www.infosectrain.com
+
Security
SY0-701
CERTIFICATION TRAINING
www.infosectrain.com
CO
UR
SE
highlights
40 Hrs of
Instructor-led Training
Blended
Learning Model
CompTIA Authorized
Training Partner
Certified &
Experienced Trainers
4
www.infosectrain.com
The CompTIA Security+ SY0-701 course from InfosecTrain, provides a
comprehensive and expert-led training experience, covering five key
domains that are essential for understanding and excelling in the field of
information security. Participants will delve into general security concepts,
threats, vulnerabilities, mitigations, security architecture, security
operations, and security program management. The course features
practical exercises and hands-on labs to develop participantโ€™s skills,
ensuring that participants are well-prepared for the SY0-701
certification exam.
COURSE DESCRIPTION
Overview
www.infosectrain.com
โ€ขSystem Administrators
โ€ขSecurity Engineers and Consultants
โ€ขNetwork Administrators
โ€ขIT Auditors/Penetration Testers
โ€ข CompTIA A+ and CompTIA Network+
โ€ข It is recommended to have at least 2 years of experience in IT
administration with a focus on security, hands-on experience with
technical information security, and broad knowledge of security concepts.
www.infosectrain.com
PRE-Requisites
TARGET-Audience
www.infosectrain.com
EXAM
Exam Code SY0-601 SY0-701
Launch Date 12th, November 2020 7th, November 2023
Exam Description The CompTIA Security+ certification exam ensures that
candidates possess the expertise and proficiencies necessary
to evaluate the security standing of enterprise environments,
suggest and execute suitable security solutions, oversee and
secure hybrid environments that encompass cloud, mobile, and
IoT, and conduct operations in alignment with relevant laws and
regulations, encompassing governance, risk management, and
compliance principles. Furthermore, it attests to candidatesโ€™
ability to effectively identify, assess, and manage security
events and incidents.
Recommended
Experience
CompTIA Network+ and two
years of experience in IT
administration with a
security focus
CompTIA Network+ and two
years of experience working
in a security/ systems
administrator job role
Number of Questions Maximum of 90 Questions
Exam Format Multiple Choice and Performance-Based
Exam Duration 90 Minutes
Passing Score 750 (on a scale of 100-900)
Languages English, Japanese, Portuguese, and Spanish
Retirement July 2024 TBD โ€“ Usually three years
after launch
Information
www.infosectrain.com
COMPTIA SECURITY+ SY0-701
COURSE OBJECTIVES
๏‚ฉ Develop a comprehensive understanding of foundational security concepts
and principles that serve as the cornerstone of cybersecurity.
๏‚ฉ Learn to identify, assess, and mitigate various threats, vulnerabilities, and risks
that can compromise the security of digital environments.
๏‚ฉ Master the principles and practices of designing, implementing, and managing
a robust security architecture that can withstand diverse cyber threats.
๏‚ฉ Gain expertise in day-to-day security operations, including incident
response, monitoring, and safeguarding critical assets.
๏‚ฉ Acquire the knowledge and skills required to oversee and manage a
security program effectively, ensuring compliance, governance, and the
protection of valuable data.
www.infosectrain.com
www.infosectrain.com
URSE CONTENT
Domain 1 General Security Concepts (12%)
Domain 2 Threats, Vulnerabilities, and Mitigations (22%)
Domain 3 Security Architecture (18%)
Domain 4 Security Operations (28%)
Domain 5 Security Program Management and Oversight (20%)
CO
www.infosectrain.com
1.1: Compare and Contrast Various Types of Security Controls
1.2: Summarize Fundamental Security Concepts
๏‚ฉ Categories
๏‚ฉ Confidentiality, Integrity, and Availability (CIA)
๏‚ฉ Non-Repudiation
๏‚ฉ Authentication, Authorization, and Accounting (AAA)
๏‚ฉ Control
โ€ขTechnical
โ€ขManagerial
โ€ขOperational
โ€ขPhysical
โ€ขPreventive
โ€ขDeterrent
โ€ขDetective
โ€ขCorrective
โ€ขCompensating
โ€ขDirective
โ€ขAuthenticating People
โ€ขAuthenticating Systems
โ€ขAuthorization Models
๏‚ฉ Gap Analysis
๏‚ฉ Zero Trust
General Security Concepts
Domain 01
www.infosectrain.com
๏‚ฉ Physical Security
โ€ขAdaptive Identity
โ€ขThreat Scope Reduction
โ€ขPolicy-Driven Access Control
โ€ขPolicy Administrator
โ€ขPolicy Engine
โ€ขImplicit Trust Zones
โ€ขSubject/System
โ€ขPolicy Enforcement Point
๏‚ฉ Infrared
๏‚ฉ Pressure
๏‚ฉ Microwave
๏‚ฉ Ultrasonic
๏‚ฉ Control Plane
โ€ขBollards
โ€ขAccess Control Vestibule
โ€ขFencing
โ€ขVideo Surveillance
โ€ขSecurity Guard
โ€ขAccess Badge
โ€ขLighting
โ€ขSensors
๏‚ฉ Data Plane
www.infosectrain.com
โ€ขHoneypot
โ€ขHoneynet
โ€ขHoneyfile
โ€ขHoneytoken
๏‚ฉ Deception and Disruption Technology
๏‚ฉ Business Processes Impacting Security Operation
๏‚ฉ Technical Implications
โ€ขApproval process
โ€ขOwnership
โ€ขStakeholders
โ€ขImpact Analysis
โ€ขTest Results
โ€ขBackout Plan
โ€ขMaintenance Window
โ€ขStandard Operating Procedure
โ€ขAllow Lists/Deny Lists
โ€ขRestricted Activities
โ€ขDowntime
โ€ขService Restart
โ€ขApplication Restart
โ€ขLegacy Applications
โ€ขDependencies
1.3: Explain the Importance of Change Management Processes and
the Impact to Security
www.infosectrain.com
๏‚ฉ Documentation
๏‚ฉ Version Control
โ€ขUpdating Diagrams
โ€ขUpdating Policies/Procedures
โ€ขPublic Key
โ€ขPrivate Key
โ€ขKey Escrow
โ€ขFull-Disk
โ€ขPartition
โ€ขFile
โ€ขVolume
โ€ขDatabase
โ€ขRecord
๏‚ฉ Level
โ€ขTransport/Communication
โ€ขAsymmetric
โ€ขSymmetric
โ€ขKey Exchange
โ€ขAlgorithms
โ€ขKey length
๏‚ฉ Public Key Infrastructure (PKI)
๏‚ฉ Encryption
1.4: Explain the Importance of Using Appropriate Cryptographic Solutions
www.infosectrain.com
โ€ขTrusted Platform Module (TPM)
โ€ขHardware Security Module (HSM)
