Security+ SY0-501 Study Guide Table of Contents

Similar documents
Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

CompTIA Security+ (Exam SY0-401)

CompTIA Security+ Study Guide (SY0-501)

Software Development & Education Center Security+ Certification

CompTIA Security+ Certification

CompTIA Network+ Study Guide Table of Contents

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

Syllabus: The syllabus is broadly structured as follows:

CompTIA Cybersecurity Analyst+

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)

BraindumpsVCE. Best vce braindumps-exam vce pdf free download

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Comptia.Certkey.SY0-401.v by.SANFORD.362q. Exam Code: SY Exam Name: CompTIA Security+ Certification Exam

تاثیرفناوری اطالعات برسازمان ومدیریت جلسه هشتم و نهم

Implementing Cisco Network Security (IINS) 3.0

CompTIA JK CompTIA Academic/E2C Security+ Certification. Download Full Version :

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

CS System Security 2nd-Half Semester Review

Information Security in Corporation

Security Assessment Checklist

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified

Security+ CompTIA Certification Boot Camp

IT Foundations Networking Specialist Certification with Exam

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

CompTIA Security+(2008 Edition) Exam

Understanding Cisco Cybersecurity Fundamentals

Ethical Hacking and Prevention

CompTIA CSA+ Cybersecurity Analyst

Required Textbook and Materials. Course Objectives. Course Outline

Objective Applications, Devices, Protocols Applications, Devices, Protocols Classifying Network Components Objective 1.

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Advanced Diploma on Information Security

CCISO Blueprint v1. EC-Council

Network Security

Pearson CompTIA: Security+ SY0-401 (Course & Lab) Course Outline. Pearson CompTIA: Security+ SY0-401 (Course & Lab)

CompTIA Network+ N10-005

Introduction. Deployment Models. IBM Watson on the IBM Cloud Security Overview

CND Exam Blueprint v2.0

CompTIA E2C Security+ (2008 Edition) Exam Exam.

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

ISC2. Exam Questions CISSP. Certified Information Systems Security Professional (CISSP) Version:Demo

SECURITY & PRIVACY DOCUMENTATION

Changing face of endpoint security

CompTIA Security+ SY Course Outline. CompTIA Security+ SY May 2018

The Common Controls Framework BY ADOBE


Building a More Secure Cloud Architecture

FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

Potential Mitigation Strategies for the Common Vulnerabilities of Control Systems Identified by the NERC Control Systems Security Working Group

CIS Controls Measures and Metrics for Version 7

Course Outline Topic 1: Current State Assessment, Security Operations Centers, and Security Architecture

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

Network Security and Cryptography. December Sample Exam Marking Scheme

Cisco Exam Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ]

Implementing Cisco Edge Network Security Solutions ( )

CompTIA Advanced Security Practitioner (CASP) (Exam CAS-001)

CS 356 Operating System Security. Fall 2013

CIS Controls Measures and Metrics for Version 7

Layer Security White Paper

CSCE 813 Internet Security Final Exam Preview

IBM SmartCloud Notes Security

itexamdump 최고이자최신인 IT 인증시험덤프 일년무료업데이트서비스제공

COPYRIGHTED MATERIAL. Contents

CompTIA SY CompTIA Security+

Most Common Security Threats (cont.)

Network+ Guide to Networks 6th Edition. Network Security

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

Juniper Vendor Security Requirements

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

SYLLABUS DATE OF LAST REVIEW: 012/2016 CIP CODE: Departmental Syllabus SEMESTER: Information Assurance COURSE TITLE: CIST0225 COURSE NUMBER:

CompTIA Mobility+ Certification

Implementing Cisco Cybersecurity Operations

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

Certification Exam Outline Effective Date: November 2018

COPYRIGHTED MATERIAL. Contents. Part I: The Basics in Depth 1. Chapter 1: Windows Attacks 3. Chapter 2: Conventional and Unconventional Defenses 51

Pearson CISSP Cert Guide with Labs. Course Outline. Pearson CISSP Cert Guide with Labs. 17 Oct

Introduction and Overview. Why CSCI 454/554?

Introduction to Network Security Missouri S&T University CPE 5420 Exam 2 Logistics

Submitted on behalf of the DOE National SCADA Test Bed. Jeff Dagle, PE Pacific Northwest National Laboratory (509)

CompTIA Security+ (2008 Edition) Exam

Cyber Criminal Methods & Prevention Techniques. By

QuickBooks Online Security White Paper July 2017

Strategic Infrastructure Security

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Table of Contents. Course Introduction. Table of Contents Getting Started About This Course About CompTIA Certifications. Module 1 / Server Setup

The IINS acronym to this exam will remain but the title will change slightly, removing IOS from the title, making the new title.

CompTIA A+ Certification ( ) Study Guide Table of Contents

MCSA Windows Server 2012

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Education Network Security

EXAM - CAS-002. CompTIA Advanced Security Practitioner (CASP) Exam. Buy Full Product.

