SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
CompTIA Security+ Certification Exam Objectives 1 of 16
Copyright 2010 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
Certification Exam
Objectives: SY0-301
INTRODUCTION
The CompTIA Security+ Certification is a vendor neutral credential. The CompTIA Security+
exam is an internationally recognized validation of foundation-level security skills and knowledge,
and is used by organizations and security professionals around the globe.
The CompTIA Security+ exam will certify that the successful candidate has the knowledge and
skills required to identify risk and participate in risk mitigation activities, provide infrastructure,
application, operational and information security, apply security controls to maintain
confidentiality, integrity and availability, identify appropriate technologies and products, and
operate with an awareness of applicable policies, laws and regulations.
The CompTIA Security+ Certification is aimed at an IT security professional who has:
 A minimum of 2 years experience in IT administration with a focus on security
 Day to day technical information security experience
 Broad knowledge of security concerns and implementation including the topics in the
domain list below
CompTIA Security+ is accredited by ANSI to show compliance with the ISO 17024 Standard and,
as such, undergoes regular reviews and updates to the exam objectives. The following CompTIA
Security+ objectives reflect the subject areas in this edition of this exam, and result from subject
matter expert workshops and industry-wide survey results regarding the skills and knowledge
required of an information security professional with two years of experience.
This examination blueprint includes domain weighting, test objectives, and example content.
Example topics and concepts are included to clarify the test objectives and should not be
construed as a comprehensive listing of all the content of this examination.
The table below lists the domain areas measured by this examination and the approximate extent
to which they are represented in the examination:
Domain % of Examination
1.0 Network Security 21%
2.0 Compliance and Operational Security 18%
3.0 Threats and Vulnerabilities 21%
4.0 Application, Data and Host Security 16%
5.0 Access Control and Identity Management 13%
6.0 Cryptography 11%
Total 100%
**Note: The lists of examples provided in bulleted format below each objective are not exhaustive lists.
Other examples of technologies, processes or tasks pertaining to each objective may also be included on
the exam although not listed or covered in this objectives document.
CompTIA Security+ Certification Exam Objectives 2 of 16
Copyright 2010 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
1.0 Network Security
1.1 Explain the security function and purpose of network devices and
technologies
 Firewalls
 Routers
 Switches
 Load Balancers
 Proxies
 Web security gateways
 VPN concentrators
 NIDS and NIPS (Behavior based, signature based, anomaly based,
heuristic)
 Protocol analyzers
 Sniffers
 Spam filter, all-in-one security appliances
 Web application firewall vs. network firewall
 URL filtering, content inspection, malware inspection
1.2 Apply and implement secure network administration principles
 Rule-based management
 Firewall rules
 VLAN management
 Secure router configuration
 Access control lists
 Port Security
 802.1x
 Flood guards
 Loop protection
 Implicit deny
 Prevent network bridging by network separation
 Log analysis
1.3 Distinguish and differentiate network design elements and components
 DMZ
 Subnetting
 VLAN
 NAT
 Remote Access
 Telephony
 NAC
 Virtualization
 Cloud Computing
o Platform as a Service
o Software as a Service
o Infrastructure as a Service
1.4 Implement and use common protocols
 IPSec
 SNMP
CompTIA Security+ Certification Exam Objectives 3 of 16
Copyright 2010 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
 SSH
 DNS
 TLS
 SSL
 TCP/IP
 FTPS
 HTTPS
 SFTP
 SCP
 ICMP
 IPv4 vs. IPv6
1.5 Identify commonly used default network ports
 FTP
 SFTP
 FTPS
 TFTP
 TELNET
 HTTP
 HTTPS
 SCP
 SSH
 NetBIOS
1.6 Implement wireless network in a secure manner
 WPA
 WPA2
 WEP
 EAP
 PEAP
 LEAP
 MAC filter
 Disable SSID broadcast
 TKIP
 CCMP
 Antenna Placement
 Power level controls
2.0 Compliance and Operational Security
2.1 Explain risk related concepts
 Control types
o Technical
o Management
o Operational
 False positives
 Importance of policies in reducing risk
o Privacy policy
o Acceptable use
o Security policy
o Mandatory vacations
CompTIA Security+ Certification Exam Objectives 4 of 16
Copyright 2010 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
o Job rotation
o Separation of duties
o Least privilege
 Risk calculation
o Likelihood
o ALE
o Impact
 Quantitative vs. qualitative
 Risk-avoidance, transference, acceptance, mitigation, deterrence
 Risks associated to Cloud Computing and Virtualization
2.2 Carry out appropriate risk mitigation strategies
 Implement security controls based on risk
 Change management
 Incident management
 User rights and permissions reviews
 Perform routine audits
 Implement policies and procedures to prevent data loss or theft
2.3 Execute appropriate incident response procedures
 Basic forensic procedures
o Order of volatility
o Capture system image
o Network traffic and logs
o Capture video
o Record time offset
o Take hashes
o Screenshots
o Witnesses
o Track man hours and expense
 Damage and loss control
 Chain of custody
 Incident response: first responder
2.4 Explain the importance of security related awareness and training
 Security policy training and procedures
 Personally identifiable information
 Information classification: Sensitivity of data (hard or soft)
 Data labeling, handling and disposal
 Compliance with laws, best practices and standards
 User habits
o Password behaviors
o Data handling
o Clean desk policies
o Prevent tailgating
o Personally owned devices
 Threat awareness
o New viruses
o Phishing attacks
o Zero days exploits
 Use of social networking and P2P
2.5 Compare and contrast aspects of business continuity
 Business impact analysis
CompTIA Security+ Certification Exam Objectives 5 of 16
Copyright 2010 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
 Removing single points of failure
 Business continuity planning and testing
 Continuity of operations
 Disaster recovery
 IT contingency planning
 Succession planning
2.6 Explain the impact and proper use of environmental controls
 HVAC
 Fire suppression
 EMI shielding
 Hot and cold aisles
 Environmental monitoring
 Temperature and humidity controls
 Video monitoring
2.7 Execute disaster recovery plans and procedures
 Backup / backout contingency plans or policies
 Backups, execution and frequency
 Redundancy and fault tolerance
o Hardware
o RAID
o Clustering
o Load balancing
o Servers
 High availability
 Cold site, hot site, warm site
 Mean time to restore, mean time between failures, recovery time objectives