โ€ขKey Management System
โ€ขSecure Enclave
โ€ขSteganography
โ€ขTokenization
โ€ขData Masking
โ€ขCertificate Authorities
โ€ขCertificate Revocation Lists (CRLs)
โ€ขOnline Certificate Status Protocol (OCSP)
โ€ขSelf-Signed
โ€ขThird-Party
โ€ขRoot of Trust
โ€ขCertificate Signing Request (CSR) Generation
โ€ขWildcard
๏‚ฉ Tools
โ€ขHashing
โ€ขSalting
โ€ขDigital Signatures
โ€ขKey Stretching
โ€ขBlockchain
โ€ขOpen Public Ledger
โ€ขCertificates
๏‚ฉ Obfuscation
www.infosectrain.com
Domain 02
๏‚ฉ Threat Actors
๏‚ฉ Attributes of Actors
๏‚ฉ Motivations
โ€ขNation-State
โ€ขUnskilled Attacker
โ€ขHacktivist
โ€ขInsider Threat
โ€ขOrganized Crime
โ€ขShadow IT
โ€ขInternal/External
โ€ขResources/Funding
โ€ขLevel of Sophistication/Capability
โ€ขData Exfiltration
โ€ขEspionage
โ€ขService Disruption
โ€ขBlackmail
โ€ขFinancial Gain
โ€ขPhilosophical/Political Beliefs
โ€ขEthical
โ€ขRevenge
โ€ขDisruption/Chaos
โ€ขWar
Threats, Vulnerabilities, and Mitigations
2.1: Compare and Contrast Common Threat Actors and Motivations
www.infosectrain.com
๏‚ฉ Message-Based
โ€ขImage-Based
โ€ขFile-Based
โ€ขVoice Call
โ€ขRemovable Device
โ€ขVulnerable Software
โ€ขUnsupported Systems and Applications
โ€ขUnsecure Networks
โ€ขOpen Service Ports
โ€ขDefault Credentials
โ€ขSupply Chain
โ€ขEmail
โ€ขShort Message Service (SMS)
โ€ขInstant Messaging (IM)
โ€ขWireless
โ€ขWired
โ€ขBluetooth
โ€ขManaged Service Providers (MSPs)
โ€ขVendors
โ€ขSuppliers
๏‚ฉ Client-Based vs. Agentless
2.2: Explain Common Threat Vectors and Attack Surfaces
www.infosectrain.com
โ€ขHuman Vectors/Social Engineering
โ€ขPhishing
โ€ขVishing
โ€ขSmishing
โ€ขMisinformation/Disinformation
โ€ขImpersonation
โ€ขBusiness Email Compromise
โ€ขPretexting
โ€ขWatering Hole
โ€ขBrand Impersonation
โ€ขTyposquatting
โ€ขTime-of-Check (TOC)
โ€ขTime-of-Use (TOU)
๏‚ฉ Application
โ€ขOperating System (OS)-Based
โ€ขWeb-Based
โ€ขMemory Injection
โ€ขBuffer Overflow
โ€ขRace Conditions
โ€ขMalicious Update
2.3: Explain Various Types of Vulnerabilities
www.infosectrain.com
โ€ขHardware
โ€ขCryptographic
โ€ขMisconfiguration
โ€ขMobile Device
โ€ขZero-Day
โ€ขVirtualization
โ€ขCloud-Specific
โ€ขSupply Chain
โ€ขStructured Query Language (SQL) Injection
โ€ขCross-Site Scripting (XSS)
โ€ขFirmware
โ€ขEnd-of-Life
โ€ขLegacy
โ€ขVirtual Machine (VM) Escape
โ€ขResource Reuse
โ€ขService Provider
โ€ขHardware Provider
โ€ขSoftware Provider
โ€ขSide Loading
โ€ขJailbreaking
www.infosectrain.com
๏‚ฉ Malware Attacks
๏‚ฉ Physical Attacks
๏‚ฉ Network Attacks
โ€ขRansomware
โ€ขTrojan
โ€ขWorm
โ€ขSpyware
โ€ขBloatware
โ€ขVirus
โ€ขKeylogger
โ€ขLogic Bomb
โ€ขRootkit
โ€ขBrute Force
โ€ขRadio Frequency Identification (RFID) Cloning
โ€ขEnvironmental
โ€ขDomain Name System (DNS) Attacks
โ€ขWireless
โ€ขOn-Path
โ€ขCredential Replay
โ€ขMalicious Code
โ€ขAmplified
โ€ขReflected
โ€ขDistributed Denial-of-Service (DDoS)
2.4: Given a Scenario, Analyze Indicators of Malicious Activity
www.infosectrain.com
๏‚ฉ Application Attacks
๏‚ฉ Cryptographic Attacks
๏‚ฉ Password Attacks
๏‚ฉ Indicators
โ€ขInjection
โ€ขBuffer Overflow
โ€ขReplay
โ€ขPrivilege Escalation
โ€ขForgery
โ€ขDirectory Traversal
โ€ขDowngrade
โ€ขCollision
โ€ขBirthday
โ€ขSpraying
โ€ขBrute Force
โ€ขAccount Lockout
โ€ขConcurrent Session Usage
โ€ขBlocked Content
โ€ขImpossible Travel
โ€ขResource Consumption
โ€ขResource Inaccessibility
โ€ขOut-of-Cycle Logging
โ€ขPublished/Documented
โ€ขMissing Logs
www.infosectrain.com
๏‚ฉ Segmentation
๏‚ฉ Access Control
โ€ขApplication Allow List
โ€ขIsolation
โ€ขPatching
โ€ขEncryption
โ€ขMonitoring
โ€ขLeast Privilege
โ€ขConfiguration Enforcement
โ€ขDecommissioning
โ€ขHardening Techniques
โ€ขAccess Control List (ACL)
โ€ขPermissions
โ€ขEncryption
โ€ขInstallation of Endpoint Protection
โ€ขHost-Based Firewall
โ€ขHost-Based Intrusion Prevention System (HIPS)
โ€ขDisabling Ports/Protocols
โ€ขDefault Password Changes
โ€ขRemoval of Unnecessary Software
2.5: Explain the Purpose of Mitigation Techniques Used to Secure
the Enterprise
www.infosectrain.com
Domain 03
โ€ขResponsibility Matrix
โ€ขHybrid Considerations
โ€ขThird-Party Vendors
โ€ขOn-Premises
โ€ขCentralized vs. Decentralized
โ€ขContainerization
โ€ขVirtualization
โ€ขIoT
โ€ขIndustrial Control Systems (ICS)/
โ€ขSupervisory Control and Data Acquisition (SCADA)
โ€ขReal-Time Operating System (RTOS)
โ€ขEmbedded Systems
โ€ขHigh availability
๏‚ฉ Architecture and Infrastructure Concepts
โ€ขCloud
โ€ขInfrastructure as Code (IaC)
โ€ขServerless
โ€ขMicroservices
โ€ขNetwork Infrastructure
Security Architecture
3.1: Compare and Contrast Security Implications of Different
Architecture Models
www.infosectrain.com
๏‚ฉ Considerations
โ€ขAvailability
โ€ขResilience
โ€ขCost
โ€ขResponsiveness
โ€ขScalability
โ€ขEase of Deployment
โ€ขRisk Transference
โ€ขEase of Recovery
โ€ขPatch Availability
โ€ขInability to Patch
โ€ขPower
โ€ขCompute
๏‚ฉ Infrastructure Considerations
โ€ขDevice Placement
โ€ขSecurity Zones
โ€ขAttack Surface
โ€ขConnectivity
โ€ขFailure Modes
๏‚ฉ Device Attribute
โ€ขFail-Open
โ€ขFail-Closed
โ€ขActive vs. Passive
โ€ขInline vs. Tap/Monitor
3.2: Given a Scenario, Apply Security Principles to Secure Enterprise
www.infosectrain.com
โ€ขJump Server
โ€ขProxy Server
โ€ขIntrusion Prevention System (IPS)/Intrusion Detection System (IDS)
โ€ขLoad Balancer
โ€ขSensor
โ€ข802.1X
โ€ขExtensible Authentication
โ€ขWeb Application Firewall (WAF)
โ€ขUnified Threat Management (UTM)
โ€ขNext-Generation Firewall (NGFW)
โ€ขLayer 4/Layer 7
โ€ขVirtual Private Network (VPN)
โ€ขRemote Access
โ€ขTunneling
โ€ขSoftware-Defined Wide Area Network (SD-WAN)
โ€ขSecure Access Service Edge (SASE)
โ€ขTransport Layer Security (TLS)
โ€ขInternet Protocol Security (IPSec)
๏‚ฉ Network Appliances
๏‚ฉ Port Security
๏‚ฉ Firewall Types
๏‚ฉ Secure Communication/Access
