Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

CompTIA Security+ (SY0-701) Cert Prep

via LinkedIn Learning

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
A comprehensive, all-in-one resource for those preparing for the Security+ (SY0-701) certification exam.

Syllabus

Introduction
  • About the Security+ exam
  • What's new in SY0-701?
1. The Security+ Exam
  • The Security+ exam
  • Careers in information security
  • The value of certification
  • Stackable certifications
  • Study resources
2. Inside the Security+ Exam
  • In-person exam environment
  • At-home testing
  • Security+ question types
  • Passing the Security+ exam
3. Preparing for the Exam
  • Exam tips
  • Practice tests
  • Continuing education requirements
4. Domain 1: General Security Concepts
  • General security concepts
5. Fundamental Security Concepts
  • The goals of information security
  • Authentication, authorization, and accounting (AAA)
  • Categorizing security controls
  • Conducting a gap analysis
  • Zero Trust
  • Physical access control
  • Physical security personnel
  • Deception technologies
  • Change management
6. Cryptography
  • Understanding encryption
  • Symmetric and asymmetric cryptography
  • Goals of cryptography
  • Choosing encryption algorithms
  • The cryptographic lifecycle
  • Data de-identification
  • Data obfuscation
7. Symmetric Cryptography
  • Data Encryption Standard (DES)
  • 3DES
  • AES, Blowfish, and Twofish
  • Steganography
8. Asymmetric Cryptography
  • Rivest, Shamir, Adleman (RSA)
  • PGP and GnuPG
  • Elliptic-curve and quantum cryptography
  • Tor and perfect forward secrecy
9. Key Management
  • Key exchange
  • Diffie-Hellman
  • Key escrow
  • Key stretching
  • Hardware security modules
10. Public Key Infrastructure
  • Trust models
  • PKI and digital certificates
  • Hash functions
  • Digital signatures
  • Digital signature standard
  • Create a digital certificate
  • Revoke a digital certificate
  • Certificate stapling
  • Certificate authorities
  • Certificate subjects
  • Certificate types
  • Certificate formats
11. Cryptographic Applications
  • TLS and SSL
  • Blockchain
12. Domain 2: Threats, Vulnerabilities, and Mitigations
  • Threats, vulnerabilities, and mitigations
13. Understanding Vulnerability Types
  • Vulnerability impact
  • Supply chain vulnerabilities
  • Configuration vulnerabilities
  • Architectural vulnerabilities
14. Malware
  • Comparing viruses, worms, and trojans
  • Malware payloads
  • Understanding backdoors and logic bombs
  • Looking at advanced malware
  • Understanding botnets
  • Malicious script execution
15. Understanding Attackers
  • Cybersecurity adversaries
  • Attacker motivations
  • Preventing insider threats
  • Attack vectors
  • Zero-day attacks
16. Social Engineering Attacks
  • Social engineering
  • Impersonation attacks
  • Identity fraud and pretexting
  • Watering hole attacks
  • Physical social engineering
  • Business email compromise
  • Misinformation and disinformation
17. Password Attacks
  • Password attacks
  • Password spraying and credential stuffing
18. Application Attacks
  • Preventing SQL injection
  • Understanding cross-site scripting
  • Request forgery
  • Overflow attacks
  • Explaining cookies and attachments
  • Session hijacking
  • Code execution attacks
  • Privilege escalation
  • OWASP Top Ten
  • Application security
  • Defending against directory traversal
  • Race condition vulnerabilities
19. Cryptanalytic Attacks
  • Brute force attacks
  • Knowledge-based attacks
  • Limitations of encryption algorithms
20. Network Attacks
  • Denial-of-service attacks
  • Eavesdropping attacks
  • DNS attacks
  • Wireless attacks
  • Propagation attacks
  • Preventing rogues and evil twins
  • Disassociation attacks
  • Understanding Bluetooth attacks
  • RFID security
21. Attack Indicators
  • Attack indicators
22. Domain 3: Security Architecture
  • Security architecture
23. Cloud Computing
  • What is the cloud?
  • Cloud computing roles
  • Drivers for cloud computing
  • Multitenant computing
  • Cloud considerations
  • Security service providers
24. Virtualization
  • Virtualization
  • Desktop and application virtualization
25. Cloud Building Blocks
  • Cloud compute resources
  • Cloud storage
  • Cloud networking
  • Cloud databases
  • Cloud orchestration
  • Containers
  • SOA and microservices
26. Cloud Activities
  • Cloud activities and the cloud reference architecture
  • Cloud deployment models
  • Cloud service categories
  • Security and privacy concerns in the cloud
  • Data sovereignty
  • Operational concerns in the cloud
27. Cloud Security Controls
  • Cloud firewall considerations
  • Cloud application security
  • Cloud provider security controls
28. TCP/IP Networking
  • Introducing TCP/IP
  • IP addresses and DHCP
  • Domain Name System (DNS)
  • Network ports
  • ICMP
29. Secure Network Design
  • Security zones
  • VLANs and network segmentation
  • Security device placement
  • Software-defined networking (SDN)
30. Network Security Devices
  • Routers, switches, and bridges
  • Firewalls
  • Web application firewalls
  • Proxy servers
  • Load balancers
  • VPNs and VPN concentrators
  • Network intrusion detection and prevention
  • Protocol analyzers
  • Unified threat management
