 
CompTIA network+ | Everything you need to know about the new exam
CompTIA network+ | Everything you need to know about the new examCompTIA network+ | Everything you need to know about the new exam
CompTIA network+ | Everything you need to know about the new examInfosec
 
Isaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industryIsaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industryInfosec
 
CMMC case study: Inside a CMMC assessment
CMMC case study: Inside a CMMC assessmentCMMC case study: Inside a CMMC assessment
CMMC case study: Inside a CMMC assessmentInfosec
 
CMMC rollout: How CMMC will impact your organization
CMMC rollout: How CMMC will impact your organizationCMMC rollout: How CMMC will impact your organization
CMMC rollout: How CMMC will impact your organizationInfosec
 
Solar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesSolar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesInfosec
 
From machine learning to deepfakes - how AI is revolutionizing cybersecurity
From machine learning to deepfakes - how AI is revolutionizing cybersecurityFrom machine learning to deepfakes - how AI is revolutionizing cybersecurity
From machine learning to deepfakes - how AI is revolutionizing cybersecurityInfosec
 

More from Infosec (20)

AWS Certified DevOps Engineer: What it is and how to get certified
AWS Certified DevOps Engineer: What it is and how to get certifiedAWS Certified DevOps Engineer: What it is and how to get certified
AWS Certified DevOps Engineer: What it is and how to get certified
 
AWS Cloud Operations Administrator: What it is and how to get certified
AWS Cloud Operations Administrator: What it is and how to get certifiedAWS Cloud Operations Administrator: What it is and how to get certified
AWS Cloud Operations Administrator: What it is and how to get certified
 
AWS Certified Security - Specialty: What it is and how to get certified
AWS Certified Security - Specialty: What it is and how to get certifiedAWS Certified Security - Specialty: What it is and how to get certified
AWS Certified Security - Specialty: What it is and how to get certified
 
AWS Certified Solutions Architect Webinar.pptx
AWS Certified Solutions Architect Webinar.pptxAWS Certified Solutions Architect Webinar.pptx
AWS Certified Solutions Architect Webinar.pptx
 
Infosec and AWS - A new way to train for your AWS certification (1).pptx
Infosec and AWS - A new way to train for your AWS certification (1).pptxInfosec and AWS - A new way to train for your AWS certification (1).pptx
Infosec and AWS - A new way to train for your AWS certification (1).pptx
 
How AI and ChatGPT are changing cybersecurity forever.pptx
How AI and ChatGPT are changing cybersecurity forever.pptxHow AI and ChatGPT are changing cybersecurity forever.pptx
How AI and ChatGPT are changing cybersecurity forever.pptx
 
NCSAM 2023 Webinar.pptx
NCSAM 2023 Webinar.pptxNCSAM 2023 Webinar.pptx
NCSAM 2023 Webinar.pptx
 
Skills training value: How to differentiate your staff and your organization ...
Skills training value: How to differentiate your staff and your organization ...Skills training value: How to differentiate your staff and your organization ...
Skills training value: How to differentiate your staff and your organization ...
 
Learning ≠ Education: How people really learn and what it means for security ...
Learning ≠ Education: How people really learn and what it means for security ...Learning ≠ Education: How people really learn and what it means for security ...
Learning ≠ Education: How people really learn and what it means for security ...
 
Security awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter mostSecurity awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter most
 
How to do application security right
How to do application security rightHow to do application security right
How to do application security right
 
A public discussion about privacy careers: Training, certification and experi...
A public discussion about privacy careers: Training, certification and experi...A public discussion about privacy careers: Training, certification and experi...
A public discussion about privacy careers: Training, certification and experi...
 
Learn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident responseLearn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident response
 
Get started in cybersecurity in 2022
Get started in cybersecurity in 2022Get started in cybersecurity in 2022
Get started in cybersecurity in 2022
 
CompTIA network+ | Everything you need to know about the new exam
CompTIA network+ | Everything you need to know about the new examCompTIA network+ | Everything you need to know about the new exam
CompTIA network+ | Everything you need to know about the new exam
 
Isaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industryIsaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industry
 
CMMC case study: Inside a CMMC assessment
CMMC case study: Inside a CMMC assessmentCMMC case study: Inside a CMMC assessment
CMMC case study: Inside a CMMC assessment
 
CMMC rollout: How CMMC will impact your organization
CMMC rollout: How CMMC will impact your organizationCMMC rollout: How CMMC will impact your organization
CMMC rollout: How CMMC will impact your organization
 
Solar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesSolar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenches
 
From machine learning to deepfakes - how AI is revolutionizing cybersecurity
From machine learning to deepfakes - how AI is revolutionizing cybersecurityFrom machine learning to deepfakes - how AI is revolutionizing cybersecurity
From machine learning to deepfakes - how AI is revolutionizing cybersecurity
 

Recently uploaded

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 

Recently uploaded (20)