๏‚ฉ Selection of Effective Controls
www.infosectrain.com
๏‚ฉ Data Types
๏‚ฉ Data Classifications
๏‚ฉ General Data Considerations
โ€ขRegulated
โ€ขTrade Secret
โ€ขIntellectual Property
โ€ขLegal Information
โ€ขFinancial Information
โ€ขHuman and Non-Human-Readable
โ€ขSensitive
โ€ขConfidential
โ€ขPublic
โ€ขRestricted
โ€ขPrivate
โ€ขCritica
โ€ขData States
โ€ขData Sovereignty
โ€ขGeolocation
โ€ขData at Rest
โ€ขData in Transit
โ€ขData in Use
3.3: Compare and Contrast Concepts and Strategies to Protect Data
www.infosectrain.com
๏‚ฉ High Availability
โ€ขSite Considerations
โ€ขPlatform Diversity
โ€ขMulti-Cloud Systems
โ€ขContinuity of Operations
โ€ขCapacity Planning
๏‚ฉ Methods to Secure Data
โ€ขLoad Balancing vs. Clustering
โ€ขHot
โ€ขCold
โ€ขWarm
โ€ขGeographic Dispersion
โ€ขGeographic Restrictions
โ€ขEncryption
โ€ขHashing
โ€ขMasking
โ€ขTokenization
โ€ขObfuscation
โ€ขSegmentation
โ€ขPermission Restrictions
3.4: Explain the Importance of Resilience and Recovery in Security
Architecture
www.infosectrain.com
โ€ขPeople
โ€ขTechnology
โ€ขInfrastructure
โ€ขTabletop Exercises
โ€ขFail over
โ€ขSimulation
โ€ขParallel Processing
โ€ขOnsite/Offsite
โ€ขFrequency
โ€ขEncryption
โ€ขSnapshots
โ€ขRecovery
โ€ขReplication
โ€ขJournaling
โ€ขGenerators
โ€ขUninterruptible Power Supply (UPS)
๏‚ฉ Testing
๏‚ฉ Backups
๏‚ฉ Power
www.infosectrain.com
Domain 04
๏‚ฉ Secure Baselines
๏‚ฉ Hardening Targets
๏‚ฉ Wireless Devices
โ€ขEstablish
โ€ขDeploy
โ€ขMaintain
โ€ขMobile Devices
โ€ขWorkstations
โ€ขSwitches
โ€ขRouters
โ€ขCloud Infrastructure
โ€ขServers
โ€ขICS/SCADA
โ€ขEmbedded Systems
โ€ขRTOS
โ€ขIoT devices
โ€ขInstallation Considerations
โ€ขSite Surveys
โ€ขHeat Maps
Security Operations
4.1: Given a Scenario, Apply Common Security Techniques to Computing
www.infosectrain.com
๏‚ฉ Mobile Solutions
๏‚ฉ Wireless Security Settings
๏‚ฉ Application Security
โ€ขSandboxing
โ€ขMonitoring
โ€ขBring your Own Device (BYOD)
โ€ขCorporate-Owned, Personally Enabled (COPE)
โ€ขChoose Your Own Device (CYOD)
โ€ขCellular
โ€ขWi-Fi
โ€ขBluetooth
โ€ขMobile Device Management (MDM)
โ€ขDeployment Models
โ€ขWi-Fi Protected Access 3 (WPA3)
โ€ขAAA/Remote Authentication
โ€ขDial-In User Service (RADIUS)
โ€ขCryptographic Protocols
โ€ขAuthentication Protocols
โ€ขInput Validation
โ€ขSecure Cookies
โ€ขStatic Code Analysis
โ€ขCode Signing
๏‚ฉ Connection Methods
www.infosectrain.com
โ€ขOwnership
โ€ขClassification
โ€ขInventory
โ€ขEnumeration
โ€ขSanitization
โ€ขDestruction
โ€ขCertification
โ€ขData retention
โ€ขVulnerability Scan
โ€ขApplication Security
๏‚ฉ Acquisition/Procurement Process
๏‚ฉ Assignment/Accounting
๏‚ฉ Identification Methods
โ€ขStatic Analysis
โ€ขDynamic Analysis
โ€ขPackage Monitoring
๏‚ฉ Monitoring/Asset Tracking
โ€ขDisposal/Decommissioning
4.2: Explain the Security Implications of Proper Hardware, Software, and
Data Asset Management
4.3: Explain Various Activities Associated with Vulnerability Management
www.infosectrain.com
๏‚ฉ Threat Feed
โ€ขConfirmation
๏‚ฉ Penetration Testing
๏‚ฉ Responsible Disclosure Program
โ€ขPrioritize
โ€ขCommon Vulnerability Scoring System (CVSS)
โ€ขCommon Vulnerability Enumeration (CVE)
โ€ขVulnerability Classification
โ€ขExposure Factor
โ€ขEnvironmental Variables
โ€ขIndustry/Organizational Impact
โ€ขRisk Tolerance
โ€ขSystem/Process Audit
โ€ขOpen-Source Intelligence (OSINT)
โ€ขProprietary/Third-Party
โ€ขInformation-Sharing Organization
โ€ขDark Web
๏‚ฉ False Positive
๏‚ฉ False Negative
โ€ขBug Bounty Program
โ€ขAnalysis
www.infosectrain.com
โ€ขPatching
โ€ขInsurance
โ€ขSegmentation
โ€ขCompensating Controls
โ€ขExceptions and Exemptions
โ€ขRescanning
โ€ขAudit
โ€ขVerification
๏‚ฉ Vulnerability Response and Remediation
๏‚ฉ Reporting
๏‚ฉ Validation of Remediation
โ€ขSystems
โ€ขApplications
โ€ขInfrastructure
โ€ขLog Aggregation
โ€ขAlerting
โ€ขScanning
โ€ขReporting
๏‚ฉ Monitoring Computing Resources
๏‚ฉ Activities
4.4: Explain Security Alerting and Monitoring Concepts and Tools
www.infosectrain.com
๏‚ฉ Archiving
๏‚ฉ Alert Response and Remediation/ Validation
โ€ขSecurity Content Automation Protocol (SCAP)
โ€ขBenchmarks
โ€ขAgents/Agentless
โ€ขSecurity Information and Event Management (SIEM)
โ€ขAntivirus
โ€ขData Loss Prevention (DLP)
โ€ขSimple Network Management Protocol (SNMP) Traps
โ€ขNetFlow
โ€ขVulnerability Scanners
โ€ขRules
โ€ขAccess Lists
โ€ขPorts/Protocols
โ€ขScreened Subnets
โ€ขQuarantine
โ€ขAlert Tuning
โ€ขTools
๏‚ฉ Firewall
4.5: Given a Scenario, Modify Enterprise Capabilities to Enhance Security
www.infosectrain.com
โ€ขTrends
โ€ขSignatures
โ€ขAgent-Based
โ€ขCentralized Proxy
โ€ขUniversal Resource Locator (URL) Scanning
โ€ขContent Categorization
โ€ขBlock Rules
โ€ขReputation
โ€ขGroup Policy
โ€ขSELinux
โ€ขProtocol Selection
โ€ขPort Selection
โ€ขTransport Method
โ€ขDomain-based Message
โ€ขAuthentication Reporting and Conformance (DMARC)
โ€ขDomain Keys Identified Mail (DKIM)
โ€ขSender Policy Framework (SPF)
โ€ขGateway
๏‚ฉ IDS/IPS
๏‚ฉ Web Filter
๏‚ฉ Operating System Security
๏‚ฉ Implementation of Secure Protocols
๏‚ฉ DNS Filtering
๏‚ฉ Email Security
www.infosectrain.com
โ€ขFile Integrity Monitoring
โ€ขDLP
โ€ขNetwork Access Control (NAC)
โ€ขEndpoint Detection and Response (EDR)/Extended Detection and
Response (XDR)
โ€ขUser Behavior Analytics
โ€ขLightweight Directory Access Protocol (LDAP)
โ€ขOpen Authorization (OAuth)
โ€ขSecurity Assertions Markup Language (SAML)
๏‚ฉ Provisioning/De-provisioning user Accounts
๏‚ฉ Permission Assignments and Implications
๏‚ฉ Identity Proofing
๏‚ฉ Federation
๏‚ฉ Single Sign-On (SSO)
๏‚ฉ Interoperability
๏‚ฉ Attestation
๏‚ฉ Access Controls
4.6: Given a Scenario, Implement and Maintain Identity and Access
Management
www.infosectrain.com
โ€ขMandatory
โ€ขDiscretionary
โ€ขRole-Based
โ€ขRule-Based
โ€ขAttribute-Based
โ€ขTime-of-Day Restrictions
