3. www.infosectrain.com
The CompTIA Security+ SY0-701 course from InfosecTrain, provides a
comprehensive and expert-led training experience, covering five key
domains that are essential for understanding and excelling in the field of
information security. Participants will delve into general security concepts,
threats, vulnerabilities, mitigations, security architecture, security
operations, and security program management. The course features
practical exercises and hands-on labs to develop participantâs skills,
ensuring that participants are well-prepared for the SY0-701
certification exam.
COURSE DESCRIPTION
Overview
4. www.infosectrain.com
â˘System Administrators
â˘Security Engineers and Consultants
â˘Network Administrators
â˘IT Auditors/Penetration Testers
⢠CompTIA A+ and CompTIA Network+
⢠It is recommended to have at least 2 years of experience in IT
administration with a focus on security, hands-on experience with
technical information security, and broad knowledge of security concepts.
www.infosectrain.com
PRE-Requisites
TARGET-Audience
5. www.infosectrain.com
EXAM
Exam Code SY0-601 SY0-701
Launch Date 12th, November 2020 7th, November 2023
Exam Description The CompTIA Security+ certification exam ensures that
candidates possess the expertise and proficiencies necessary
to evaluate the security standing of enterprise environments,
suggest and execute suitable security solutions, oversee and
secure hybrid environments that encompass cloud, mobile, and
IoT, and conduct operations in alignment with relevant laws and
regulations, encompassing governance, risk management, and
compliance principles. Furthermore, it attests to candidatesâ
ability to effectively identify, assess, and manage security
events and incidents.
Recommended
Experience
CompTIA Network+ and two
years of experience in IT
administration with a
security focus
CompTIA Network+ and two
years of experience working
in a security/ systems
administrator job role
Number of Questions Maximum of 90 Questions
Exam Format Multiple Choice and Performance-Based
Exam Duration 90 Minutes
Passing Score 750 (on a scale of 100-900)
Languages English, Japanese, Portuguese, and Spanish
Retirement July 2024 TBD â Usually three years
after launch
Information
6. www.infosectrain.com
COMPTIA SECURITY+ SY0-701
COURSE OBJECTIVES
ďŠ Develop a comprehensive understanding of foundational security concepts
and principles that serve as the cornerstone of cybersecurity.
ďŠ Learn to identify, assess, and mitigate various threats, vulnerabilities, and risks
that can compromise the security of digital environments.
ďŠ Master the principles and practices of designing, implementing, and managing
a robust security architecture that can withstand diverse cyber threats.
ďŠ Gain expertise in day-to-day security operations, including incident
response, monitoring, and safeguarding critical assets.
ďŠ Acquire the knowledge and skills required to oversee and manage a
security program effectively, ensuring compliance, governance, and the
protection of valuable data.
www.infosectrain.com
7. www.infosectrain.com
URSE CONTENT
Domain 1 General Security Concepts (12%)
Domain 2 Threats, Vulnerabilities, and Mitigations (22%)
Domain 3 Security Architecture (18%)
Domain 4 Security Operations (28%)
Domain 5 Security Program Management and Oversight (20%)
CO
8. www.infosectrain.com
1.1: Compare and Contrast Various Types of Security Controls
1.2: Summarize Fundamental Security Concepts
ďŠ Categories
ďŠ Confidentiality, Integrity, and Availability (CIA)
ďŠ Non-Repudiation
ďŠ Authentication, Authorization, and Accounting (AAA)
ďŠ Control
â˘Technical
â˘Managerial
â˘Operational
â˘Physical
â˘Preventive
â˘Deterrent
â˘Detective
â˘Corrective
â˘Compensating
â˘Directive
â˘Authenticating People
â˘Authenticating Systems
