@esccode

“Insanity is doing the same thing, over and over again, but expecting different results.” ― Narcotics Anonymous

CompTIA Security+ sy0-601

Domain 1.0 Threats, Attacks, and Vulnerabilities

1.1 Compare and contrast different types of social engineering techniques

1.2 Given a scenario, analyze potential indicators to determine the type of attack

1.3 Given a scenario, analyze potential indicators associated with application attacks

1.4 Given a scenario, analyze potential indicators associated with network attacks

1.5 Explain different threat actors, vectors, and intelligence sources

1.6 Explain the security concerns associated with various types of vulnerabilities

1.7 Summarize the techniques used in security assessments

1.8 Explain the techniques used in penetration testing

Domain 2.0 Architecture and Design

2.1 Explain the importance of security concepts in an enterprise environment

2.2 Summarize virtualization and cloude computing concepts

2.3 Summarize secure application development, deployment, and automation concepts

2.4 Summarize authentication and authorization design concepts

2.5 Given a scenario, implement cybersecurity resilience

2.6 Explain the security implications of embedded and specialized systems

2.7 Explain the importance of physical security controls

? Class Type Suppression material
  A Common combustibles Watre,soda acid(a dry powder or liquid chemical)
  B Liquids CO2,halon,soda acid
  C Electrical CO2,halon
  D Metal Dry powder
  K Kitchen Wet chemicals

2.8 Summarize the basic of cryptographic concepts

Domain 3.0 Implementation

3.1 Given a scenario, implement secure protocols

3.2 Given a scenario, implement host or application security solutions

3.3 Given a scenario, implement secure network designs

3.4 Given a scenario, install and configure wireless security settings

3.5 Given a scenario, implement secure mobile solutions

3.6 Given a scenario, apply cybersecurity solutions to the cloud

3.7 Given a scenario, implement identity and account management controls

3.8 Given a scenario, implement authentication and authorization solutions

3.9 Given a scenario, implement public key infrastructure

Domain 4.0 Operations and Incident Response

4.1 Given a scenario, use the appropriate tool to assess organizational security

4.2 Summarize the importance of policies, processes, and procedures for incident response

4.3 Given an incident, utilize appropriate data sources to support an investigation

4.4 Given an incident,apply mitigation techniques or controls to secure an environment

4.5 Explain the key aspects of digital forensics

Domain 5.0 Governance, Risk, and Compliance

5.1 Compare and contrast various types of control

5.2 Explain the importance of applicable regulations, standards, or frameworks that impact organizational security posture

5.3 Explain the importance of policies to organizational security

5.4 Summarize risk management processes and concepts

5.5 Explain privacy and sensitive data concepts in relation to security

Security+ (SY0-601) Acronym List

The following is a list of acronyms that appear on the Comptia Security+ exam Candidates are encouraged to review the complate list and attain a working knowledge of all listed acronyms as part of a comprehensive exam preparation program.

ACRONYM DEFINITION
3DES Triple Data Encryption
AAA Authentication, Authorization, and Accounting
ABAC Attribute-based Access Control
ACL Access Control List
CSF Cybersecurity Framework
CSIRT Computer Security Incident Response Team
NIST National Institute of Standards and Technology
RMF Risk Management Framework
TTP tactic, technique, or procedure
UEBA User and Entity Behavior Analytics
   
   
   
   

Security+ Proposed Hardware and Software List

CompTIA has included this sample list of hardware and software to assist candidates as they prepare for the Security+ exam. This list may also be helpful for training companies that wish to create a lab component for their training offering. The bulleted lists below each topic are sample lists and are not exhaustive.

Reference

CompTIA