CompTIA Security Plus SY0-701 Course Content
CompTIA Security Plus SY0-701 Course Content
SY0-701
CERTIFICATION TRAINING
www.infosectrain.com
UR SE
40 Hrs of
Instructor-led Training
highlights
Certified &
Experienced Trainers
CO
Blended
Learning Model
4 CompTIA Authorized
Training Partner
www.infosectrain.com
COURSE DESCRIPTION
Overview
The CompTIA Security+ SY0-701 course from InfosecTrain, provides a
comprehensive and expert-led training experience, covering five key
domains that are essential for understanding and excelling in the field of
information security. Participants will delve into general security concepts,
threats, vulnerabilities, mitigations, security architecture, security
operations, and security program management. The course features
practical exercises and hands-on labs to develop participant’s skills,
ensuring that participants are well-prepared for the SY0-701
certification exam.
www.infosectrain.com
TARGET-Audience
• System Administrators
• Security Engineers and Consultants
• Network Administrators
• IT Auditors/Penetration Testers
PRE-Requisites
• CompTIA A+ and CompTIA Network+
• It is recommended to have at least 2 years of experience in IT
administration with a focus on security, hands-on experience with
technical information security, and broad knowledge of security concepts.
www.infosectrain.com
www.infosectrain.com
EXAM
Information
Exam Code SY0-601 SY0-701
www.infosectrain.com
COMPTIA SECURITY+ SY0-701
COURSE OBJECTIVES
Develop a comprehensive understanding of foundational security concepts
www.infosectrain.com
www.infosectrain.com
CO URSE CONTENT
Domain 1 General Security Concepts (12%)
www.infosectrain.com
Domain 01 General Security Concepts
1.1: Compare and Contrast Various Types of Security Controls
Categories
• Technical
• Managerial
• Operational
• Physical
Control
• Preventive
• Deterrent
• Detective
• Corrective
• Compensating
• Directive
• Authenticating People
• Authenticating Systems
• Authorization Models
Gap Analysis
www.infosectrain.com
Zero Trust
Control Plane
• Adaptive Identity
• Threat Scope Reduction
• Policy-Driven Access Control
• Policy Administrator
• Policy Engine
Data Plane
Physical Security
• Bollards
• Access Control Vestibule
• Fencing
• Video Surveillance
• Security Guard
• Access Badge
• Lighting
• Sensors
Infrared
Pressure
Microwave
Ultrasonic www.infosectrain.com
Deception and Disruption Technology
• Honeypot
• Honeynet
• Honeyfile
• Honeytoken
• Approval process
• Ownership
• Stakeholders
• Impact Analysis
• Test Results
• Backout Plan
• Maintenance Window
• Standard Operating Procedure
Technical Implications
• Updating Diagrams
• Updating Policies/Procedures
Version Control
• Public Key
• Private Key
• Key Escrow
Encryption
Level
• Full-Disk
• Partition
• File
• Volume
• Database
• Record
• Transport/Communication
• Asymmetric
• Symmetric
• Key Exchange
• Algorithms
• Key length www.infosectrain.com
Tools
Threat Actors
• Nation-State
• Unskilled Attacker
• Hacktivist
• Insider Threat
• Organized Crime
• Shadow IT
Attributes of Actors
• Internal/External
• Resources/Funding
• Level of Sophistication/Capability
Motivations
• Data Exfiltration
• Espionage
• Service Disruption
• Blackmail
• Financial Gain
• Philosophical/Political Beliefs
• Ethical
• Revenge
• Disruption/Chaos
www.infosectrain.com
• War
2.2: Explain Common Threat Vectors and Attack Surfaces
Message-Based
• Email
• Short Message Service (SMS)
• Instant Messaging (IM)
• Image-Based
• File-Based
• Voice Call
• Removable Device
• Vulnerable Software
Client-Based vs. Agentless
Application
• Memory Injection
• Buffer Overflow
• Race Conditions
• Time-of-Check (TOC)
• Time-of-Use (TOU)
• Malicious Update
• Operating System (OS)-Based
• Web-Based
www.infosectrain.com
• Structured Query Language (SQL) Injection
• Cross-Site Scripting (XSS)
• Hardware
• Firmware
• End-of-Life
• Legacy
• Virtualization
• Virtual Machine (VM) Escape
• Resource Reuse
• Cloud-Specific
• Supply Chain
• Service Provider
• Hardware Provider
• Software Provider
• Cryptographic
• Misconfiguration
• Mobile Device
• Side Loading
• Jailbreaking
• Zero-Day
www.infosectrain.com
2.4: Given a Scenario, Analyze Indicators of Malicious Activity
Malware Attacks
• Ransomware
• Trojan
• Worm
• Spyware
• Bloatware
• Virus
• Keylogger
• Logic Bomb
• Rootkit
Physical Attacks
• Brute Force
• Radio Frequency Identification (RFID) Cloning
• Environmental
Network Attacks
• Injection
• Buffer Overflow
• Replay
• Privilege Escalation
• Forgery