โ€ขLeast Privilege
โ€ขImplementations
โ€ขPassword Best Practices
โ€ข Factors
๏‚ฉ Multi Factor Authentication
๏‚ฉ Password Concepts
โ€ขBiometrics
โ€ขHard/Soft Authentication Tokens
โ€ขSecurity Keys
โ€ขLength
โ€ขComplexity
โ€ขReuse
โ€ขExpiration
โ€ขAge
โ€ขSomething You Know
โ€ขSomething You Have
โ€ขSomething You Are
โ€ขSomewhere You Are
www.infosectrain.com
โ€ขPassword Managers
โ€ขPasswordless
๏‚ฉ Privileged Access Management Tools
โ€ขJust-in-Time Permissions
โ€ขPassword Vaulting
โ€ขEphemeral Credentials
โ€ขUser Provisioning
โ€ขResource Provisioning
โ€ขGuard Rails
โ€ขSecurity Groups
โ€ขTicket Creation
โ€ขEscalation
โ€ขEnabling/Disabling Services and Access
โ€ขContinuous Integration and Testing
โ€ขIntegrations and Application Programming Interfaces (APIs)
โ€ขEfficiency/Time Saving
โ€ขEnforcing Baselines
โ€ขStandard Infrastructure Configurations
โ€ขScaling in a Secure Manner
๏‚ฉ Use Cases of Automation and Scripting
๏‚ฉ Benefits
4.7: Explain the Importance of Automation and Orchestration Related
to Secure Operations
www.infosectrain.com
โ€ขEmployee Retention
โ€ขReaction Time
โ€ขWorkforce Multiplier
โ€ขComplexity
โ€ขCost
โ€ขSingle Point of Failure
โ€ขTechnical Debt
โ€ขOngoing Supportability
โ€ขPreparation
โ€ขDetection
โ€ขAnalysis
โ€ขContainment
โ€ขEradication
โ€ขRecovery
โ€ขLessons learned
โ€ขTabletop Exercise
โ€ขSimulation
๏‚ฉ Process
๏‚ฉ Training
๏‚ฉ Testing
๏‚ฉ Other Considerations
4.8: Explain Appropriate Incident Response Activities
www.infosectrain.com
๏‚ฉ Root Cause Analysis
๏‚ฉ Threat Hunting
๏‚ฉ Digital Forensics
๏‚ฉ Log Data
๏‚ฉ Data Sources
โ€ขLegal Hold
โ€ขChain of Custody
โ€ขAcquisition
โ€ขReporting
โ€ขPreservation
โ€ขE-Discovery
โ€ขFirewall Logs
โ€ขApplication Logs
โ€ขEndpoint Logs
โ€ขOS-Specific Security Logs
โ€ขIPS/IDS Logs
โ€ขNetwork Logs
โ€ขMetadata
โ€ขVulnerability Scans
โ€ขAutomated Reports
โ€ขDashboards
โ€ขPacket Captures
4.9: Given a Scenario, Use Data Sources to Support an Investigation
www.infosectrain.com
Domain 05
๏‚ฉ Guidelines
๏‚ฉ Policies
๏‚ฉ Standards
๏‚ฉ Procedures
โ€ขAcceptable Use Policy (AUP)
โ€ขInformation Security Policies
โ€ขBusiness Continuity
โ€ขDisaster Recovery
โ€ขIncident Response
โ€ขSoftware Development Lifecycle (SDLC)
โ€ขChange Management
โ€ขPassword
โ€ขAccess Control
โ€ขPhysical Security
โ€ขEncryption
โ€ขChange Management
โ€ขOnboarding/Offboarding
โ€ขPlaybooks
Security Program Management and Oversight
5.1: Summarize Elements of Effective Security Governance
www.infosectrain.com
๏‚ฉ External Considerations
๏‚ฉ Monitoring and Revision
๏‚ฉ Types of Governance Structures
๏‚ฉ Roles and Responsibilities for Systems and Data
โ€ขRegulatory
โ€ขLegal
โ€ขIndustry
โ€ขLocal/Regional
โ€ขNational
โ€ขGlobal
โ€ขBoards
โ€ขCommittees
โ€ขGovernment Entities
โ€ขCentralized/Decentralized
โ€ขOwners
โ€ขControllers
โ€ขProcessors
โ€ขCustodians/Stewards
www.infosectrain.com
โ€ขAd hoc
โ€ขRecurring
โ€ขOne-Time
โ€ขContinuous
โ€ขQualitative
โ€ขQuantitative
โ€ขSingle Loss Expectancy (SLE)
โ€ขAnnualized Loss Expectancy (ALE)
โ€ขAnnualized Rate of Occurrence (ARO)
โ€ขProbability
โ€ขLikelihood
โ€ขExposure Factor
โ€ขKey Risk Indicators
โ€ขRisk Owners
โ€ขRisk Threshold
๏‚ฉ Risk Identification
๏‚ฉ Risk Assessment
๏‚ฉ Risk Analysis
๏‚ฉ Risk Register
๏‚ฉ Risk Tolerance
๏‚ฉ Risk Appetite
5.2: Explain Elements of the Risk Management Process
www.infosectrain.com
โ€ขExpansionary
โ€ขConservative
โ€ขNeutral
โ€ขTransfer
โ€ขAccept
โ€ขAvoid
โ€ขMitigate
โ€ขRecovery Time Objective (RTO)
โ€ขRecovery Point Objective (RPO)
โ€ขMean Time to Repair (MTTR)
โ€ขMean Time Between Failures (MTBF)
๏‚ฉ Risk Management Strategies
๏‚ฉ Risk Reporting
๏‚ฉ Business Impact Analysis
โ€ขExemption
โ€ขException
www.infosectrain.com
โ€ขPenetration Testing
โ€ขRight-to-Audit Clause
โ€ขEvidence of Internal Audits
โ€ขIndependent Assessments
โ€ขSupply Chain Analysis
โ€ขDue Diligence
โ€ขConflict of Interest
โ€ขService-Level Agreement (SLA)
โ€ขMemorandum of Agreement (MOA)
โ€ขMemorandum of Understanding (MOU)
โ€ขMaster Service Agreement (MSA)
โ€ขWork Order (WO)/Statement of Work (SOW)
โ€ขNon-Disclosure Agreement (NDA)
โ€ขBusiness Partners Agreement (BPA)
๏‚ฉ Vendor Assessment
๏‚ฉ Vendor Selection
๏‚ฉ Agreement Types
๏‚ฉ Vendor Monitoring
๏‚ฉ Questionnaires
๏‚ฉ Rules of Engagement
5.3: Explain the Processes Associated with Third-Party Risk Assessment
and Management
www.infosectrain.com
๏‚ฉ Attestation
๏‚ฉ Internal
๏‚ฉ External
โ€ขActive
โ€ขPassive
๏‚ฉ Penetration Testing
โ€ขCompliance
โ€ขAudit Committee
โ€ขSelf-Assessments
โ€ขRegulatory
โ€ขExaminations
โ€ขAssessment
โ€ขIndependent Third-Party Audit
โ€ขPhysical
โ€ขOffensive
โ€ขDefensive
โ€ขIntegrated
โ€ขKnown Environment
โ€ขPartially Known Environment
โ€ขUnknown Environment
โ€ขReconnaissance
5.4: Explain Types and Purposes of Audits and Assessments
www.infosectrain.com
๏‚ฉ Phishing
๏‚ฉ Anomalous Behavior Recognition
๏‚ฉ User Guidance and Training
๏‚ฉ Development
๏‚ฉ Execution
๏‚ฉ Reporting and Monitoring
โ€ขCampaigns
โ€ขRecognizing a Phishing Attempt
โ€ขResponding to Reported Suspicious Messages
โ€ขRisky
โ€ขUnexpected
โ€ขUnintentional
โ€ขInitial
โ€ขRecurring
โ€ขPolicy/Handbooks
โ€ขSituational Awareness
โ€ขInsider Threat
โ€ขPassword Management
โ€ขRemovable Media and Cables
โ€ขSocial Engineering
โ€ขOperational Security
โ€ขHybrid/Remote Work Environments
5.5: Given a Scenario, Implement Security Awareness Practices
www.infosectrain.com
System
Administrator
Network
Administrator
Security
Administrator
Security
Specialist
Security
Consultant
Security
Engineer
$84,363 $88,410
$125,000
$55,540
$114,658
$123,975
Source: Indeed, Glassdoor
COURSE
benefits
www.infosectrain.com
www.infosectrain.com I sales@infosectrain.com

CompTIA_Security_plus_SY0-701_course_content.pdf

  • 1.
