Ben's Security+ 701 Notes
Ben's Security+ 701 Notes
READ ME:
Thanks for supporting my channel! These are my notes that I used to pass the
Sec+ Exam on my first try! This also includes new terms that are found in the
Security+ 701 version.
I strive to keep my notes free and accessible to all. If you've found my notes
valuable, tips are always greatly appreciated. Your support enables me to create
more study materials and sustain my channel. Thank you! 🙂
Tip Jar:
Buy Me a Coffee 👉 https://buymeacoffee.com/benhtruongq
Gumroad 👉 https://bentruong.gumroad.com/l/701?
Categories:
Control Types:
Zero Trust:
Control Plane:
Data Plane:
Physical Security:
Sensors:
Technical Implications:
Documentation:
Public Key: A cryptographic key that is shared openly and used for encryption
or verifying signatures.
Private Key: A secret key that is kept confidential and used for decrypting
data or creating digital signatures.
Encryption:
Full-disk
Partition
File
Volume
Database
Record
Key Length: The size of the cryptographic key, influencing the strength of
encryption.
Tools:
Obfuscation:
Hashing:
Salting:
Adding random data to input before hashing to prevent identical inputs from
producing the same hash.
Digital Signatures:
Key Stretching:
Blockchain:
Certificates:
Threat Actors:
Attributes of Actors:
Internal/External: Whether the threat actor operates from within the target
organization or externally.
Motivations:
Attack Vectors:
Message-based:
Removable Device: Infecting systems through the use of infected USB drives
or external storage devices.
Vulnerable Software:
Unsecure Networks:
Supply Chain:
Application:
Race Conditions:
Web-Based:
Hardware:
Virtualization:
Cloud-Specific:
Supply Chain:
Misconfiguration:
Mobile Device:
Malware Attacks:
Logic Bomb: Malicious code that executes a harmful action when specific
conditions are met.
Physical Attacks:
Network Attacks:
Application Attacks:
Cryptographic Attacks:
Collision: Finding two different inputs that produce the same hash value,
potentially leading to unauthorized actions.
Password Attacks:
Indicators:
Account lockout
Blocked content
Impossible travel
Resource consumption
Resource inaccessibility
Out-of-cycle logging
Published/documented
Missing logs
Access Control:
Cloud:
Considerations:
Infrastructure Considerations:
Attack Surface: Total sum of vulnerabilities and entry points that attackers can
exploit to compromise a system or network.
Failure Modes:
Device Attribute:
Active vs. Passive: Active devices perform actions on data packets (e.g.,
firewalls), while passive devices observe and analyze network traffic (e.g.,
network monitoring tools).
Inline vs. Tap/Monitor: Inline devices sit directly in the data path and can
actively intercept or modify traffic, whereas tap/monitor devices passively
monitor traffic without interrupting the flow.
Network Appliances:
Sensors: Devices that collect data from the environment or network for
monitoring and analysis, often used for security monitoring and threat
detection.
Port Security:
Firewall Types:
Layer 4/Layer 7: Classifies firewalls based on the layers of the OSI model
they operate at, with Layer 4 firewalls filtering traffic based on IP
addresses and port numbers, while Layer 7 firewalls can inspect and filter
traffic based on application-layer data.
Secure Communication/Access:
Tunneling:
Data Types:
Data Classifications:
Sensitive: Data that requires protection due to its sensitivity and potential
impact on individuals, organizations, or society if compromised.
Public: Data intended for unrestricted access and sharing, typically non-
sensitive information that can be freely distributed.
Private: Data designated for internal use within an organization and not
intended for public disclosure.
Data States:
Data Sovereignty: Legal concept specifying the jurisdiction under which data
is subject to the laws and regulations of a particular country or region.
Hashing: Generating a unique fixed-size string (hash value) from data input,
commonly used for data integrity verification.
High Availability:
Site Considerations:
Hot Site: Fully equipped facility with infrastructure and systems ready to be
operational within a short time frame after a disaster.
Warm Site: Partially equipped facility with some infrastructure and systems in
place, reducing the time required for setup compared to a cold site.
Platform Diversity:
Utilizing a variety of hardware, software, and cloud platforms to mitigate the risk
of single points of failure and enhance overall system resilience.
Multi-cloud Systems:
Deploying applications and services across multiple cloud providers to increase
redundancy, avoid vendor lock-in, and enhance flexibility and resilience.
Continuity of Operations:
Ensuring the uninterrupted availability of critical business functions and processes
during and after disruptive events or disasters.
Capacity Planning:
Testing:
Backups:
Generators: Backup power sources that can provide electricity during outages
or emergencies.