â˘Authorization Models
ďŠ Gap Analysis
ďŠ Zero Trust
General Security Concepts
Domain 01
9. www.infosectrain.com
ďŠ Physical Security
â˘Adaptive Identity
â˘Threat Scope Reduction
â˘Policy-Driven Access Control
â˘Policy Administrator
â˘Policy Engine
â˘Implicit Trust Zones
â˘Subject/System
â˘Policy Enforcement Point
ďŠ Infrared
ďŠ Pressure
ďŠ Microwave
ďŠ Ultrasonic
ďŠ Control Plane
â˘Bollards
â˘Access Control Vestibule
â˘Fencing
â˘Video Surveillance
â˘Security Guard
â˘Access Badge
â˘Lighting
â˘Sensors
ďŠ Data Plane
10. www.infosectrain.com
â˘Honeypot
â˘Honeynet
â˘Honeyfile
â˘Honeytoken
ďŠ Deception and Disruption Technology
ďŠ Business Processes Impacting Security Operation
ďŠ Technical Implications
â˘Approval process
â˘Ownership
â˘Stakeholders
â˘Impact Analysis
â˘Test Results
â˘Backout Plan
â˘Maintenance Window
â˘Standard Operating Procedure
â˘Allow Lists/Deny Lists
â˘Restricted Activities
â˘Downtime
â˘Service Restart
â˘Application Restart
â˘Legacy Applications
â˘Dependencies
1.3: Explain the Importance of Change Management Processes and
the Impact to Security
11. www.infosectrain.com
ďŠ Documentation
ďŠ Version Control
â˘Updating Diagrams
â˘Updating Policies/Procedures
â˘Public Key
â˘Private Key
â˘Key Escrow
â˘Full-Disk
â˘Partition
â˘File
â˘Volume
â˘Database
â˘Record
ďŠ Level
â˘Transport/Communication
â˘Asymmetric
â˘Symmetric
â˘Key Exchange
â˘Algorithms
â˘Key length
ďŠ Public Key Infrastructure (PKI)
ďŠ Encryption
1.4: Explain the Importance of Using Appropriate Cryptographic Solutions
19. www.infosectrain.com
ďŠ Segmentation
ďŠ Access Control
â˘Application Allow List
â˘Isolation
â˘Patching
â˘Encryption
â˘Monitoring
â˘Least Privilege
â˘Configuration Enforcement
â˘Decommissioning
â˘Hardening Techniques
â˘Access Control List (ACL)
â˘Permissions
â˘Encryption
â˘Installation of Endpoint Protection
â˘Host-Based Firewall
â˘Host-Based Intrusion Prevention System (HIPS)
â˘Disabling Ports/Protocols
â˘Default Password Changes
â˘Removal of Unnecessary Software
2.5: Explain the Purpose of Mitigation Techniques Used to Secure
the Enterprise
20. www.infosectrain.com
Domain 03
â˘Responsibility Matrix
â˘Hybrid Considerations
â˘Third-Party Vendors
â˘On-Premises
â˘Centralized vs. Decentralized
â˘Containerization
â˘Virtualization
â˘IoT
â˘Industrial Control Systems (ICS)/
â˘Supervisory Control and Data Acquisition (SCADA)
â˘Real-Time Operating System (RTOS)
â˘Embedded Systems
â˘High availability
ďŠ Architecture and Infrastructure Concepts
â˘Cloud
â˘Infrastructure as Code (IaC)
â˘Serverless
â˘Microservices
â˘Network Infrastructure
Security Architecture
3.1: Compare and Contrast Security Implications of Different
Architecture Models
21. www.infosectrain.com
ďŠ Considerations
â˘Availability
â˘Resilience
â˘Cost
â˘Responsiveness
â˘Scalability
â˘Ease of Deployment
â˘Risk Transference
â˘Ease of Recovery
â˘Patch Availability
â˘Inability to Patch
â˘Power
â˘Compute
ďŠ Infrastructure Considerations
â˘Device Placement
â˘Security Zones
â˘Attack Surface
â˘Connectivity
â˘Failure Modes
ďŠ Device Attribute
â˘Fail-Open
â˘Fail-Closed
â˘Active vs. Passive
â˘Inline vs. Tap/Monitor
3.2: Given a Scenario, Apply Security Principles to Secure Enterprise
22. www.infosectrain.com
â˘Jump Server
â˘Proxy Server
â˘Intrusion Prevention System (IPS)/Intrusion Detection System (IDS)
â˘Load Balancer
â˘Sensor
â˘802.1X
â˘Extensible Authentication
â˘Web Application Firewall (WAF)
â˘Unified Threat Management (UTM)
â˘Next-Generation Firewall (NGFW)
â˘Layer 4/Layer 7
â˘Virtual Private Network (VPN)
â˘Remote Access
â˘Tunneling
â˘Software-Defined Wide Area Network (SD-WAN)
â˘Secure Access Service Edge (SASE)
â˘Transport Layer Security (TLS)
â˘Internet Protocol Security (IPSec)
ďŠ Network Appliances
ďŠ Port Security
ďŠ Firewall Types
ďŠ Secure Communication/Access
ďŠ Selection of Effective Controls