  • 2.
    www.infosectrain.com CO UR SE highlights 40 Hrs of Instructor-ledTraining Blended Learning Model CompTIA Authorized Training Partner Certified & Experienced Trainers 4
  • 3.
    www.infosectrain.com The CompTIA Security+SY0-701 course from InfosecTrain, provides a comprehensive and expert-led training experience, covering five key domains that are essential for understanding and excelling in the field of information security. Participants will delve into general security concepts, threats, vulnerabilities, mitigations, security architecture, security operations, and security program management. The course features practical exercises and hands-on labs to develop participantโ€™s skills, ensuring that participants are well-prepared for the SY0-701 certification exam. COURSE DESCRIPTION Overview
  • 4.
    www.infosectrain.com โ€ขSystem Administrators โ€ขSecurity Engineersand Consultants โ€ขNetwork Administrators โ€ขIT Auditors/Penetration Testers โ€ข CompTIA A+ and CompTIA Network+ โ€ข It is recommended to have at least 2 years of experience in IT administration with a focus on security, hands-on experience with technical information security, and broad knowledge of security concepts. www.infosectrain.com PRE-Requisites TARGET-Audience
  • 5.
    www.infosectrain.com EXAM Exam Code SY0-601SY0-701 Launch Date 12th, November 2020 7th, November 2023 Exam Description The CompTIA Security+ certification exam ensures that candidates possess the expertise and proficiencies necessary to evaluate the security standing of enterprise environments, suggest and execute suitable security solutions, oversee and secure hybrid environments that encompass cloud, mobile, and IoT, and conduct operations in alignment with relevant laws and regulations, encompassing governance, risk management, and compliance principles. Furthermore, it attests to candidatesโ€™ ability to effectively identify, assess, and manage security events and incidents. Recommended Experience CompTIA Network+ and two years of experience in IT administration with a security focus CompTIA Network+ and two years of experience working in a security/ systems administrator job role Number of Questions Maximum of 90 Questions Exam Format Multiple Choice and Performance-Based Exam Duration 90 Minutes Passing Score 750 (on a scale of 100-900) Languages English, Japanese, Portuguese, and Spanish Retirement July 2024 TBD โ€“ Usually three years after launch Information
  • 6.
    www.infosectrain.com COMPTIA SECURITY+ SY0-701 COURSEOBJECTIVES ๏‚ฉ Develop a comprehensive understanding of foundational security concepts and principles that serve as the cornerstone of cybersecurity. ๏‚ฉ Learn to identify, assess, and mitigate various threats, vulnerabilities, and risks that can compromise the security of digital environments. ๏‚ฉ Master the principles and practices of designing, implementing, and managing a robust security architecture that can withstand diverse cyber threats. ๏‚ฉ Gain expertise in day-to-day security operations, including incident response, monitoring, and safeguarding critical assets. ๏‚ฉ Acquire the knowledge and skills required to oversee and manage a security program effectively, ensuring compliance, governance, and the protection of valuable data. www.infosectrain.com
  • 7.
    www.infosectrain.com URSE CONTENT Domain 1General Security Concepts (12%) Domain 2 Threats, Vulnerabilities, and Mitigations (22%) Domain 3 Security Architecture (18%) Domain 4 Security Operations (28%) Domain 5 Security Program Management and Oversight (20%) CO
  • 8.
    www.infosectrain.com 1.1: Compare andContrast Various Types of Security Controls 1.2: Summarize Fundamental Security Concepts ๏‚ฉ Categories ๏‚ฉ Confidentiality, Integrity, and Availability (CIA) ๏‚ฉ Non-Repudiation ๏‚ฉ Authentication, Authorization, and Accounting (AAA) ๏‚ฉ Control โ€ขTechnical โ€ขManagerial โ€ขOperational โ€ขPhysical โ€ขPreventive โ€ขDeterrent โ€ขDetective โ€ขCorrective โ€ขCompensating โ€ขDirective โ€ขAuthenticating People โ€ขAuthenticating Systems โ€ขAuthorization Models ๏‚ฉ Gap Analysis ๏‚ฉ Zero Trust General Security Concepts Domain 01
  • 9.
    www.infosectrain.com ๏‚ฉ Physical Security โ€ขAdaptiveIdentity โ€ขThreat Scope Reduction โ€ขPolicy-Driven Access Control โ€ขPolicy Administrator โ€ขPolicy Engine โ€ขImplicit Trust Zones โ€ขSubject/System โ€ขPolicy Enforcement Point ๏‚ฉ Infrared ๏‚ฉ Pressure ๏‚ฉ Microwave ๏‚ฉ Ultrasonic ๏‚ฉ Control Plane โ€ขBollards โ€ขAccess Control Vestibule โ€ขFencing โ€ขVideo Surveillance โ€ขSecurity Guard โ€ขAccess Badge โ€ขLighting โ€ขSensors ๏‚ฉ Data Plane
  • 10.
    www.infosectrain.com โ€ขHoneypot โ€ขHoneynet โ€ขHoneyfile โ€ขHoneytoken ๏‚ฉ Deception andDisruption Technology ๏‚ฉ Business Processes Impacting Security Operation ๏‚ฉ Technical Implications โ€ขApproval process โ€ขOwnership โ€ขStakeholders โ€ขImpact Analysis โ€ขTest Results โ€ขBackout Plan โ€ขMaintenance Window โ€ขStandard Operating Procedure โ€ขAllow Lists/Deny Lists โ€ขRestricted Activities โ€ขDowntime โ€ขService Restart โ€ขApplication Restart โ€ขLegacy Applications โ€ขDependencies 1.3: Explain the Importance of Change Management Processes and the Impact to Security
  • 11.
    www.infosectrain.com ๏‚ฉ Documentation ๏‚ฉ VersionControl โ€ขUpdating Diagrams โ€ขUpdating Policies/Procedures โ€ขPublic Key โ€ขPrivate Key โ€ขKey Escrow โ€ขFull-Disk โ€ขPartition โ€ขFile โ€ขVolume โ€ขDatabase โ€ขRecord ๏‚ฉ Level โ€ขTransport/Communication โ€ขAsymmetric โ€ขSymmetric โ€ขKey Exchange โ€ขAlgorithms โ€ขKey length ๏‚ฉ Public Key Infrastructure (PKI) ๏‚ฉ Encryption 1.4: Explain the Importance of Using Appropriate Cryptographic Solutions
  • 12.
    www.infosectrain.com โ€ขTrusted Platform Module(TPM) โ€ขHardware Security Module (HSM) โ€ขKey Management System โ€ขSecure Enclave โ€ขSteganography โ€ขTokenization โ€ขData Masking โ€ขCertificate Authorities โ€ขCertificate Revocation Lists (CRLs) โ€ขOnline Certificate Status Protocol (OCSP) โ€ขSelf-Signed โ€ขThird-Party โ€ขRoot of Trust โ€ขCertificate Signing Request (CSR) Generation โ€ขWildcard ๏‚ฉ Tools โ€ขHashing โ€ขSalting โ€ขDigital Signatures โ€ขKey Stretching โ€ขBlockchain โ€ขOpen Public Ledger โ€ขCertificates ๏‚ฉ Obfuscation
  • 13.