• Directory Traversal
Cryptographic Attacks
• Downgrade
• Collision
• Birthday
Password Attacks
• Spraying
• Brute Force
Indicators
• Account Lockout
• Concurrent Session Usage
• Blocked Content
• Impossible Travel
• Resource Consumption
• Resource Inaccessibility
• Out-of-Cycle Logging
• Published/Documented
• Missing Logs www.infosectrain.com
2.5: Explain the Purpose of Mitigation Techniques Used to Secure
the Enterprise
Segmentation
Access Control
www.infosectrain.com
Domain 03 Security Architecture
3.1: Compare and Contrast Security Implications of Different
Architecture Models
• Cloud
• Responsibility Matrix
• Hybrid Considerations
• Third-Party Vendors
• Infrastructure as Code (IaC)
• Serverless
• Microservices
• Network Infrastructure
• On-Premises
• Centralized vs. Decentralized
• Containerization
• Virtualization
• IoT
• Industrial Control Systems (ICS)/
• Supervisory Control and Data Acquisition (SCADA)
• Real-Time Operating System (RTOS)
• Embedded Systems
• High availability
www.infosectrain.com
Considerations
• Availability
• Resilience
• Cost
• Responsiveness
• Scalability
• Ease of Deployment
• Risk Transference
• Ease of Recovery
• Patch Availability
• Inability to Patch
• Power
• Compute
• Jump Server
• Proxy Server
• Intrusion Prevention System (IPS)/Intrusion Detection System (IDS)
• Load Balancer
• Sensor
Port Security
• 802.1X
• Extensible Authentication
Firewall Types
www.infosectrain.com
3.3: Compare and Contrast Concepts and Strategies to Protect Data
Data Types
• Regulated
• Trade Secret
• Intellectual Property
• Legal Information
• Financial Information
• Human and Non-Human-Readable
Data Classifications
• Sensitive
• Confidential
• Public
• Restricted
• Private
• Critica
General Data Considerations
• Data States
• Data at Rest
• Data in Transit
• Data in Use
• Data Sovereignty
• Geolocation
www.infosectrain.com
Methods to Secure Data
• Geographic Restrictions
• Encryption
• Hashing
• Masking
• Tokenization
• Obfuscation
• Segmentation
• Permission Restrictions
High Availability
• Tabletop Exercises
• Fail over
• Simulation
• Parallel Processing
Backups
• Onsite/Offsite
• Frequency
• Encryption
• Snapshots
• Recovery
• Replication
• Journaling
Power
• Generators
• Uninterruptible Power Supply (UPS)
www.infosectrain.com
Domain 04 Security Operations
4.1: Given a Scenario, Apply Common Security Techniques to Computing
Secure Baselines
• Establish
• Deploy
• Maintain
Hardening Targets
• Mobile Devices
• Workstations
• Switches
• Routers
• Cloud Infrastructure
• Servers
• ICS/SCADA
• Embedded Systems
• RTOS
• IoT devices
Wireless Devices
• Installation Considerations
• Site Surveys
• Heat Maps
www.infosectrain.com
Mobile Solutions
• Cellular
• Wi-Fi
• Bluetooth
Wireless Security Settings
• Input Validation
• Secure Cookies
• Static Code Analysis
• Code Signing
• Sandboxing
• Monitoring www.infosectrain.com
4.2: Explain the Security Implications of Proper Hardware, Software, and
Data Asset Management
Acquisition/Procurement Process
Assignment/Accounting
• Ownership
• Classification
Monitoring/Asset Tracking
• Inventory
• Enumeration
• Disposal/Decommissioning
• Sanitization
• Destruction
• Certification
• Data retention
• Vulnerability Scan
• Application Security
• Static Analysis
• Dynamic Analysis
• Package Monitoring
www.infosectrain.com
Threat Feed
• Open-Source Intelligence (OSINT)
• Proprietary/Third-Party
• Information-Sharing Organization
• Dark Web
Penetration Testing
Responsible Disclosure Program
False Negative
• Prioritize
• Common Vulnerability Scoring System (CVSS)
• Common Vulnerability Enumeration (CVE)
• Vulnerability Classification
• Exposure Factor
• Environmental Variables
• Industry/Organizational Impact
• Risk Tolerance
www.infosectrain.com
Vulnerability Response and Remediation
• Patching
• Insurance
• Segmentation
• Compensating Controls
• Exceptions and Exemptions
Validation of Remediation
• Rescanning
• Audit
• Verification
Reporting
• Systems
• Applications
• Infrastructure
Activities
• Log Aggregation
• Alerting
• Scanning
• Reporting
www.infosectrain.com
Archiving
Alert Response and Remediation/ Validation
• Quarantine
• Alert Tuning
• Tools
• Security Content Automation Protocol (SCAP)
• Benchmarks
• Agents/Agentless
• Security Information and Event Management (SIEM)
• Antivirus
• Data Loss Prevention (DLP)
• Simple Network Management Protocol (SNMP) Traps
• NetFlow
• Vulnerability Scanners
Firewall
• Rules
• Access Lists
• Ports/Protocols
• Screened Subnets
www.infosectrain.com