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 

2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx

  • 1.
  • 2. Meet the panel Director, Certification Product Management CompTIA Jeff Peters Director of Brand and Content Marketing Infosec Patrick Lane
  • 3. Today’s webcast ➢ CompTIA Security+ (SY0-701) overview ➢ Security+ SY0-701 changes ➢ Security+ SY0-701 domains & exam ➢ Security+ training resources ➢ Q&A
  • 5. What is CompTIA Security+? CompTIA Security+ is a global certification that validates the foundational cybersecurity skills necessary to perform core security functions and pursue an IT security career. ⮚ SY0-701 Release: November 7, 2023 ⮚ SY0-601 Retirement: July 31, 2024
  • 6. Cybersecurity job market overview 4.7M cyber pros globally in the workforce and a 3.4M global shortage Global cybersecurity market value expected to grow from $155B in 2022 to $376B by 2029 Of organizations with a shortage of cybersecurity staff, 43% said the biggest cause is not being able to find enough qualified talent Global cybersecurity job market stats
  • 7. Security+ 701 job market By the numbers ➢ 700,000+ IT pros have received their Security+ certification ➢ 24% of the total employed cybersecurity workforce in the U.S. are Security+ certified (CyberSeek) ➢ 13% of the total cybersecurity job openings request Security+ in the job req (CyberSeek) Job role stats ➢ 86,000+ job postings listed in 2023 requested Security+ ➢ $80,000 median pay for Security+ job roles in 2023
  • 8. Security+ 701 differentiation Value messages Launch a successful cybersecurity career. Develop a core foundation of essential skills, paving the way for a fulfilling career. More job roles use Security+ for baseline cybersecurity skills than any other certification in the industry. Assess on-the-job skills. Security+ is one of the only ISO/ANSI-accredited early career cybersecurity certifications on the market with hands-on, performance-based questions on the certification exam. These practical questions assess your ability to effectively problem solve in real-life situations and demonstrate your expertise to potential employers immediately. Embrace the latest trends. Understand and use the most recent advancements in cybersecurity technology, terms, techniques, and tools. By acquiring early career skills in the latest trends such as automation, zero trust, risk analysis, operational technology, and IoT, you will be well-equipped to excel in the ever-evolving cybersecurity landscape. What is it? CompTIA Security+ is a global certification that validates the foundational cybersecurity skills necessary to perform core security functions and pursue an IT security career.
  • 9. CompTIA cybersecurity career pathway CompTIA certifications align with the skill sets needed to support and manage IT and cybersecurity. Enter where appropriate for you. Consider your experience and existing certifications or course of study. *Next version of CASP+ to be renamed CompTIA SecurityX (CAS-005) for the Q4 2024 release.
  • 11. Security+ 701: Core cybersecurity skills Security+ 701 has been updated to reflect skills relevant to job roles tasked with baseline security readiness and response to address today’s threats — and to prepare candidates to be more proactive in preventing the next attack. The certification exam covers the same: ➢ Assessing the security posture of an enterprise environment and recommending and implementing appropriate security solutions ➢ Monitoring and securing hybrid environments, including cloud, mobile, Internet of Things (IoT) and operational technology (OT) ➢ Operating with an awareness of applicable regulations and policies, including principles of governance, risk and compliance ➢ Identifying, analyzing and responding to security events and incidents 20% of exam objectives were updated to include: 1. Current trends: The latest trends in threats, attacks, vulnerabilities, automation, zero trust, risk, IoT, OT and cloud environments are emphasized, as well as communication, reporting and teamwork. 2. Hybrid environments: The latest techniques for cybersecurity professionals working in hybrid environments that are located in the cloud and on premises; cybersecurity professionals should be familiar with both worlds.
  • 12. How is 701 different from 601? 1. Similar skill level: Exam continues to identify early career cybersecurity skills at the two-year level 2. SY0-701 has the same number of exam domains (5) but fewer objectives (28 vs. 35) due to a more focused job role in a maturing industry 3. Related job roles are similar, although the work of a security administrator has become more defined, and the skills performed are identified with more accuracy. NICE work roles increased. 4. Several exam domains and exam objectives were re- ordered and re-named to address instructional design improvements 5. Bloom’s taxonomy indicates more application of skills and slightly less analysis overall 6. Governance, risk and compliance (GRC) tasks are better defined for cybersecurity professionals with more focus on reporting and communication, as opposed to the minutia of different regulatory standards and their processes. Security+ 701 Security+ 601 equivalent 1.0 General Security Concepts 2.0 Threats, Vulnerabilities & Mitigations 3.0 Security Architecture -- 4.0 Security Operations 5.0 Security Program Management and Oversight 12% 22% 18% 28% 20% -- 1.0 Threats, Attacks and Vulnerabilities 2.0 Architecture and Design 3.0 Implementation 4.0 Operations and Incident Response 5.0 Governance, Risk and Compliance 24% 21% 25% 16% 14%