and recovery point objectives
2.8 Exemplify the concepts of confidentiality, integrity and availability (CIA)
3.0 Threats and Vulnerabilities
3.1 Analyze and differentiate among types of malware
 Adware
 Virus
 Worms
 Spyware
 Trojan
 Rootkits
 Backdoors
 Logic bomb
 Botnets
3.2 Analyze and differentiate among types of attacks
 Man-in-the-middle
 DDoS
 DoS
 Replay
 Smurf attack
CompTIA Security+ Certification Exam Objectives 6 of 16
Copyright 2010 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
 Spoofing
 Spam
 Phishing
 Spim
 Vishing
 Spear phishing
 Xmas attack
 Pharming
 Privilege escalation
 Malicious insider threat
 DNS poisoning and ARP poisoning
 Transitive access
 Client-side attacks
3.3 Analyze and differentiate among types of social engineering attacks
 Shoulder surfing
 Dumpster diving
 Tailgating
 Impersonation
 Hoaxes
 Whaling
 Vishing
3.4 Analyze and differentiate among types of wireless attacks
 Rogue access points
 Interference
 Evil twin
 War driving
 Bluejacking
 Bluesnarfing
 War chalking
 IV attack
 Packet sniffing
3.5 Analyze and differentiate among types of application attacks
 Cross-site scripting
 SQL injection
 LDAP injection
 XML injection
 Directory traversal/command injection
 Buffer overflow
 Zero-day
 Cookies and attachments
 Malicious add-ons
 Session hijacking
 Header manipulation
3.6 Analyze and differentiate among types of mitigation and deterrent techniques
 Manual bypassing of electronic controls
o Failsafe/secure vs. failopen
 Monitoring system logs
o Event logs
o Audit logs
CompTIA Security+ Certification Exam Objectives 7 of 16
Copyright 2010 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
o Security logs
o Access logs
 Physical security
o Hardware locks
o Mantraps
o Video surveillance
o Fencing
o Proximity readers
o Access list
 Hardening
o Disabling unnecessary services
o Protecting management interfaces and applications
o Password protection
o Disabling unnecessary accounts
 Port security
o MAC limiting and filtering
o 802.1x
o Disabling unused ports
 Security posture
o Initial baseline configuration
o Continuous security monitoring
o remediation
 Reporting
o Alarms
o Alerts
o Trends
 Detection controls vs. prevention controls
o IDS vs. IPS
o Camera vs. guard
3.7 Implement assessment tools and techniques to discover security threats and
vulnerabilities
 Vulnerability scanning and interpret results
 Tools
o Protocol analyzer
o Sniffer
o Vulnerability scanner
o Honeypots
o Honeynets
o Port scanner
 Risk calculations
o Threat vs. likelihood
 Assessment types
o Risk
o Threat
o Vulnerability
 Assessment technique
o Baseline reporting
o Code review
o Determine attack surface
o Architecture
o Design reviews
3.8 Within the realm of vulnerability assessments, explain the proper use of
penetration testing versus vulnerability scanning
CompTIA Security+ Certification Exam Objectives 8 of 16
Copyright 2010 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
 Penetration testing
o Verify a threat exists
o Bypass security controls
o Actively test security controls
o Exploiting vulnerabilities
 Vulnerability scanning
o Passively testing security controls
o Identify vulnerability
o Identify lack of security controls
o Identify common misconfiguration
 Black box
 White box
 Gray box
4.0 Application, Data and Host Security
4.1 Explain the importance of application security
 Fuzzing
 Secure coding concepts
o Error and exception handling
o Input validation
 Cross-site scripting prevention
 Cross-site Request Forgery (XSRF) prevention
 Application configuration baseline (proper settings)
 Application hardening
 Application patch management
4.2 Carry out appropriate procedures to establish host security
 Operating system security and settings
 Anti-malware
o Anti-virus
o Anti-spam
o Anti-spyware
o Pop-up blockers
o Host-based firewalls
 Patch management
 Hardware security
o Cable locks
o Safe
o Locking cabinets
 Host software baselining
 Mobile devices
o Screen lock
o Strong password
o Device encryption
o Remote wipe/sanitization
o Voice encryption
o GPS tracking
 Virtualization
4.3 Explain the importance of data security
CompTIA Security+ Certification Exam Objectives 9 of 16
Copyright 2010 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
 Data Loss Prevention (DLP)
 Data encryption
o Full disk
o Database
o Individual files
o Removable media
o Mobile devices
 Hardware based encryption devices
o TPM
o HSM
o USB encryption
o Hard drive
 Cloud computing
5.0 Access Control and Identity Management
5.1 Explain the function and purpose of authentication services
 RADIUS
 TACACS
 TACACS+
 Kerberos
 LDAP
 XTACACS
5.2 Explain the fundamental concepts and best practices related to authentication,
authorization and access control
 Identification vs. authentication
 Authentication (single factor) and authorization
 Multifactor authentication
 Biometrics
 Tokens
 Common access card
 Personal identification verification card
 Smart card
 Least privilege
 Separation of duties
 Single sign on
 ACLs
 Access control
 Mandatory access control
 Discretionary access control
 Role/rule-based access control
 Implicit deny
 Time of day restrictions
 Trusted OS
 Mandatory vacations
 Job rotation
5.3 Implement appropriate security controls when performing account
management
 Mitigates issues associated with users with multiple account/roles
 Account policy enforcement
CompTIA Security+ Certification Exam Objectives 10 of 16
Copyright 2010 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
o Password complexity
o Expiration
o Recovery
o Length
o Disablement
o Lockout
 Group based privileges
 User assigned privileges
6.0 Cryptography
6.1 Summarize general cryptography concepts
 Symmetric vs. asymmetric
 Fundamental differences and encryption methods
o Block vs. stream
 Transport encryption
 Non-repudiation
 Hashing
 Key escrow
 Steganography
 Digital signatures
 Use of proven technologies
 Elliptic curve and quantum cryptography
6.2 Use and apply appropriate cryptographic tools and products
 WEP vs. WPA/WPA2 and preshared key
 MD5
 SHA
 RIPEMD
 AES
 DES
 3DES
 HMAC
 RSA
 RC4
 One-time-pads
 CHAP
 PAP
 NTLM
 NTLMv2
 Blowfish
 PGP/GPG
 Whole disk encryption
 TwoFish
 Comparative strengths of algorithms
 Use of algorithms with transport encryption
o SSL
o TLS
o IPSec
o SSH
o HTTPS
CompTIA Security+ Certification Exam Objectives 11 of 16
Copyright 2010 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
6.3 Explain the core concepts of public key infrastructure
 Certificate authorities and digital certificates
o CA
o CRLs
 PKI
 Recovery agent
 Public key
 Private key
 Registration
 Key escrow
 Trust models
6.4 Implement PKI, certificate management and associated components
 Certificate authorities and digital certificates
o CA
o CRLs
 PKI
 Recovery agent
 Public key
 Private keys
 Registration
 Key escrow
 Trust models
CompTIA Security+ Certification Exam Objectives 12 of 16