    www.infosectrain.com Domain 02 ๏‚ฉ ThreatActors ๏‚ฉ Attributes of Actors ๏‚ฉ Motivations โ€ขNation-State โ€ขUnskilled Attacker โ€ขHacktivist โ€ขInsider Threat โ€ขOrganized Crime โ€ขShadow IT โ€ขInternal/External โ€ขResources/Funding โ€ขLevel of Sophistication/Capability โ€ขData Exfiltration โ€ขEspionage โ€ขService Disruption โ€ขBlackmail โ€ขFinancial Gain โ€ขPhilosophical/Political Beliefs โ€ขEthical โ€ขRevenge โ€ขDisruption/Chaos โ€ขWar Threats, Vulnerabilities, and Mitigations 2.1: Compare and Contrast Common Threat Actors and Motivations
  • 14.
    www.infosectrain.com ๏‚ฉ Message-Based โ€ขImage-Based โ€ขFile-Based โ€ขVoice Call โ€ขRemovableDevice โ€ขVulnerable Software โ€ขUnsupported Systems and Applications โ€ขUnsecure Networks โ€ขOpen Service Ports โ€ขDefault Credentials โ€ขSupply Chain โ€ขEmail โ€ขShort Message Service (SMS) โ€ขInstant Messaging (IM) โ€ขWireless โ€ขWired โ€ขBluetooth โ€ขManaged Service Providers (MSPs) โ€ขVendors โ€ขSuppliers ๏‚ฉ Client-Based vs. Agentless 2.2: Explain Common Threat Vectors and Attack Surfaces
  • 15.
    www.infosectrain.com โ€ขHuman Vectors/Social Engineering โ€ขPhishing โ€ขVishing โ€ขSmishing โ€ขMisinformation/Disinformation โ€ขImpersonation โ€ขBusinessEmail Compromise โ€ขPretexting โ€ขWatering Hole โ€ขBrand Impersonation โ€ขTyposquatting โ€ขTime-of-Check (TOC) โ€ขTime-of-Use (TOU) ๏‚ฉ Application โ€ขOperating System (OS)-Based โ€ขWeb-Based โ€ขMemory Injection โ€ขBuffer Overflow โ€ขRace Conditions โ€ขMalicious Update 2.3: Explain Various Types of Vulnerabilities
  • 16.
    www.infosectrain.com โ€ขHardware โ€ขCryptographic โ€ขMisconfiguration โ€ขMobile Device โ€ขZero-Day โ€ขVirtualization โ€ขCloud-Specific โ€ขSupply Chain โ€ขStructuredQuery Language (SQL) Injection โ€ขCross-Site Scripting (XSS) โ€ขFirmware โ€ขEnd-of-Life โ€ขLegacy โ€ขVirtual Machine (VM) Escape โ€ขResource Reuse โ€ขService Provider โ€ขHardware Provider โ€ขSoftware Provider โ€ขSide Loading โ€ขJailbreaking
  • 17.
    www.infosectrain.com ๏‚ฉ Malware Attacks ๏‚ฉPhysical Attacks ๏‚ฉ Network Attacks โ€ขRansomware โ€ขTrojan โ€ขWorm โ€ขSpyware โ€ขBloatware โ€ขVirus โ€ขKeylogger โ€ขLogic Bomb โ€ขRootkit โ€ขBrute Force โ€ขRadio Frequency Identification (RFID) Cloning โ€ขEnvironmental โ€ขDomain Name System (DNS) Attacks โ€ขWireless โ€ขOn-Path โ€ขCredential Replay โ€ขMalicious Code โ€ขAmplified โ€ขReflected โ€ขDistributed Denial-of-Service (DDoS) 2.4: Given a Scenario, Analyze Indicators of Malicious Activity
  • 18.
    www.infosectrain.com ๏‚ฉ Application Attacks ๏‚ฉCryptographic Attacks ๏‚ฉ Password Attacks ๏‚ฉ Indicators โ€ขInjection โ€ขBuffer Overflow โ€ขReplay โ€ขPrivilege Escalation โ€ขForgery โ€ขDirectory Traversal โ€ขDowngrade โ€ขCollision โ€ขBirthday โ€ขSpraying โ€ขBrute Force โ€ขAccount Lockout โ€ขConcurrent Session Usage โ€ขBlocked Content โ€ขImpossible Travel โ€ขResource Consumption โ€ขResource Inaccessibility โ€ขOut-of-Cycle Logging โ€ขPublished/Documented โ€ขMissing Logs
  • 19.
    www.infosectrain.com ๏‚ฉ Segmentation ๏‚ฉ AccessControl โ€ขApplication Allow List โ€ขIsolation โ€ขPatching โ€ขEncryption โ€ขMonitoring โ€ขLeast Privilege โ€ขConfiguration Enforcement โ€ขDecommissioning โ€ขHardening Techniques โ€ขAccess Control List (ACL) โ€ขPermissions โ€ขEncryption โ€ขInstallation of Endpoint Protection โ€ขHost-Based Firewall โ€ขHost-Based Intrusion Prevention System (HIPS) โ€ขDisabling Ports/Protocols โ€ขDefault Password Changes โ€ขRemoval of Unnecessary Software 2.5: Explain the Purpose of Mitigation Techniques Used to Secure the Enterprise
  • 20.
    www.infosectrain.com Domain 03 โ€ขResponsibility Matrix โ€ขHybridConsiderations โ€ขThird-Party Vendors โ€ขOn-Premises โ€ขCentralized vs. Decentralized โ€ขContainerization โ€ขVirtualization โ€ขIoT โ€ขIndustrial Control Systems (ICS)/ โ€ขSupervisory Control and Data Acquisition (SCADA) โ€ขReal-Time Operating System (RTOS) โ€ขEmbedded Systems โ€ขHigh availability ๏‚ฉ Architecture and Infrastructure Concepts โ€ขCloud โ€ขInfrastructure as Code (IaC) โ€ขServerless โ€ขMicroservices โ€ขNetwork Infrastructure Security Architecture 3.1: Compare and Contrast Security Implications of Different Architecture Models
  • 21.
    www.infosectrain.com ๏‚ฉ Considerations โ€ขAvailability โ€ขResilience โ€ขCost โ€ขResponsiveness โ€ขScalability โ€ขEase ofDeployment โ€ขRisk Transference โ€ขEase of Recovery โ€ขPatch Availability โ€ขInability to Patch โ€ขPower โ€ขCompute ๏‚ฉ Infrastructure Considerations โ€ขDevice Placement โ€ขSecurity Zones โ€ขAttack Surface โ€ขConnectivity โ€ขFailure Modes ๏‚ฉ Device Attribute โ€ขFail-Open โ€ขFail-Closed โ€ขActive vs. Passive โ€ขInline vs. Tap/Monitor 3.2: Given a Scenario, Apply Security Principles to Secure Enterprise
  • 22.
    www.infosectrain.com โ€ขJump Server โ€ขProxy Server โ€ขIntrusionPrevention System (IPS)/Intrusion Detection System (IDS) โ€ขLoad Balancer โ€ขSensor โ€ข802.1X โ€ขExtensible Authentication โ€ขWeb Application Firewall (WAF) โ€ขUnified Threat Management (UTM) โ€ขNext-Generation Firewall (NGFW) โ€ขLayer 4/Layer 7 โ€ขVirtual Private Network (VPN) โ€ขRemote Access โ€ขTunneling โ€ขSoftware-Defined Wide Area Network (SD-WAN) โ€ขSecure Access Service Edge (SASE) โ€ขTransport Layer Security (TLS) โ€ขInternet Protocol Security (IPSec) ๏‚ฉ Network Appliances ๏‚ฉ Port Security ๏‚ฉ Firewall Types ๏‚ฉ Secure Communication/Access ๏‚ฉ Selection of Effective Controls
  • 23.