  • 13. Job role comparison Security+ 701 job roles Security+ 601 job roles Primary job roles: • Security administrator • Systems administrator Secondary job roles: • Help desk analyst • Security engineer • Security analyst • NICE Work Roles (18) Primary job roles: • Security administrator • Systems administrator Secondary job roles: • Help desk manager / analyst • Security engineer / analyst • Network / Cloud engineer • DevOps / Software developer • IT auditors • IT project manager
  • 14.
  • 15. Organizations assisted in SY0-701 development​ Subject matter experts (SMEs) from the following organizations assisted with the development of SY0-701. Some of the biggest contributors are listed below. ​  Wells Fargo​  Nationwide​  Johns Hopkins University Applied Physics Laboratory​  Fidelis Risk Advisory​  Lippert Components​  Cyber Warfare Tactics LLC​  Organon​  Blue Chip Talent​  Deakin University​  Growth Arbor​  Linford and Company LLC​  MindPoint Group​  Brotherhood Mutual​  SS&C Technologies  Five9​  Fidelity Investments​  Zoom​  Microsoft​  SenseOn  U.S. Navy Center for Information Dominance​  L3Harris​  SecureWorks​  General Dynamics IT (GDIT)​  Washington State Patrol​  Contentful  Deloitte​
  • 17. 1.0 General Security Concepts SY0-701 Exam objectives 1.1 Compare and contrast various types of security controls.​ 1.2 Summarize fundamental security concepts.​ 1.3 Explain the importance of change management processes and the impact to security.​ 1.4 Explain the importance of using appropriate cryptographic solutions.​
  • 18. 2.0 Threats, Vulnerabilities & Mitigations SY0-701 Exam objectives 2.1 Compare and contrast common threat actors and motivations.​ 2.2 Explain common threat vectors and attack surfaces.​ 2.3 Explain various types of vulnerabilities.​ 2.4 Given a scenario, analyze indicators of malicious activity.​ 2.5 Explain the purpose of mitigation techniques used to secure the enterprise.​
  • 19. 3.0 Security Architecture SY0-701 Exam objectives 3.1 Compare and contrast security implications of different architecture models.​ 3.2 Given a scenario, apply security principles to secure enterprise infrastructure.​ 3.3 Compare and contrast concepts and strategies to protect data.​ 3.4 Explain the importance of resilience and recovery in security architecture.​
  • 20. 4.0 Security Operations SY0-701 Exam objectives 4.1 Given a scenario, apply common security techniques to computing resources.​ 4.2 Explain the security implications of proper hardware, software and data asset management.​ 4.3 Explain various activities associated with vulnerability management.​ 4.4 Explain security alerting and monitoring concepts and tools.​ 4.5 Given a scenario, modify enterprise capabilities to enhance security.​ 4.6 Given a scenario, implement and maintain identity and access management.​ 4.7 Explain the importance of automation and orchestration related to secure operations.​ 4.8 Explain appropriate incident response activities.​ 4.9 Given a scenario, use data sources to support an investigation.​
  • 21. 5.0 Security Program Management & Oversight SY0-701 Exam objectives 5.1 Summarize elements of effective security governance.​ 5.2 Explain elements of the risk management process.​ 5.3 Explain the processes associated with third-party risk assessment and management.​ 5.4 Summarize elements of effective security compliance.​ 5.5 Explain types and purposes of audits and assessments.​ 5.6 Given a scenario, implement security awareness practices.​
  • 22. Security+ SY0-701 exam details Item Description Exam code SY0-701 Launch date November 7, 2023 Availability Worldwide Retail price $392 USD Testing Provider Pearson VUE Testing Centers, OnVUE Question types Performance based and multiple choice # of questions Maximum of 90 questions Length of exam 90 minutes Passing score 750 (on a scale of 100-900) Languages English, with Japanese, Portuguese and Spanish to follow Recommended experience CompTIA Network+ and two years of experience working in a security/systems administrator job role Exam retirement SY0-701 to retire July 31, 2024 (English) with other languages to follow
  • 24. CompTIA Authorized Training Partner Two ways to train for your Security+ certification: Security+ Boot Camp ➢ 90-day extended access to Boot Camp components, including class recordings ➢ 100% Satisfaction Guarantee ➢ Exam Pass Guarantee ➢ Exam voucher ➢ Free 90-day Infosec Skills subscription (access to 1,400+ additional courses and labs) ➢ Hands-on cyber ranges and labs ➢ Knowledge Transfer Guarantee ➢ Onsite proctoring of exam ➢ Pre-study learning path ➢ Unlimited practice exam attempts Infosec Skills subscription ➢ 190+ role-guided learning paths (e.g., Security+, CySA+, Incident Response, Ethical Hacking) ➢ 100s of hands-on labs in cloud-hosted cyber ranges ➢ Custom certification practice exams (e.g., Security+, CySA+) ➢ Skill assessments ➢ Infosec peer community support
  • 26. About us Infosec puts people at the center of cybersecurity through role-guided training that’s accessible and engaging. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and phishing training to stay cyber-safe at work and home. www.infosecinstitute.com