Secure Baselines:
Hardening Targets:
Mobile Devices
Workstations
Switches
Routers
Cloud Infrastructure
Servers
ICS/SCADA
Embedded Systems
IoT Devices
Wireless Devices:
Installation Considerations:
Conduct site surveys and use heat maps to optimize wireless coverage
and performance.
Mobile Solutions:
Deployment Models:
Connection Methods:
Cellular
Wi-Fi
Bluetooth
AAA/RADIUS
Application Security:
Input validation
Code signing
Sandboxing:
Monitoring:
Acquisition/Procurement Process:
Assignment/Accounting:
Monitoring/Asset Tracking:
Disposal/Decommissioning:
Identification Methods:
Application Security:
Threat Feed:
Analysis:
Confirmation:
Validation of Remediation:
Activities:
Log Aggregation: Collect and consolidate logs from various sources, including
systems, applications, and network devices, for centralized analysis and
monitoring.
Archiving: Archive logs, reports, and other relevant data for historical
analysis, compliance requirements, and forensic investigations.
Tools:
Data Loss Prevention (DLP): Implement DLP solutions to monitor and prevent
unauthorized access, use, or transmission of sensitive data.
Firewall:
Access Lists: Lists of rules that determine which traffic is permitted or denied
based on source and destination IP addresses, ports, and protocols.
Web Filter:
Centralized Proxy: Route web traffic through a central proxy server to enforce
web filtering policies, content categorization, and access control.
URL Scanning: Inspect URLs in web traffic to identify and block malicious or
suspicious websites based on reputation and content.
Transport Method: Ensure secure transport methods (e.g., TLS/SSL) are used
to encrypt data transmission and protect against interception and tampering.
DNS Filtering: Filter and block malicious or unauthorized DNS requests to prevent
access to malicious domains and mitigate DNS-related threats.
Email Security:
Access Controls:
Least Privilege: Grant users the minimum level of access required to perform
their job functions, reducing the risk of unauthorized access and privilege
escalation.
Password Concepts:
Benefits:
Other Considerations:
Cost: While automation can lead to cost savings in the long run, there may be
initial investments in tools, training, and infrastructure.
Process:
Eradication: Removing the root cause of the security incident from the
affected systems and networks. This may involve patching vulnerabilities,
removing malware, or restoring affected data from backups.
Training:
Providing ongoing training and awareness programs to ensure that personnel are
prepared to respond effectively to security incidents and adhere to established
incident response procedures.
Testing:
Digital Forensics:
Log Data:
Data Sources:
Packet Captures: Records of network traffic captured and stored for analysis,
allowing security analysts to inspect packet contents, detect anomalies, and
investigate network security incidents
Policies:
Standards:
Procedures:
External Considerations:
Risk Management:
Risk Identification:
Risk Assessment:
Risk Analysis:
Risk Register:
Vendor Assessment:
Penetration Testing:
Right-to-Audit Clause:
Independent Assessments:
Vendor Selection:
Due Diligence:
Conflict of Interest:
Agreement Types:
Vendor Monitoring:
Questionnaires:
Rules of Engagement:
Compliance Reporting:
Internal:
External:
Consequences of Non-Compliance:
Fines:
Sanctions:
Reputational Damage:
Loss of License:
Contractual Impacts:
Compliance Monitoring:
Due Diligence/Care:
Automation:
Privacy:
Legal Implications:
Data Subject:
Ownership:
Right to be Forgotten:
Compliance:
Audit Committee:
Self-Assessments:
External:
Regulatory:
Examinations:
Assessment:
Penetration Testing:
Physical:
Offensive:
Defensive:
Integrated:
Known Environment:
Unknown Environment:
Reconnaissance:
Passive:
Active:
Phishing:
Campaigns:
Risky:
Unexpected:
Unintentional:
Policy/Handbooks:
Situational Awareness:
Educating users about the tactics and techniques used by cyber attackers,
promoting awareness of potential threats, and encouraging vigilance in
identifying and reporting suspicious activities.
Insider Threat:
Password Management:
Social Engineering:
Operational Security:
Initial:
Recurring:
Development:
Execution:
Bonus Tips:
Once you finish reviewing material and notes, continue to take practice exams.
When I started scoring around 75-85% on my practice exams, I felt confident
enough to take the exam and passed.
During the exam, don’t spend too much time on any question. I review the
several mistakes to avoid in this video here
👉 https://www.youtube.com/watch?v=iWjI6Kll0Gs&t=2s
Be confident in your knowledge and don’t overthink it!
Last of all, I wish you the best of luck on your exam! Continue to push yourself,
and develop your skills! Cybersecurity is a field that welcomes people from all
backgrounds, and this is just the beginning!