    www.infosectrain.com ๏‚ฉ Data Types ๏‚ฉData Classifications ๏‚ฉ General Data Considerations โ€ขRegulated โ€ขTrade Secret โ€ขIntellectual Property โ€ขLegal Information โ€ขFinancial Information โ€ขHuman and Non-Human-Readable โ€ขSensitive โ€ขConfidential โ€ขPublic โ€ขRestricted โ€ขPrivate โ€ขCritica โ€ขData States โ€ขData Sovereignty โ€ขGeolocation โ€ขData at Rest โ€ขData in Transit โ€ขData in Use 3.3: Compare and Contrast Concepts and Strategies to Protect Data
  • 24.
    www.infosectrain.com ๏‚ฉ High Availability โ€ขSiteConsiderations โ€ขPlatform Diversity โ€ขMulti-Cloud Systems โ€ขContinuity of Operations โ€ขCapacity Planning ๏‚ฉ Methods to Secure Data โ€ขLoad Balancing vs. Clustering โ€ขHot โ€ขCold โ€ขWarm โ€ขGeographic Dispersion โ€ขGeographic Restrictions โ€ขEncryption โ€ขHashing โ€ขMasking โ€ขTokenization โ€ขObfuscation โ€ขSegmentation โ€ขPermission Restrictions 3.4: Explain the Importance of Resilience and Recovery in Security Architecture
  • 25.
    www.infosectrain.com โ€ขPeople โ€ขTechnology โ€ขInfrastructure โ€ขTabletop Exercises โ€ขFail over โ€ขSimulation โ€ขParallelProcessing โ€ขOnsite/Offsite โ€ขFrequency โ€ขEncryption โ€ขSnapshots โ€ขRecovery โ€ขReplication โ€ขJournaling โ€ขGenerators โ€ขUninterruptible Power Supply (UPS) ๏‚ฉ Testing ๏‚ฉ Backups ๏‚ฉ Power
  • 26.
    www.infosectrain.com Domain 04 ๏‚ฉ SecureBaselines ๏‚ฉ Hardening Targets ๏‚ฉ Wireless Devices โ€ขEstablish โ€ขDeploy โ€ขMaintain โ€ขMobile Devices โ€ขWorkstations โ€ขSwitches โ€ขRouters โ€ขCloud Infrastructure โ€ขServers โ€ขICS/SCADA โ€ขEmbedded Systems โ€ขRTOS โ€ขIoT devices โ€ขInstallation Considerations โ€ขSite Surveys โ€ขHeat Maps Security Operations 4.1: Given a Scenario, Apply Common Security Techniques to Computing
  • 27.
    www.infosectrain.com ๏‚ฉ Mobile Solutions ๏‚ฉWireless Security Settings ๏‚ฉ Application Security โ€ขSandboxing โ€ขMonitoring โ€ขBring your Own Device (BYOD) โ€ขCorporate-Owned, Personally Enabled (COPE) โ€ขChoose Your Own Device (CYOD) โ€ขCellular โ€ขWi-Fi โ€ขBluetooth โ€ขMobile Device Management (MDM) โ€ขDeployment Models โ€ขWi-Fi Protected Access 3 (WPA3) โ€ขAAA/Remote Authentication โ€ขDial-In User Service (RADIUS) โ€ขCryptographic Protocols โ€ขAuthentication Protocols โ€ขInput Validation โ€ขSecure Cookies โ€ขStatic Code Analysis โ€ขCode Signing ๏‚ฉ Connection Methods
  • 28.
    www.infosectrain.com โ€ขOwnership โ€ขClassification โ€ขInventory โ€ขEnumeration โ€ขSanitization โ€ขDestruction โ€ขCertification โ€ขData retention โ€ขVulnerability Scan โ€ขApplicationSecurity ๏‚ฉ Acquisition/Procurement Process ๏‚ฉ Assignment/Accounting ๏‚ฉ Identification Methods โ€ขStatic Analysis โ€ขDynamic Analysis โ€ขPackage Monitoring ๏‚ฉ Monitoring/Asset Tracking โ€ขDisposal/Decommissioning 4.2: Explain the Security Implications of Proper Hardware, Software, and Data Asset Management 4.3: Explain Various Activities Associated with Vulnerability Management
  • 29.
    www.infosectrain.com ๏‚ฉ Threat Feed โ€ขConfirmation ๏‚ฉPenetration Testing ๏‚ฉ Responsible Disclosure Program โ€ขPrioritize โ€ขCommon Vulnerability Scoring System (CVSS) โ€ขCommon Vulnerability Enumeration (CVE) โ€ขVulnerability Classification โ€ขExposure Factor โ€ขEnvironmental Variables โ€ขIndustry/Organizational Impact โ€ขRisk Tolerance โ€ขSystem/Process Audit โ€ขOpen-Source Intelligence (OSINT) โ€ขProprietary/Third-Party โ€ขInformation-Sharing Organization โ€ขDark Web ๏‚ฉ False Positive ๏‚ฉ False Negative โ€ขBug Bounty Program โ€ขAnalysis
  • 30.
    www.infosectrain.com โ€ขPatching โ€ขInsurance โ€ขSegmentation โ€ขCompensating Controls โ€ขExceptions andExemptions โ€ขRescanning โ€ขAudit โ€ขVerification ๏‚ฉ Vulnerability Response and Remediation ๏‚ฉ Reporting ๏‚ฉ Validation of Remediation โ€ขSystems โ€ขApplications โ€ขInfrastructure โ€ขLog Aggregation โ€ขAlerting โ€ขScanning โ€ขReporting ๏‚ฉ Monitoring Computing Resources ๏‚ฉ Activities 4.4: Explain Security Alerting and Monitoring Concepts and Tools
  • 31.
    www.infosectrain.com ๏‚ฉ Archiving ๏‚ฉ AlertResponse and Remediation/ Validation โ€ขSecurity Content Automation Protocol (SCAP) โ€ขBenchmarks โ€ขAgents/Agentless โ€ขSecurity Information and Event Management (SIEM) โ€ขAntivirus โ€ขData Loss Prevention (DLP) โ€ขSimple Network Management Protocol (SNMP) Traps โ€ขNetFlow โ€ขVulnerability Scanners โ€ขRules โ€ขAccess Lists โ€ขPorts/Protocols โ€ขScreened Subnets โ€ขQuarantine โ€ขAlert Tuning โ€ขTools ๏‚ฉ Firewall 4.5: Given a Scenario, Modify Enterprise Capabilities to Enhance Security
  • 32.
    www.infosectrain.com โ€ขTrends โ€ขSignatures โ€ขAgent-Based โ€ขCentralized Proxy โ€ขUniversal ResourceLocator (URL) Scanning โ€ขContent Categorization โ€ขBlock Rules โ€ขReputation โ€ขGroup Policy โ€ขSELinux โ€ขProtocol Selection โ€ขPort Selection โ€ขTransport Method โ€ขDomain-based Message โ€ขAuthentication Reporting and Conformance (DMARC) โ€ขDomain Keys Identified Mail (DKIM) โ€ขSender Policy Framework (SPF) โ€ขGateway ๏‚ฉ IDS/IPS ๏‚ฉ Web Filter ๏‚ฉ Operating System Security ๏‚ฉ Implementation of Secure Protocols ๏‚ฉ DNS Filtering ๏‚ฉ Email Security
  • 33.
    www.infosectrain.com โ€ขFile Integrity Monitoring โ€ขDLP โ€ขNetworkAccess Control (NAC) โ€ขEndpoint Detection and Response (EDR)/Extended Detection and Response (XDR) โ€ขUser Behavior Analytics โ€ขLightweight Directory Access Protocol (LDAP) โ€ขOpen Authorization (OAuth) โ€ขSecurity Assertions Markup Language (SAML) ๏‚ฉ Provisioning/De-provisioning user Accounts ๏‚ฉ Permission Assignments and Implications ๏‚ฉ Identity Proofing ๏‚ฉ Federation ๏‚ฉ Single Sign-On (SSO) ๏‚ฉ Interoperability ๏‚ฉ Attestation ๏‚ฉ Access Controls 4.6: Given a Scenario, Implement and Maintain Identity and Access Management
  • 34.