Copyright 2010 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
SECURITY+ ACRONYMS
3DES – Triple Digital Encryption Standard
AAA – Authentication, Authorization, and Accounting
ACL – Access Control List
AES - Advanced Encryption Standard
AES256 – Advanced Encryption Standards 256bit
AH - Authentication Header
ALE - Annualized Loss Expectancy
AP - Access Point
API - Application Programming Interface
ASP - Application Service Provider
ARO - Annualized Rate of Occurrence
ARP - Address Resolution Protocol
AUP - Acceptable Use Policy
BCP – Business Continuity Planning
BIOS – Basic Input / Output System
BOTS – Network Robots
CA – Certificate Authority
CAC - Common Access Card
CAN - Controller Area Network
CCMP – Counter-Mode/CBC-Mac Protocol
CCTV - Closed-circuit television
CERT – Computer Emergency Response Team
CHAP – Challenge Handshake Authentication Protocol
CIRT – Computer Incident Response Team
CMM – Capability Maturity Model
COOP – Continuity of Operation Planning
CP – Contingency Planning
CRC – Cyclical Redundancy Check
CRL – Certification Revocation List
CSU – Channel Service Unit
DAC – Discretionary Access Control
DDOS – Distributed Denial of Service
DEP – Data Execution Prevention
DES – Digital Encryption Standard
DHCP – Dynamic Host Configuration Protocol
DLL - Dynamic Link Library
DLP - Data Loss Prevention
DMZ – Demilitarized Zone
DNS – Domain Name Service (Server)
DOS – Denial of Service
CompTIA Security+ Certification Exam Objectives 13 of 16
Copyright 2010 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
DRP – Disaster Recovery Plan
DSA – Digital Signature Algorithm
DSL - Digital Subscriber line
DSU – Data Service Unit
EAP - Extensible Authentication Protocol
ECC - Elliptic Curve Cryptography
EFS – Encrypted File System
EMI – Electromagnetic Interference
ESP – Encapsulated Security Payload
FTP – File Transfer Protocol
GPO – Group Policy Object
GPU - Graphic Processing Unit
GRE - Generic Routing Encapsulation
HDD – Hard Disk Drive
HIDS – Host Based Intrusion Detection System
HIPS – Host Based Intrusion Prevention System
HMAC – Hashed Message Authentication Code
HSM – Hardware Security Module
HTML – HyperText Markup Language
HTTP – Hypertext Transfer Protocol
HTTPS – Hypertext Transfer Protocol over SSL
HVAC – Heating, Ventilation Air Conditioning
IaaS - Infrastructure as a Service
ICMP - Internet Control Message Protocol
ID – Identification
IKE – Internet Key Exchange
IM - Instant messaging
IMAP4 - Internet Message Access Protocol v4
IP - Internet Protocol
IPSEC – Internet Protocol Security
IRC - Internet Relay Chat
ISP – Internet Service Provider
ITCP – IT Contingency Plan
IV - Initialization Vector
KDC - Key Distribution Center
L2TP – Layer 2 Tunneling Protocol
LAN – Local Area Network
LANMAN – Local Area Network Manager
LDAP – Lightweight Directory Access Protocol
LEAP – Lightweight Extensible Authentication Protocol
MAC – Mandatory Access Control / Media Access Control
MAC - Message Authentication Code
CompTIA Security+ Certification Exam Objectives 14 of 16
Copyright 2010 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
MAN - Metropolitan Area Network
MBR – Master Boot Record
MD5 – Message Digest 5
MPLS – Multi-Protocol Layer Switch
MSCHAP – Microsoft Challenge Handshake Authentication
Protocol
MTBF – Mean Time Between Failures
MTTR – Mean Time to Recover
MTU - Maximum Transmission Unit
NAC – Network Access Control
NAT – Network Address Translation
NDA – Non-Disclosure Agreement
NIDS – Network Based Intrusion Detection System
NIPS – Network Based Intrusion Prevention System
NIST – National Institute of Standards & Technology
NOS – Network Operating System
NTFS - New Technology File System
NTLM – New Technology LANMAN
NTP - Network Time Protocol
OCSP – Online Certification Security Protocol
OLA – Open License Agreement
OS – Operating System
OVAL – Open Vulnerability Assessment Language
PAM – Pluggable Authentication Modules
PAP – Password Authentication Protocol
PAT - Port Address Translation
PBX – Private Branch Exchange
PCAP – Packet Capture
PEAP – Protected Extensible Authentication Protocol
PED - Personal Electronic Device
PGP – Pretty Good Privacy
PII – Personally Identifiable Information
PIV – Personal Identity Verification
PKI – Public Key Infrastructure
POTS – Plain Old Telephone Service
PPP - Point-to-point Protocol
PPTP – Point to Point Tunneling Protocol
PSK – Pre-Shared Key
PTZ – Pan-Tilt-Zoom
RA – Recovery Agent
RAD - Rapid application development
RADIUS – Remote Authentication Dial-in User Server
RAID – Redundant Array of Inexpensive Disks
CompTIA Security+ Certification Exam Objectives 15 of 16
Copyright 2010 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
RAS – Remote Access Server
RBAC – Role Based Access Control
RBAC – Rule Based Access Control
RIPEMD – RACE Integrity Primitives Evaluation Message Digest
ROI – Return of Investment
RPO – Recovery Point Objective
RSA – Rivest, Shamir, & Adleman
RTO – Recovery Time Objective
RTP – Real-Time Transport Protocol
S/MIME – Secure / Multipurpose internet Mail Extensions
SAML – Security Assertions Markup Language
SaaS - Software as a Service
SCAP - Security Content Automation Protocol
SCSI - Small Computer System Interface
SDLC - Software Development Life Cycle
SDLM - Software Development Life Cycle Methodology
SEH – Structured Exception Handler
SHA – Secure Hashing Algorithm
SHTTP – Secure Hypertext Transfer Protocol
SIM – Subscriber Identity Module
SLA – Service Level Agreement
SLE - Single Loss Expectancy
SMS - Short Message Service
SMTP – Simple Mail Transfer Protocol
SNMP - Simple Network Management Protocol
SOAP – Simple Object Access Point
SONET – Synchronous Optical Network Technologies
SPIM - Spam over Internet Messaging
SSD – Solid State Drive
SSH – Secure Shell
SSL – Secure Sockets Layer
SSO – Single Sign On
STP – Shielded Twisted Pair
TACACS – Terminal Access Controller Access Control System
TCP/IP – Transmission Control Protocol / Internet Protocol
TKIP - Temporal Key Integrity Protocol
TLS – Transport Layer Security
TPM – Trusted Platform Module
TSIG – Transaction Signature
UAT - User Acceptance Testing
UEFI – Unified Extensible Firmware Interface
UPS - Uninterruptable Power Supply
CompTIA Security+ Certification Exam Objectives 16 of 16
Copyright 2010 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ Certification Exam Objectives are subject to change without notice.
URL - Universal Resource Locator
USB – Universal Serial Bus
UTP – Unshielded Twisted Pair
VDI – Virtualization Desktop Infrastructure
VLAN – Virtual Local Area Network
VoIP - Voice over IP
VPN – Virtual Private Network
VTC – Video Teleconferencing
WAF- Web-Application Firewall
WAP – Wireless Access Point
WEP – Wired Equivalent Privacy
WIDS – Wireless Intrusion Detection System
WIPS – Wireless Intrusion Prevention System
WPA – Wireless Protected Access
WTLS – Wireless TLS
XML – Extensible Markup Language
XSRF - Cross-Site Request Forgery
XSRF- Cross-Site Request Forgery
XSS - Cross-Site Scripting
Version 2.0