23. www.infosectrain.com
ďŠ Data Types
ďŠ Data Classifications
ďŠ General Data Considerations
â˘Regulated
â˘Trade Secret
â˘Intellectual Property
â˘Legal Information
â˘Financial Information
â˘Human and Non-Human-Readable
â˘Sensitive
â˘Confidential
â˘Public
â˘Restricted
â˘Private
â˘Critica
â˘Data States
â˘Data Sovereignty
â˘Geolocation
â˘Data at Rest
â˘Data in Transit
â˘Data in Use
3.3: Compare and Contrast Concepts and Strategies to Protect Data
24. www.infosectrain.com
ďŠ High Availability
â˘Site Considerations
â˘Platform Diversity
â˘Multi-Cloud Systems
â˘Continuity of Operations
â˘Capacity Planning
ďŠ Methods to Secure Data
â˘Load Balancing vs. Clustering
â˘Hot
â˘Cold
â˘Warm
â˘Geographic Dispersion
â˘Geographic Restrictions
â˘Encryption
â˘Hashing
â˘Masking
â˘Tokenization
â˘Obfuscation
â˘Segmentation
â˘Permission Restrictions
3.4: Explain the Importance of Resilience and Recovery in Security
Architecture
35. www.infosectrain.com
â˘Password Managers
â˘Passwordless
ďŠ Privileged Access Management Tools
â˘Just-in-Time Permissions
â˘Password Vaulting
â˘Ephemeral Credentials
â˘User Provisioning
â˘Resource Provisioning
â˘Guard Rails
â˘Security Groups
â˘Ticket Creation
â˘Escalation
â˘Enabling/Disabling Services and Access
â˘Continuous Integration and Testing
â˘Integrations and Application Programming Interfaces (APIs)
â˘Efficiency/Time Saving
â˘Enforcing Baselines
â˘Standard Infrastructure Configurations
â˘Scaling in a Secure Manner
ďŠ Use Cases of Automation and Scripting
ďŠ Benefits
4.7: Explain the Importance of Automation and Orchestration Related
to Secure Operations
36. www.infosectrain.com
â˘Employee Retention
â˘Reaction Time
â˘Workforce Multiplier
â˘Complexity
â˘Cost
â˘Single Point of Failure
â˘Technical Debt
â˘Ongoing Supportability
â˘Preparation
â˘Detection
â˘Analysis
â˘Containment
â˘Eradication
â˘Recovery
â˘Lessons learned
â˘Tabletop Exercise
â˘Simulation
ďŠ Process
ďŠ Training
ďŠ Testing
ďŠ Other Considerations
4.8: Explain Appropriate Incident Response Activities
37. www.infosectrain.com
ďŠ Root Cause Analysis
ďŠ Threat Hunting
ďŠ Digital Forensics
ďŠ Log Data
ďŠ Data Sources
â˘Legal Hold
â˘Chain of Custody
â˘Acquisition
â˘Reporting
â˘Preservation
â˘E-Discovery
â˘Firewall Logs
â˘Application Logs
â˘Endpoint Logs
â˘OS-Specific Security Logs
â˘IPS/IDS Logs
â˘Network Logs
â˘Metadata
â˘Vulnerability Scans
â˘Automated Reports
â˘Dashboards
â˘Packet Captures
4.9: Given a Scenario, Use Data Sources to Support an Investigation
38. www.infosectrain.com
Domain 05
ďŠ Guidelines
ďŠ Policies
ďŠ Standards
ďŠ Procedures
â˘Acceptable Use Policy (AUP)
â˘Information Security Policies
â˘Business Continuity
â˘Disaster Recovery
â˘Incident Response
â˘Software Development Lifecycle (SDLC)
â˘Change Management
â˘Password
â˘Access Control
â˘Physical Security
â˘Encryption
â˘Change Management
â˘Onboarding/Offboarding
â˘Playbooks
Security Program Management and Oversight
5.1: Summarize Elements of Effective Security Governance
39. www.infosectrain.com
ďŠ External Considerations
ďŠ Monitoring and Revision
ďŠ Types of Governance Structures
ďŠ Roles and Responsibilities for Systems and Data
â˘Regulatory
â˘Legal
â˘Industry
â˘Local/Regional
â˘National
â˘Global
â˘Boards
â˘Committees
â˘Government Entities
â˘Centralized/Decentralized
â˘Owners
â˘Controllers
â˘Processors
â˘Custodians/Stewards
40. www.infosectrain.com
â˘Ad hoc
â˘Recurring
â˘One-Time
â˘Continuous
â˘Qualitative
â˘Quantitative
â˘Single Loss Expectancy (SLE)
â˘Annualized Loss Expectancy (ALE)
â˘Annualized Rate of Occurrence (ARO)
â˘Probability
â˘Likelihood
â˘Exposure Factor
â˘Key Risk Indicators
â˘Risk Owners
â˘Risk Threshold
ďŠ Risk Identification
ďŠ Risk Assessment
ďŠ Risk Analysis
ďŠ Risk Register
ďŠ Risk Tolerance
ďŠ Risk Appetite
5.2: Explain Elements of the Risk Management Process