Cybersecurity Foundations

Transcription:

Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators of Compromise Why is Security Important? Security Policy Threat Actor Types The Kill Chain Social Engineering Phishing Malware Types Trojans and Spyware Open Source Intelligence Module 1 / Unit 2 Critical Security Controls Security Control Types Defense in Depth Frameworks and Compliance Vulnerability Scanning and Pen Tests Security Assessment Techniques Pen Testing Concepts Vulnerability Scanning Concepts Exploitation Frameworks Module 1 / Unit 3 Security Posture Assessment Tools Topology Discovery Service Discovery Packet Capture Packet Capture Tools Remote Access Trojans Honeypots and Honeynets Module 1 / Unit 4 Incident Response

Incident Response Procedures Preparation Phase Identification Phase Containment Phase Eradication and Recovery Phases Module 1 / Summary Threats, Attacks, and Vulnerabilities Module 2 / Identity and Access Management Module 2 / Unit 1 Cryptography Uses of Cryptography Cryptographic Terminology and Ciphers Cryptographic Products Hashing Algorithms Symmetric Algorithms Asymmetric Algorithms Diffie-Hellman and Elliptic Curve Transport Encryption Cryptographic Attacks Module 2 / Unit 2 Public Key Infrastructure PKI Standards Digital Certificates Certificate Authorities Types of Certificates Implementing PKI Storing and Distributing Keys Key Status and Revocation PKI Trust Models PGP / GPG Module 2 / Unit 3 Identification and Authentication Access Control Systems Identification Authentication LAN Manager / NTLM Kerberos PAP, CHAP, and MS-CHAP Password Attacks Token-based Authentication Biometric Authentication Common Access Card

Module 2 / Unit 4 Identity and Access Services Authorization Directory Services RADIUS and TACACS+ Federation and Trusts Federated Identity Protocols Module 2 / Unit 5 Account Management Formal Access Control Models Account Types Windows Active Directory Creating and Managing Accounts Account Policy Enforcement Credential Management Policies Account Restrictions Accounting and Auditing Module 2 / Summary Identity and Access Management Module 3 / Architecture and Design 1 Module 3 / Unit 1 Secure Network Design Network Zones and Segments Subnetting Switching Infrastructure Switching Attacks and Hardening Endpoint Security Network Access Control Routing Infrastructure Network Address Translation Software Defined Networking Module 3 / Unit 2 Firewalls and Load Balancers Basic Firewalls Stateful Firewalls Implementing a Firewall or Gateway Web Application Firewalls Proxies and Gateways Denial of Service Attacks Load Balancers

Module 3 / Unit 3 IDS and SIEM Intrusion Detection Systems Configuring IDS Log Review and SIEM Data Exfiltration and DLP Malware and Intrusion Response Module 3 / Unit 4 Secure Wireless Access Wireless LANs WEP and WPA Wi-Fi Authentication Extensible Authentication Protocol Additional Wi-Fi Security Settings Wi-Fi Site Security Personal Area Networks Module 3 / Unit 5 Physical Security Controls Site Layout and Access Gateways and Locks Alarm Systems Surveillance Hardware Security Environmental Controls Module 3 / Summary Architecture and Design 1 Module 4 / Architecture and Design 2 Module 4 / Unit 1 Secure Protocols and Services DHCP Security DNS Security Network Management Protocols HTTP and Web Servers SSL / TLS and HTTPS Web Security Gateways Email Services S/MIME File Transfer Voice and Video Services Voice over IP (VoIP)

Module 4 / Unit 2 Secure Remote Access Remote Access Architecture Virtual Private Networks IPsec and IKE Remote Access Servers Remote Administration Tools Hardening Remote Access Infrastructure Module 4 / Unit 3 Secure Systems Design Trusted Computing Hardware / Firmware Security Peripheral Device Security Secure Configurations OS Hardening Patch Management Embedded Systems Security for Embedded Systems Module 4 / Unit 4 Secure Mobile Device Services Mobile Device Deployments Mobile Connection Methods Mobile Access Control Systems Enforcement and Monitoring Module 4 / Unit 5 Secure Virtualization and Cloud Services Virtualization Technologies Virtualization Security Cloud Computing Cloud Security Best Practices Module 4 / Summary Architecture and Design 2 Module 5 / Risk Management Module 5 / Unit 1 Forensics Forensic Procedures Collecting Evidence Capturing System Images Handling and Analyzing Evidence

Module 5 / Unit 2 Disaster Recovery and Resiliency Continuity of Operations Planning Disaster Recovery Planning Resiliency Strategies Recovery Sites Backup Plans and Policies Resiliency and Automation Strategies Module 5 / Unit 3 Risk Management Business Impact Analysis Identification of Critical Systems Risk Assessment Risk Mitigation Module 5 / Unit 4 Secure Application Development Application Vulnerabilities Application Exploits Web Browser Exploits Secure Application Design Secure Coding Concepts Auditing Applications Secure DevOps Module 5 / Unit 5 Organizational Security Corporate Security Policy Personnel Management Policies Interoperability Agreements Data Roles Data Sensitivity Labeling and Handling Data Sanitization and Disposal Privacy and Conduct Policies Security Policy Training Module 5 / Summary Risk Management

Taking the Exam Glossary Index