Más contenido relacionado

La actualidad más candente

Chapter 1 Introduction to Security
Chapter 1 Introduction to SecurityChapter 1 Introduction to Security
Chapter 1 Introduction to SecurityDr. Ahmed Al Zaidy
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 
Cybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsCybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsPaul Feldman
 
PPT-Security-for-Management.pptx
PPT-Security-for-Management.pptxPPT-Security-for-Management.pptx
PPT-Security-for-Management.pptxRSAArcher
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005ControlCase
 
Auditing SOX ITGC Compliance
Auditing SOX ITGC ComplianceAuditing SOX ITGC Compliance
Auditing SOX ITGC Complianceseanpizzy
 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsMarius FAILLOT DEVARRE
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Dam Frank
 
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to KnowISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to KnowPECB
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standardsprimeteacher32
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Edureka!
 
information security management
information security managementinformation security management
information security managementGurpreetkaur838
 
Marco NIST vs ISO 2700-22.pptx
Marco NIST vs ISO 2700-22.pptxMarco NIST vs ISO 2700-22.pptx
Marco NIST vs ISO 2700-22.pptxAriadneJaen1
 
Chapter 2 Presentation
Chapter 2 PresentationChapter 2 Presentation
Chapter 2 PresentationAmy McMullin
 

La actualidad más candente (20)

Chapter 1 Introduction to Security
Chapter 1 Introduction to SecurityChapter 1 Introduction to Security
Chapter 1 Introduction to Security
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Itil,cobit and ıso27001
Itil,cobit and ıso27001Itil,cobit and ıso27001
Itil,cobit and ıso27001
 
Cybersecurity Roadmap for Beginners
Cybersecurity Roadmap for BeginnersCybersecurity Roadmap for Beginners
Cybersecurity Roadmap for Beginners
 
Cybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsCybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of Directors
 
CISA Training - Chapter 2 - 2016
CISA Training - Chapter 2 - 2016CISA Training - Chapter 2 - 2016
CISA Training - Chapter 2 - 2016
 
PPT-Security-for-Management.pptx
PPT-Security-for-Management.pptxPPT-Security-for-Management.pptx
PPT-Security-for-Management.pptx
 
Domain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005
 
Auditing SOX ITGC Compliance
Auditing SOX ITGC ComplianceAuditing SOX ITGC Compliance
Auditing SOX ITGC Compliance
 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & Metrics
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to KnowISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
 
CISA Training - Chapter 4 - 2016
CISA Training - Chapter 4 - 2016CISA Training - Chapter 4 - 2016
CISA Training - Chapter 4 - 2016
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
information security management
information security managementinformation security management
information security management
 
Marco NIST vs ISO 2700-22.pptx
Marco NIST vs ISO 2700-22.pptxMarco NIST vs ISO 2700-22.pptx
Marco NIST vs ISO 2700-22.pptx
 
Chapter 2 Presentation
Chapter 2 PresentationChapter 2 Presentation
Chapter 2 Presentation
 
Security policy
Security policySecurity policy
Security policy
 

Destacado

Кому доверить информационную безопасность в бизнесе
Кому доверить информационную безопасность в бизнесеКому доверить информационную безопасность в бизнесе
Кому доверить информационную безопасность в бизнесеMUK
 
Comptia security-sy0-401
Comptia security-sy0-401Comptia security-sy0-401
Comptia security-sy0-401pgupta101
 
Comptia Security+ Exam Notes
Comptia Security+ Exam NotesComptia Security+ Exam Notes
Comptia Security+ Exam NotesVijayanand Yadla
 
Chapter 5 Presentation
Chapter 5 PresentationChapter 5 Presentation
Chapter 5 PresentationAmy McMullin
 
Chapter 15 Presentation
Chapter 15 PresentationChapter 15 Presentation
Chapter 15 PresentationAmy McMullin
 
Chapter 8 Presentaion
Chapter 8 PresentaionChapter 8 Presentaion
Chapter 8 PresentaionAmy McMullin
 
Chapter 6 Presentation
Chapter 6 PresentationChapter 6 Presentation
Chapter 6 PresentationAmy McMullin
 
Chapter 9 PowerPoint
Chapter 9 PowerPointChapter 9 PowerPoint
Chapter 9 PowerPointAmy McMullin
 
Chapter 11 Presentation
Chapter 11 PresentationChapter 11 Presentation
Chapter 11 PresentationAmy McMullin
 
Chapter 12 Presentation
Chapter 12 PresentationChapter 12 Presentation
Chapter 12 PresentationAmy McMullin
 
Chapter 1 Presentation
Chapter 1 PresentationChapter 1 Presentation
Chapter 1 PresentationAmy McMullin
 
Chapter 3 Presentation
Chapter 3 PresentationChapter 3 Presentation
Chapter 3 PresentationAmy McMullin
 
A+ Chapter 3 Review
A+ Chapter 3 ReviewA+ Chapter 3 Review
A+ Chapter 3 ReviewAmy McMullin
 
CompTIA Security+ ce certificate
CompTIA Security+ ce certificateCompTIA Security+ ce certificate
CompTIA Security+ ce certificateLuigi Cristiani
 

Destacado (17)

LightSparc training 2
LightSparc training 2LightSparc training 2
LightSparc training 2
 
Кому доверить информационную безопасность в бизнесе
Кому доверить информационную безопасность в бизнесеКому доверить информационную безопасность в бизнесе
Кому доверить информационную безопасность в бизнесе
 
Comptia security-sy0-401
Comptia security-sy0-401Comptia security-sy0-401
Comptia security-sy0-401
 