    www.infosectrain.com โ€ขMandatory โ€ขDiscretionary โ€ขRole-Based โ€ขRule-Based โ€ขAttribute-Based โ€ขTime-of-Day Restrictions โ€ขLeast Privilege โ€ขImplementations โ€ขPasswordBest Practices โ€ข Factors ๏‚ฉ Multi Factor Authentication ๏‚ฉ Password Concepts โ€ขBiometrics โ€ขHard/Soft Authentication Tokens โ€ขSecurity Keys โ€ขLength โ€ขComplexity โ€ขReuse โ€ขExpiration โ€ขAge โ€ขSomething You Know โ€ขSomething You Have โ€ขSomething You Are โ€ขSomewhere You Are
  • 35.
    www.infosectrain.com โ€ขPassword Managers โ€ขPasswordless ๏‚ฉ PrivilegedAccess Management Tools โ€ขJust-in-Time Permissions โ€ขPassword Vaulting โ€ขEphemeral Credentials โ€ขUser Provisioning โ€ขResource Provisioning โ€ขGuard Rails โ€ขSecurity Groups โ€ขTicket Creation โ€ขEscalation โ€ขEnabling/Disabling Services and Access โ€ขContinuous Integration and Testing โ€ขIntegrations and Application Programming Interfaces (APIs) โ€ขEfficiency/Time Saving โ€ขEnforcing Baselines โ€ขStandard Infrastructure Configurations โ€ขScaling in a Secure Manner ๏‚ฉ Use Cases of Automation and Scripting ๏‚ฉ Benefits 4.7: Explain the Importance of Automation and Orchestration Related to Secure Operations
  • 36.
    www.infosectrain.com โ€ขEmployee Retention โ€ขReaction Time โ€ขWorkforceMultiplier โ€ขComplexity โ€ขCost โ€ขSingle Point of Failure โ€ขTechnical Debt โ€ขOngoing Supportability โ€ขPreparation โ€ขDetection โ€ขAnalysis โ€ขContainment โ€ขEradication โ€ขRecovery โ€ขLessons learned โ€ขTabletop Exercise โ€ขSimulation ๏‚ฉ Process ๏‚ฉ Training ๏‚ฉ Testing ๏‚ฉ Other Considerations 4.8: Explain Appropriate Incident Response Activities
  • 37.
    www.infosectrain.com ๏‚ฉ Root CauseAnalysis ๏‚ฉ Threat Hunting ๏‚ฉ Digital Forensics ๏‚ฉ Log Data ๏‚ฉ Data Sources โ€ขLegal Hold โ€ขChain of Custody โ€ขAcquisition โ€ขReporting โ€ขPreservation โ€ขE-Discovery โ€ขFirewall Logs โ€ขApplication Logs โ€ขEndpoint Logs โ€ขOS-Specific Security Logs โ€ขIPS/IDS Logs โ€ขNetwork Logs โ€ขMetadata โ€ขVulnerability Scans โ€ขAutomated Reports โ€ขDashboards โ€ขPacket Captures 4.9: Given a Scenario, Use Data Sources to Support an Investigation
  • 38.
    www.infosectrain.com Domain 05 ๏‚ฉ Guidelines ๏‚ฉPolicies ๏‚ฉ Standards ๏‚ฉ Procedures โ€ขAcceptable Use Policy (AUP) โ€ขInformation Security Policies โ€ขBusiness Continuity โ€ขDisaster Recovery โ€ขIncident Response โ€ขSoftware Development Lifecycle (SDLC) โ€ขChange Management โ€ขPassword โ€ขAccess Control โ€ขPhysical Security โ€ขEncryption โ€ขChange Management โ€ขOnboarding/Offboarding โ€ขPlaybooks Security Program Management and Oversight 5.1: Summarize Elements of Effective Security Governance
  • 39.
    www.infosectrain.com ๏‚ฉ External Considerations ๏‚ฉMonitoring and Revision ๏‚ฉ Types of Governance Structures ๏‚ฉ Roles and Responsibilities for Systems and Data โ€ขRegulatory โ€ขLegal โ€ขIndustry โ€ขLocal/Regional โ€ขNational โ€ขGlobal โ€ขBoards โ€ขCommittees โ€ขGovernment Entities โ€ขCentralized/Decentralized โ€ขOwners โ€ขControllers โ€ขProcessors โ€ขCustodians/Stewards
  • 40.
    www.infosectrain.com โ€ขAd hoc โ€ขRecurring โ€ขOne-Time โ€ขContinuous โ€ขQualitative โ€ขQuantitative โ€ขSingle LossExpectancy (SLE) โ€ขAnnualized Loss Expectancy (ALE) โ€ขAnnualized Rate of Occurrence (ARO) โ€ขProbability โ€ขLikelihood โ€ขExposure Factor โ€ขKey Risk Indicators โ€ขRisk Owners โ€ขRisk Threshold ๏‚ฉ Risk Identification ๏‚ฉ Risk Assessment ๏‚ฉ Risk Analysis ๏‚ฉ Risk Register ๏‚ฉ Risk Tolerance ๏‚ฉ Risk Appetite 5.2: Explain Elements of the Risk Management Process
  • 41.
    www.infosectrain.com โ€ขExpansionary โ€ขConservative โ€ขNeutral โ€ขTransfer โ€ขAccept โ€ขAvoid โ€ขMitigate โ€ขRecovery Time Objective(RTO) โ€ขRecovery Point Objective (RPO) โ€ขMean Time to Repair (MTTR) โ€ขMean Time Between Failures (MTBF) ๏‚ฉ Risk Management Strategies ๏‚ฉ Risk Reporting ๏‚ฉ Business Impact Analysis โ€ขExemption โ€ขException
  • 42.
    www.infosectrain.com โ€ขPenetration Testing โ€ขRight-to-Audit Clause โ€ขEvidenceof Internal Audits โ€ขIndependent Assessments โ€ขSupply Chain Analysis โ€ขDue Diligence โ€ขConflict of Interest โ€ขService-Level Agreement (SLA) โ€ขMemorandum of Agreement (MOA) โ€ขMemorandum of Understanding (MOU) โ€ขMaster Service Agreement (MSA) โ€ขWork Order (WO)/Statement of Work (SOW) โ€ขNon-Disclosure Agreement (NDA) โ€ขBusiness Partners Agreement (BPA) ๏‚ฉ Vendor Assessment ๏‚ฉ Vendor Selection ๏‚ฉ Agreement Types ๏‚ฉ Vendor Monitoring ๏‚ฉ Questionnaires ๏‚ฉ Rules of Engagement 5.3: Explain the Processes Associated with Third-Party Risk Assessment and Management
  • 43.
    www.infosectrain.com ๏‚ฉ Attestation ๏‚ฉ Internal ๏‚ฉExternal โ€ขActive โ€ขPassive ๏‚ฉ Penetration Testing โ€ขCompliance โ€ขAudit Committee โ€ขSelf-Assessments โ€ขRegulatory โ€ขExaminations โ€ขAssessment โ€ขIndependent Third-Party Audit โ€ขPhysical โ€ขOffensive โ€ขDefensive โ€ขIntegrated โ€ขKnown Environment โ€ขPartially Known Environment โ€ขUnknown Environment โ€ขReconnaissance 5.4: Explain Types and Purposes of Audits and Assessments
  • 44.
    www.infosectrain.com ๏‚ฉ Phishing ๏‚ฉ AnomalousBehavior Recognition ๏‚ฉ User Guidance and Training ๏‚ฉ Development ๏‚ฉ Execution ๏‚ฉ Reporting and Monitoring โ€ขCampaigns โ€ขRecognizing a Phishing Attempt โ€ขResponding to Reported Suspicious Messages โ€ขRisky โ€ขUnexpected โ€ขUnintentional โ€ขInitial โ€ขRecurring โ€ขPolicy/Handbooks โ€ขSituational Awareness โ€ขInsider Threat โ€ขPassword Management โ€ขRemovable Media and Cables โ€ขSocial Engineering โ€ขOperational Security โ€ขHybrid/Remote Work Environments 5.5: Given a Scenario, Implement Security Awareness Practices
  • 45.
  • 46.