IDS/IPS
• Trends
• Signatures
Web Filter
• Agent-Based
• Centralized Proxy
• Universal Resource Locator (URL) Scanning
• Content Categorization
• Block Rules
• Reputation
Operating System Security
• Group Policy
• SELinux
Implementation of Secure Protocols
• Protocol Selection
• Port Selection
• Transport Method
DNS Filtering
Email Security
• Domain-based Message
• Authentication Reporting and Conformance (DMARC)
• Domain Keys Identified Mail (DKIM)
• Sender Policy Framework (SPF)
www.infosectrain.com
• Gateway
• File Integrity Monitoring
• DLP
• Network Access Control (NAC)
• Endpoint Detection and Response (EDR)/Extended Detection and
Response (XDR)
Identity Proofing
Federation
Attestation
Access Controls
www.infosectrain.com
• Mandatory
• Discretionary
• Role-Based
• Rule-Based
• Attribute-Based
• Time-of-Day Restrictions
• Least Privilege
Multi Factor Authentication
• Implementations
• Biometrics
• Hard/Soft Authentication Tokens
• Security Keys
• Factors
Process
• Preparation
• Detection
• Analysis
• Containment
• Eradication
• Recovery
• Lessons learned
Training
Testing
• Tabletop Exercise
• Simulation
www.infosectrain.com
Root Cause Analysis
Threat Hunting
Digital Forensics
• Legal Hold
• Chain of Custody
• Acquisition
• Reporting
• Preservation
• E-Discovery
Log Data
• Firewall Logs
• Application Logs
• Endpoint Logs
• OS-Specific Security Logs
• IPS/IDS Logs
• Network Logs
• Metadata
Data Sources
• Vulnerability Scans
• Automated Reports
• Dashboards
• Packet Captures www.infosectrain.com
Domain 05 Security Program Management and Oversight
Guidelines
Policies
• Acceptable Use Policy (AUP)
• Information Security Policies
• Business Continuity
• Disaster Recovery
• Incident Response
• Software Development Lifecycle (SDLC)
• Change Management
Standards
• Password
• Access Control
• Physical Security
• Encryption
Procedures
• Change Management
• Onboarding/Offboarding
• Playbooks
www.infosectrain.com
External Considerations
• Regulatory
• Legal
• Industry
• Local/Regional
• National
• Global
Monitoring and Revision
• Boards
• Committees
• Government Entities
• Centralized/Decentralized
Roles and Responsibilities for Systems and Data
• Owners
• Controllers
• Processors
• Custodians/Stewards
www.infosectrain.com
5.2: Explain Elements of the Risk Management Process
Risk Identification
Risk Assessment
• Ad hoc
• Recurring
• One-Time
• Continuous
Risk Analysis
• Qualitative
• Quantitative
• Single Loss Expectancy (SLE)
• Annualized Loss Expectancy (ALE)
• Annualized Rate of Occurrence (ARO)
• Probability
• Likelihood
• Exposure Factor
Risk Register
Risk Appetite
www.infosectrain.com
• Expansionary
• Conservative
• Neutral
Risk Management Strategies
• Transfer
• Accept
• Exemption
• Exception
• Avoid
• Mitigate
Risk Reporting
www.infosectrain.com
5.3: Explain the Processes Associated with Third-Party Risk Assessment
and Management
Vendor Assessment
• Penetration Testing
• Right-to-Audit Clause
• Evidence of Internal Audits
• Independent Assessments
• Supply Chain Analysis
Vendor Selection
• Due Diligence
• Conflict of Interest
Agreement Types
• Service-Level Agreement (SLA)
• Memorandum of Agreement (MOA)
• Memorandum of Understanding (MOU)
• Master Service Agreement (MSA)
• Work Order (WO)/Statement of Work (SOW)
• Non-Disclosure Agreement (NDA)
• Business Partners Agreement (BPA)
Vendor Monitoring
Questionnaires
Rules of Engagement
www.infosectrain.com
5.4: Explain Types and Purposes of Audits and Assessments
Attestation
Internal
• Compliance
• Audit Committee
• Self-Assessments
External
• Regulatory
• Examinations
• Assessment
• Independent Third-Party Audit
Penetration Testing
• Physical
• Offensive
• Defensive
• Integrated
• Known Environment
• Partially Known Environment
• Unknown Environment
• Reconnaissance
• Active
• Passive
www.infosectrain.com
5.5: Given a Scenario, Implement Security Awareness Practices
Phishing
• Campaigns
• Recognizing a Phishing Attempt
• Responding to Reported Suspicious Messages
Anomalous Behavior Recognition
• Risky
• Unexpected
• Unintentional
User Guidance and Training
• Policy/Handbooks
• Situational Awareness
• Insider Threat
• Password Management
• Removable Media and Cables
• Social Engineering
• Operational Security
• Hybrid/Remote Work Environments
Reporting and Monitoring
• Initial
• Recurring
Development
Execution
www.infosectrain.com
COURSE
benefits
$125,000
$123,975
$114,658
$84,363 $88,410
$55,540
www.infosectrain.com
www.infosectrain.com I [email protected]
www.infosectrain.com