Comptia Security+ Exam Notes
Comptia Security+ Exam NotesComptia Security+ Exam Notes
Comptia Security+ Exam Notes
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Chapter 5 Presentation
Chapter 5 PresentationChapter 5 Presentation
Chapter 5 Presentation
 
Chapter 15 Presentation
Chapter 15 PresentationChapter 15 Presentation
Chapter 15 Presentation
 
Chapter 8 Presentaion
Chapter 8 PresentaionChapter 8 Presentaion
Chapter 8 Presentaion
 
Chapter 6 Presentation
Chapter 6 PresentationChapter 6 Presentation
Chapter 6 Presentation
 
Chapter 9 PowerPoint
Chapter 9 PowerPointChapter 9 PowerPoint
Chapter 9 PowerPoint
 
Chapter 11 Presentation
Chapter 11 PresentationChapter 11 Presentation
Chapter 11 Presentation
 
Chapter 12 Presentation
Chapter 12 PresentationChapter 12 Presentation
Chapter 12 Presentation
 
Chapter 1 Presentation
Chapter 1 PresentationChapter 1 Presentation
Chapter 1 Presentation
 
Chapter 3 Presentation
Chapter 3 PresentationChapter 3 Presentation
Chapter 3 Presentation
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
A+ Chapter 3 Review
A+ Chapter 3 ReviewA+ Chapter 3 Review
A+ Chapter 3 Review
 
CompTIA Security+ ce certificate
CompTIA Security+ ce certificateCompTIA Security+ ce certificate
CompTIA Security+ ce certificate
 

Similar a CompTIA Security+ Exam Objectives Overview

CompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examCompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examInfosec
 
CompTIA CASP Objectives
CompTIA CASP ObjectivesCompTIA CASP Objectives
CompTIA CASP Objectivessombat nirund
 
Didiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Kusumadihardja
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic ChallengesJorge Sebastiao
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessMicrosoft Tech Community
 
Boosting IoT Protection: An Enterprise Risk Imperative
Boosting IoT Protection: An Enterprise Risk ImperativeBoosting IoT Protection: An Enterprise Risk Imperative
Boosting IoT Protection: An Enterprise Risk ImperativeNational Retail Federation
 
AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011dma1965
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM
 
Master Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines SchoolMaster Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines SchoolHernan Huwyler, MBA CPA
 
Comptia networkplus-recert-rc0-n06-objectives
Comptia networkplus-recert-rc0-n06-objectivesComptia networkplus-recert-rc0-n06-objectives
Comptia networkplus-recert-rc0-n06-objectivesMajid Ali
 
S nandakumar
S nandakumarS nandakumar
S nandakumarIPPAI
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_bangloreIPPAI
 
3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment QuestionnairePriyanka Aash
 
CompTIA Security+ Certification | Sec+
CompTIA Security+ Certification | Sec+ CompTIA Security+ Certification | Sec+
CompTIA Security+ Certification | Sec+ SagarNegi10
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formattedMatthew Moldvan
 
Presentation cisco iron port email & web security
Presentation   cisco iron port email & web securityPresentation   cisco iron port email & web security
Presentation cisco iron port email & web securityxKinAnx
 
CompTIA CAS-002 VCE Outline
CompTIA CAS-002 VCE OutlineCompTIA CAS-002 VCE Outline
CompTIA CAS-002 VCE OutlineExamcollection
 

Similar a CompTIA Security+ Exam Objectives Overview (20)

CompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examCompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the exam
 
CompTIA CASP Objectives
CompTIA CASP ObjectivesCompTIA CASP Objectives
CompTIA CASP Objectives
 
Didiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - English
 
It fundamentals
It fundamentalsIt fundamentals
It fundamentals
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic Challenges
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
Boosting IoT Protection: An Enterprise Risk Imperative
Boosting IoT Protection: An Enterprise Risk ImperativeBoosting IoT Protection: An Enterprise Risk Imperative
Boosting IoT Protection: An Enterprise Risk Imperative
 
AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
Master Class Cyber Compliance
Master Class Cyber Compliance Master Class Cyber Compliance
Master Class Cyber Compliance
 
Master Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines SchoolMaster Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines School
 
Comptia networkplus-recert-rc0-n06-objectives
Comptia networkplus-recert-rc0-n06-objectivesComptia networkplus-recert-rc0-n06-objectives
Comptia networkplus-recert-rc0-n06-objectives
 
S nandakumar
S nandakumarS nandakumar
S nandakumar
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_banglore
 
3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire
 
CompTIA Security+ Certification | Sec+
CompTIA Security+ Certification | Sec+ CompTIA Security+ Certification | Sec+
CompTIA Security+ Certification | Sec+
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formatted
 
Presentation cisco iron port email & web security
Presentation   cisco iron port email & web securityPresentation   cisco iron port email & web security
Presentation cisco iron port email & web security
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
CompTIA CAS-002 VCE Outline
CompTIA CAS-002 VCE OutlineCompTIA CAS-002 VCE Outline
CompTIA CAS-002 VCE Outline
 

Más de sombat nirund

การทาปุ๋ยหมักชีวภาพจากขี้เลื่อย
การทาปุ๋ยหมักชีวภาพจากขี้เลื่อยการทาปุ๋ยหมักชีวภาพจากขี้เลื่อย
การทาปุ๋ยหมักชีวภาพจากขี้เลื่อยsombat nirund
 
ผลของการใช้วัสดุเพาะและวัสดุอาหารเสริมชนิดต่าง ๆ ร่วมกับกลุ่มจุลินทรีย์และนํ้...
ผลของการใช้วัสดุเพาะและวัสดุอาหารเสริมชนิดต่าง ๆ ร่วมกับกลุ่มจุลินทรีย์และนํ้...ผลของการใช้วัสดุเพาะและวัสดุอาหารเสริมชนิดต่าง ๆ ร่วมกับกลุ่มจุลินทรีย์และนํ้...
ผลของการใช้วัสดุเพาะและวัสดุอาหารเสริมชนิดต่าง ๆ ร่วมกับกลุ่มจุลินทรีย์และนํ้...sombat nirund
 
ประสิทธิภาพของน้าหมักชีวภาพในการเพาะเห็ด
ประสิทธิภาพของน้าหมักชีวภาพในการเพาะเห็ดประสิทธิภาพของน้าหมักชีวภาพในการเพาะเห็ด
ประสิทธิภาพของน้าหมักชีวภาพในการเพาะเห็ดsombat nirund
 
