CompTIA Security+ SYO-601

[Pages:4]CompTIA Security+ SYO-601

Explain Threat Actors and Attributes 3.1 Actor Types and Attributes 3.2 Open Source Threat Intelligence (OSINT) 3.3 Security in Action: Open Source Intelligence Explain Penetration Testing 4.1 Pen Testing Concepts 4.2 Pen Testing Techniques 4.3 Security in Action: Passive Recon Lesson 6: Explain the Impact of Vulnerabilities 6.1 Business Process Vulnerabilities 6.2 Source Code Vulnerabilities 6.3 Security in Action: Impact of End of Life Systems Install and Configure Network Components 7.1 Firewalls 7.2 Filters and Proxies 7.3 IDS and IPS 7.4 Virtual Private Networks 7.8 NACs, DLPs, and Mail Gateways 7.9 SIEM 7.10 Security in Action: Firewall Rule

Assessing Security Posture 8.1 Security Scanners and Analyzers 8.2 Command Line Tools 8.3 Security in Action: Demonstrate Nmap Lesson 9: Troubleshoot Common Security Issues 9.1 Configuration and Operational Issues 9.2 Personnel Issues 9.3 Security in Action: Root Cause Analysis (5 Whys)

Interpreting Output 10.1 Activity and Error Reporting 10.2 Security in Action: Local Host Reporting Lesson 11: Deploy Mobile Devices Securely 11.1 Mobile Connection Methods 11.2 Mobile Device Management 11.3 Mobile Device Concerns 11.4 Security in Action: Mobile Device Ownership Implement Secure Protocols 12.1 Secure Communication Protocols 12.2 Secure Network and Administration Protocols 12.3 Security in Action: Packet Capture and Protocol Analyzer Implement Secure Network Architecture 14.1 Zones 14.2 Isolation 14.3 Device Placement 14.4 Security in Action: Secure Enclave & Air Gapping Summarize Cloud and Virtualization Concepts 19.1 Virtualization

19.2 Cloud Service and Deployment Models 19.3 Security in Action: Workstation Virtualization Explain Risk Reducing Resiliency and Automation Strategies 20.1 Automation and Persistence Techniques 20.2 Redundancy and Fault Tolerance 20.3 Security in Action: RAID Cryptography and PKI Lesson 34: Compare and Contrast Basic Concepts of Cryptography 34.1 Cryptography Basics 34.2 Steganography 34.3 Security in Action: Basic Steganography Explain Cryptographic Algorithms and Their Basic Characteristics 35.1 Symmetric Encryption 35.2 Asymmetric Encryption 35.3 Hashing 35.4 Digital Signatures 35.5 Security in Action: Hashing Install and Configure Wireless Security Standards 36.1 Wireless Cryptographic Protocols 36.2 Security in Action: WPS Issues Lesson 37: Implement PKI 37.1 Digital Certificates 37.2 Key Lifecycle Management 37.3 Cryptographic Attacks 37.4 Security in Action: Crypto Vulnerabilities Compare and Contrast Controls 32.1 Comparing and Contrasting Controls 32.2 Security in Action: Technical Control Crossover

Carry Out Data Security and Privacy Practices 33.1 Data Protection and Classification 33.2 Data Retention and Destruction 33.3 Security in Action: Disk Wiping

Explain Disaster Recovery and Continuity of Operations Concepts 31.1 Recovery and Restoration 31.2 Continuity of Operations Planning 31.3 Security in Action: Site Selection Decision Tree

Explain Risk Management Concepts 28.1 Risk Management 28.2 Risk Assessments 28.3 Testing and Change Management 28.4 Security in Action: Quantitative Risk Assessment Follow Incident Response Procedures 29.1 Incident Response Plans 29.2 Incident Response Process 29.3 Security in Action: IR Response Creating a Playbook Summarize the Basic Concepts of Forensics 30.1 Forensic Fundamentals 30.2 Data Acquisition 30.3 Security in Action: Forensic Techniques

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download