  • Failure modes
31. Network Security Techniques
  • Restricting network access
  • Network access control
  • Router configuration security
  • Switch configuration security
  • Maintaining network availability
  • Network monitoring
  • SNMP
  • Isolating sensitive systems
  • Zero trust networking
  • Secure access service edge (SASE)
32. Embedded Systems Security
  • Industrial control systems
  • Internet of Things
  • Securing smart devices
  • Secure networking for smart devices
  • Embedded systems
33. Data Protection
  • Understanding data security
  • Data types
  • Data anonymization
  • Data obfuscation
  • Information classification
34. Resilience and Recovery
  • Business continuity planning
  • Business continuity controls
  • High availability and fault tolerance
  • Disaster recovery
  • Backups
  • Restoring backups
  • Disaster recovery sites
  • Testing BC/DR plans
  • Capacity planning
35. Domain 4: Security Operations
  • Security operations
36. Data Security Controls
  • Developing security baselines
  • Leveraging industry standards
  • Customizing security standards
37. Host Security
  • Operating system security
  • Malware prevention
  • Application management
  • Host-based network security controls
  • File integrity monitoring
  • Data loss prevention
  • Data encryption
  • Hardware and firmware security
  • Linux file permissions
  • Web content filtering
38. Configuration Enforcement
  • Change management
  • Configuration management
  • Physical asset management
  • Disposal and decommissioning
39. Mobile Device Security
  • Mobile connection methods
  • Mobile device security
  • Mobile device management
  • Mobile device tracking
  • Mobile application security
  • Mobile security enforcement
  • Bring your own device (BYOD)
  • Mobile deployment models
40. Wireless Networking
  • Understanding wireless networking
  • Wireless encryption
  • Wireless authentication
  • RADIUS
  • Wireless signal propagation
  • Wireless networking equipment
41. Code Security
  • Code review
  • Software testing
  • Code security tests
  • Fuzz testing
  • Acquired software
  • Package monitoring
42. Threat Intelligence
  • Threat intelligence
  • Intelligence sharing
  • Threat hunting
43. Vulnerability Management
  • What is vulnerability management?
  • Identify scan targets
  • Scan configuration
  • Scan perspective
  • Security Content Automation Protocol (SCAP)
  • Common Vulnerability Scoring System (CVSS )
  • Analyzing scan reports
  • Correlating scan results
  • Vulnerability response and remediation
44. Penetration Testing and Exercises
  • Penetration testing
  • Responsible disclosure
  • Bug bounty
45. Security Alerting, Monitoring, and Automation
  • Logging security information
  • Security information and event management
  • Monitoring activities
  • Endpoint monitoring
  • Automation and orchestration
46. Secure Protocols
  • TLS and SSL
  • IPSec
  • Securing common protocols
  • DKIM, DMARC, and SPF
  • Email gateways
47. Identification
  • Identification, authentication, authorization, and accounting
  • Usernames and access cards
  • Biometrics
  • Registration and identity proofing
48. Authentication
  • Authentication factors
  • Multifactor authentication
  • Something you have
  • Password policy
  • Password managers
  • Passwordless authentication
  • Single sign-on and federation
  • Kerberos and LDAP
  • SAML
  • OAUTH and OpenID Connect
  • Certificate-based authentication
49. Authorization
  • Understanding authorization
  • Mandatory access controls
  • Discretionary access controls
  • Access control lists
  • Advanced authorization concepts
50. Account Management
  • Understanding account and privilege management
  • Privileged access management
  • Provisioning and deprovisioning
51. Incident Response
  • Build an incident response program
  • Incident identification
  • Escalation and notification
  • Mitigation
  • Containment techniques
  • Incident eradication and recovery
  • Post-incident activities
  • Incident response training and testing
52. Digital Forensics
  • Introduction to forensics
  • System and file forensics
  • Chain of custody
  • E-discovery and evidence production
  • Investigation data sources
53. Domain 5: Security Program Management and Oversight
  • Security program management and oversight
54. Security Policies
  • Security policy framework
  • Security policies
  • Security standards
  • Security procedures
  • Policy monitoring and revision
  • Policy considerations
55. Security Governance
  • Security governance structures
  • Data security roles
56. Risk Analysis
  • Risk assessment
  • Quantitative risk assessment
  • Business impact analysis
  • Risk treatment options
  • Risk visibility and reporting
  • Ongoing risk assessment
  • Security metrics
57. Supply Chain Risk
  • Managing vendor relationships
  • Vendor agreements
  • Vendor information management
58. Privacy and Compliance
  • Legal and compliance risks
  • Compliance monitoring and reporting
59. Auditing
  • Audits and assessments
60. Conclusion
  • Continuing Your Studies

Taught by

Mike Chapple

Reviews

3 rating at LinkedIn Learning based on 1 rating

Start your review of CompTIA Security+ (SY0-701) Cert Prep

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.