การศึกษาประสิทธิภาพของน้ำหมักชีวภาพจากเศษดอกเห็ดที่มีผลต่อผลผลิตของเห็ดนางฟ้า
การศึกษาประสิทธิภาพของน้ำหมักชีวภาพจากเศษดอกเห็ดที่มีผลต่อผลผลิตของเห็ดนางฟ้าการศึกษาประสิทธิภาพของน้ำหมักชีวภาพจากเศษดอกเห็ดที่มีผลต่อผลผลิตของเห็ดนางฟ้า
การศึกษาประสิทธิภาพของน้ำหมักชีวภาพจากเศษดอกเห็ดที่มีผลต่อผลผลิตของเห็ดนางฟ้าsombat nirund
 
8.ถ่ายเชื้อข้างฟ่างลงก้อนเห็ด
8.ถ่ายเชื้อข้างฟ่างลงก้อนเห็ด8.ถ่ายเชื้อข้างฟ่างลงก้อนเห็ด
8.ถ่ายเชื้อข้างฟ่างลงก้อนเห็ดsombat nirund
 
6.การต่อเชื้อข้าวฟ่างสู่ข้าวฟ่าง
6.การต่อเชื้อข้าวฟ่างสู่ข้าวฟ่าง6.การต่อเชื้อข้าวฟ่างสู่ข้าวฟ่าง
6.การต่อเชื้อข้าวฟ่างสู่ข้าวฟ่างsombat nirund
 
3.การต่อเชื้อวุ้นสู่วุ้น
3.การต่อเชื้อวุ้นสู่วุ้น3.การต่อเชื้อวุ้นสู่วุ้น
3.การต่อเชื้อวุ้นสู่วุ้นsombat nirund
 
1.การเขี่ยเนื้อเยื่อเห็ดดอเห็ดเพื่อทำพันธุ์(ดอกสู่วุ้น)
1.การเขี่ยเนื้อเยื่อเห็ดดอเห็ดเพื่อทำพันธุ์(ดอกสู่วุ้น)1.การเขี่ยเนื้อเยื่อเห็ดดอเห็ดเพื่อทำพันธุ์(ดอกสู่วุ้น)
1.การเขี่ยเนื้อเยื่อเห็ดดอเห็ดเพื่อทำพันธุ์(ดอกสู่วุ้น)sombat nirund
 
4.การเตรียมข้าวฟ่าง
4.การเตรียมข้าวฟ่าง4.การเตรียมข้าวฟ่าง
4.การเตรียมข้าวฟ่างsombat nirund
 
2.การเตรียมอาหารวุ้น
2.การเตรียมอาหารวุ้น2.การเตรียมอาหารวุ้น
2.การเตรียมอาหารวุ้นsombat nirund
 
12.การดูแลก้อนเห็ด
12.การดูแลก้อนเห็ด12.การดูแลก้อนเห็ด
12.การดูแลก้อนเห็ดsombat nirund
 
9.การเปิดดอก
9.การเปิดดอก9.การเปิดดอก
9.การเปิดดอกsombat nirund
 
7.การทำก้อน ตอนที่3
7.การทำก้อน ตอนที่37.การทำก้อน ตอนที่3
7.การทำก้อน ตอนที่3sombat nirund
 
7.การทำก้อน ตอนที่2
7.การทำก้อน ตอนที่27.การทำก้อน ตอนที่2
7.การทำก้อน ตอนที่2sombat nirund
 
7.การทำก้อน ตอนที่1
7.การทำก้อน ตอนที่17.การทำก้อน ตอนที่1
7.การทำก้อน ตอนที่1sombat nirund
 
11.การนึ่งแบบไม่ใช้หม้อแรงดัน
11.การนึ่งแบบไม่ใช้หม้อแรงดัน11.การนึ่งแบบไม่ใช้หม้อแรงดัน
11.การนึ่งแบบไม่ใช้หม้อแรงดันsombat nirund
 
Business case CompTIA by DragonsMove
Business case CompTIA by DragonsMoveBusiness case CompTIA by DragonsMove
Business case CompTIA by DragonsMovesombat nirund
 
CompTIA IT Skills Presentation
CompTIA IT Skills PresentationCompTIA IT Skills Presentation
CompTIA IT Skills Presentationsombat nirund
 
CompTIA Green IT Objectives
CompTIA Green IT ObjectivesCompTIA Green IT Objectives
CompTIA Green IT Objectivessombat nirund
 
CompTIA CTT+ Overview
CompTIA CTT+ OverviewCompTIA CTT+ Overview
CompTIA CTT+ Overviewsombat nirund
 

Más de sombat nirund (20)

การทาปุ๋ยหมักชีวภาพจากขี้เลื่อย
การทาปุ๋ยหมักชีวภาพจากขี้เลื่อยการทาปุ๋ยหมักชีวภาพจากขี้เลื่อย
การทาปุ๋ยหมักชีวภาพจากขี้เลื่อย
 
ผลของการใช้วัสดุเพาะและวัสดุอาหารเสริมชนิดต่าง ๆ ร่วมกับกลุ่มจุลินทรีย์และนํ้...
ผลของการใช้วัสดุเพาะและวัสดุอาหารเสริมชนิดต่าง ๆ ร่วมกับกลุ่มจุลินทรีย์และนํ้...ผลของการใช้วัสดุเพาะและวัสดุอาหารเสริมชนิดต่าง ๆ ร่วมกับกลุ่มจุลินทรีย์และนํ้...
ผลของการใช้วัสดุเพาะและวัสดุอาหารเสริมชนิดต่าง ๆ ร่วมกับกลุ่มจุลินทรีย์และนํ้...
 
ประสิทธิภาพของน้าหมักชีวภาพในการเพาะเห็ด
ประสิทธิภาพของน้าหมักชีวภาพในการเพาะเห็ดประสิทธิภาพของน้าหมักชีวภาพในการเพาะเห็ด
ประสิทธิภาพของน้าหมักชีวภาพในการเพาะเห็ด
 
การศึกษาประสิทธิภาพของน้ำหมักชีวภาพจากเศษดอกเห็ดที่มีผลต่อผลผลิตของเห็ดนางฟ้า
การศึกษาประสิทธิภาพของน้ำหมักชีวภาพจากเศษดอกเห็ดที่มีผลต่อผลผลิตของเห็ดนางฟ้าการศึกษาประสิทธิภาพของน้ำหมักชีวภาพจากเศษดอกเห็ดที่มีผลต่อผลผลิตของเห็ดนางฟ้า
การศึกษาประสิทธิภาพของน้ำหมักชีวภาพจากเศษดอกเห็ดที่มีผลต่อผลผลิตของเห็ดนางฟ้า
 
8.ถ่ายเชื้อข้างฟ่างลงก้อนเห็ด
8.ถ่ายเชื้อข้างฟ่างลงก้อนเห็ด8.ถ่ายเชื้อข้างฟ่างลงก้อนเห็ด
8.ถ่ายเชื้อข้างฟ่างลงก้อนเห็ด
 
6.การต่อเชื้อข้าวฟ่างสู่ข้าวฟ่าง
6.การต่อเชื้อข้าวฟ่างสู่ข้าวฟ่าง6.การต่อเชื้อข้าวฟ่างสู่ข้าวฟ่าง
6.การต่อเชื้อข้าวฟ่างสู่ข้าวฟ่าง
 
3.การต่อเชื้อวุ้นสู่วุ้น
3.การต่อเชื้อวุ้นสู่วุ้น3.การต่อเชื้อวุ้นสู่วุ้น
3.การต่อเชื้อวุ้นสู่วุ้น
 
1.การเขี่ยเนื้อเยื่อเห็ดดอเห็ดเพื่อทำพันธุ์(ดอกสู่วุ้น)
1.การเขี่ยเนื้อเยื่อเห็ดดอเห็ดเพื่อทำพันธุ์(ดอกสู่วุ้น)1.การเขี่ยเนื้อเยื่อเห็ดดอเห็ดเพื่อทำพันธุ์(ดอกสู่วุ้น)
1.การเขี่ยเนื้อเยื่อเห็ดดอเห็ดเพื่อทำพันธุ์(ดอกสู่วุ้น)
 
4.การเตรียมข้าวฟ่าง
4.การเตรียมข้าวฟ่าง4.การเตรียมข้าวฟ่าง
4.การเตรียมข้าวฟ่าง
 
2.การเตรียมอาหารวุ้น
2.การเตรียมอาหารวุ้น2.การเตรียมอาหารวุ้น
2.การเตรียมอาหารวุ้น
 
12.การดูแลก้อนเห็ด
12.การดูแลก้อนเห็ด12.การดูแลก้อนเห็ด
12.การดูแลก้อนเห็ด
 
9.การเปิดดอก
9.การเปิดดอก9.การเปิดดอก
9.การเปิดดอก
 
7.การทำก้อน ตอนที่3
7.การทำก้อน ตอนที่37.การทำก้อน ตอนที่3
7.การทำก้อน ตอนที่3
 
7.การทำก้อน ตอนที่2
7.การทำก้อน ตอนที่27.การทำก้อน ตอนที่2
7.การทำก้อน ตอนที่2
 
7.การทำก้อน ตอนที่1
7.การทำก้อน ตอนที่17.การทำก้อน ตอนที่1
7.การทำก้อน ตอนที่1
 
11.การนึ่งแบบไม่ใช้หม้อแรงดัน
11.การนึ่งแบบไม่ใช้หม้อแรงดัน11.การนึ่งแบบไม่ใช้หม้อแรงดัน
11.การนึ่งแบบไม่ใช้หม้อแรงดัน
 
Business case CompTIA by DragonsMove
Business case CompTIA by DragonsMoveBusiness case CompTIA by DragonsMove
Business case CompTIA by DragonsMove
 
CompTIA IT Skills Presentation
CompTIA IT Skills PresentationCompTIA IT Skills Presentation
CompTIA IT Skills Presentation
 
CompTIA Green IT Objectives
CompTIA Green IT ObjectivesCompTIA Green IT Objectives
CompTIA Green IT Objectives
 
CompTIA CTT+ Overview
CompTIA CTT+ OverviewCompTIA CTT+ Overview
CompTIA CTT+ Overview
 

Último

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Último (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

CompTIA Security+ Exam Objectives Overview

  • 1. CompTIA Security+ Certification Exam Objectives 1 of 16 Copyright 2010 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice. Certification Exam Objectives: SY0-301 INTRODUCTION The CompTIA Security+ Certification is a vendor neutral credential. The CompTIA Security+ exam is an internationally recognized validation of foundation-level security skills and knowledge, and is used by organizations and security professionals around the globe. The CompTIA Security+ exam will certify that the successful candidate has the knowledge and skills required to identify risk and participate in risk mitigation activities, provide infrastructure, application, operational and information security, apply security controls to maintain confidentiality, integrity and availability, identify appropriate technologies and products, and operate with an awareness of applicable policies, laws and regulations. The CompTIA Security+ Certification is aimed at an IT security professional who has:  A minimum of 2 years experience in IT administration with a focus on security  Day to day technical information security experience  Broad knowledge of security concerns and implementation including the topics in the domain list below CompTIA Security+ is accredited by ANSI to show compliance with the ISO 17024 Standard and, as such, undergoes regular reviews and updates to the exam objectives. The following CompTIA Security+ objectives reflect the subject areas in this edition of this exam, and result from subject matter expert workshops and industry-wide survey results regarding the skills and knowledge required of an information security professional with two years of experience. This examination blueprint includes domain weighting, test objectives, and example content. Example topics and concepts are included to clarify the test objectives and should not be construed as a comprehensive listing of all the content of this examination. The table below lists the domain areas measured by this examination and the approximate extent to which they are represented in the examination: Domain % of Examination 1.0 Network Security 21% 2.0 Compliance and Operational Security 18% 3.0 Threats and Vulnerabilities 21% 4.0 Application, Data and Host Security 16% 5.0 Access Control and Identity Management 13% 6.0 Cryptography 11% Total 100% **Note: The lists of examples provided in bulleted format below each objective are not exhaustive lists. Other examples of technologies, processes or tasks pertaining to each objective may also be included on the exam although not listed or covered in this objectives document.
  • 2. CompTIA Security+ Certification Exam Objectives 2 of 16 Copyright 2010 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice. 1.0 Network Security 1.1 Explain the security function and purpose of network devices and technologies  Firewalls  Routers  Switches  Load Balancers  Proxies  Web security gateways  VPN concentrators  NIDS and NIPS (Behavior based, signature based, anomaly based, heuristic)  Protocol analyzers  Sniffers  Spam filter, all-in-one security appliances  Web application firewall vs. network firewall  URL filtering, content inspection, malware inspection 1.2 Apply and implement secure network administration principles  Rule-based management  Firewall rules  VLAN management  Secure router configuration  Access control lists  Port Security  802.1x  Flood guards  Loop protection  Implicit deny  Prevent network bridging by network separation  Log analysis 1.3 Distinguish and differentiate network design elements and components  DMZ  Subnetting  VLAN  NAT  Remote Access  Telephony  NAC  Virtualization  Cloud Computing o Platform as a Service o Software as a Service o Infrastructure as a Service 1.4 Implement and use common protocols  IPSec  SNMP
  • 3. CompTIA Security+ Certification Exam Objectives 3 of 16 Copyright 2010 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice.  SSH  DNS  TLS  SSL  TCP/IP  FTPS  HTTPS  SFTP  SCP  ICMP  IPv4 vs. IPv6 1.5 Identify commonly used default network ports  FTP  SFTP  FTPS  TFTP  TELNET  HTTP  HTTPS  SCP  SSH  NetBIOS 1.6 Implement wireless network in a secure manner  WPA  WPA2  WEP  EAP  PEAP  LEAP  MAC filter  Disable SSID broadcast  TKIP  CCMP  Antenna Placement  Power level controls 2.0 Compliance and Operational Security 2.1 Explain risk related concepts  Control types o Technical o Management o Operational  False positives  Importance of policies in reducing risk o Privacy policy o Acceptable use o Security policy o Mandatory vacations
  • 4. CompTIA Security+ Certification Exam Objectives 4 of 16 Copyright 2010 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice. o Job rotation o Separation of duties o Least privilege  Risk calculation o Likelihood o ALE o Impact  Quantitative vs. qualitative  Risk-avoidance, transference, acceptance, mitigation, deterrence  Risks associated to Cloud Computing and Virtualization 2.2 Carry out appropriate risk mitigation strategies  Implement security controls based on risk  Change management  Incident management  User rights and permissions reviews  Perform routine audits  Implement policies and procedures to prevent data loss or theft 2.3 Execute appropriate incident response procedures  Basic forensic procedures o Order of volatility o Capture system image o Network traffic and logs o Capture video o Record time offset o Take hashes o Screenshots o Witnesses o Track man hours and expense  Damage and loss control  Chain of custody  Incident response: first responder 2.4 Explain the importance of security related awareness and training  Security policy training and procedures  Personally identifiable information  Information classification: Sensitivity of data (hard or soft)  Data labeling, handling and disposal  Compliance with laws, best practices and standards  User habits o Password behaviors o Data handling o Clean desk policies o Prevent tailgating o Personally owned devices  Threat awareness o New viruses o Phishing attacks o Zero days exploits  Use of social networking and P2P 2.5 Compare and contrast aspects of business continuity  Business impact analysis
  • 5. CompTIA Security+ Certification Exam Objectives 5 of 16 Copyright 2010 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice.  Removing single points of failure  Business continuity planning and testing  Continuity of operations  Disaster recovery  IT contingency planning  Succession planning 2.6 Explain the impact and proper use of environmental controls  HVAC  Fire suppression  EMI shielding  Hot and cold aisles  Environmental monitoring  Temperature and humidity controls  Video monitoring 2.7 Execute disaster recovery plans and procedures  Backup / backout contingency plans or policies  Backups, execution and frequency  Redundancy and fault tolerance o Hardware o RAID o Clustering o Load balancing o Servers  High availability  Cold site, hot site, warm site  Mean time to restore, mean time between failures, recovery time objectives and recovery point objectives 2.8 Exemplify the concepts of confidentiality, integrity and availability (CIA) 3.0 Threats and Vulnerabilities 3.1 Analyze and differentiate among types of malware  Adware  Virus  Worms  Spyware  Trojan  Rootkits  Backdoors  Logic bomb  Botnets 3.2 Analyze and differentiate among types of attacks  Man-in-the-middle  DDoS  DoS  Replay  Smurf attack
  • 6. CompTIA Security+ Certification Exam Objectives 6 of 16 Copyright 2010 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice.  Spoofing  Spam  Phishing  Spim  Vishing  Spear phishing  Xmas attack  Pharming  Privilege escalation  Malicious insider threat  DNS poisoning and ARP poisoning  Transitive access  Client-side attacks 3.3 Analyze and differentiate among types of social engineering attacks  Shoulder surfing  Dumpster diving  Tailgating  Impersonation  Hoaxes  Whaling  Vishing 3.4 Analyze and differentiate among types of wireless attacks  Rogue access points  Interference  Evil twin  War driving  Bluejacking  Bluesnarfing  War chalking  IV attack  Packet sniffing 3.5 Analyze and differentiate among types of application attacks  Cross-site scripting  SQL injection  LDAP injection  XML injection  Directory traversal/command injection  Buffer overflow  Zero-day  Cookies and attachments  Malicious add-ons  Session hijacking  Header manipulation 3.6 Analyze and differentiate among types of mitigation and deterrent techniques  Manual bypassing of electronic controls o Failsafe/secure vs. failopen  Monitoring system logs o Event logs o Audit logs
  • 7. CompTIA Security+ Certification Exam Objectives 7 of 16 Copyright 2010 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice. o Security logs o Access logs  Physical security o Hardware locks o Mantraps o Video surveillance o Fencing o Proximity readers o Access list  Hardening o Disabling unnecessary services o Protecting management interfaces and applications o Password protection o Disabling unnecessary accounts  Port security o MAC limiting and filtering o 802.1x o Disabling unused ports  Security posture o Initial baseline configuration o Continuous security monitoring o remediation  Reporting o Alarms o Alerts o Trends  Detection controls vs. prevention controls o IDS vs. IPS o Camera vs. guard 3.7 Implement assessment tools and techniques to discover security threats and vulnerabilities  Vulnerability scanning and interpret results  Tools o Protocol analyzer o Sniffer o Vulnerability scanner o Honeypots o Honeynets o Port scanner  Risk calculations o Threat vs. likelihood  Assessment types o Risk o Threat o Vulnerability  Assessment technique o Baseline reporting o Code review o Determine attack surface o Architecture o Design reviews 3.8 Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning
  • 8. CompTIA Security+ Certification Exam Objectives 8 of 16 Copyright 2010 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice.  Penetration testing o Verify a threat exists o Bypass security controls o Actively test security controls o Exploiting vulnerabilities  Vulnerability scanning o Passively testing security controls o Identify vulnerability o Identify lack of security controls o Identify common misconfiguration  Black box  White box  Gray box 4.0 Application, Data and Host Security 4.1 Explain the importance of application security  Fuzzing  Secure coding concepts o Error and exception handling o Input validation  Cross-site scripting prevention  Cross-site Request Forgery (XSRF) prevention  Application configuration baseline (proper settings)  Application hardening  Application patch management 4.2 Carry out appropriate procedures to establish host security  Operating system security and settings  Anti-malware o Anti-virus o Anti-spam o Anti-spyware o Pop-up blockers o Host-based firewalls  Patch management  Hardware security o Cable locks o Safe o Locking cabinets  Host software baselining  Mobile devices o Screen lock o Strong password o Device encryption o Remote wipe/sanitization o Voice encryption o GPS tracking  Virtualization 4.3 Explain the importance of data security
  • 9. CompTIA Security+ Certification Exam Objectives 9 of 16 Copyright 2010 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice.  Data Loss Prevention (DLP)  Data encryption o Full disk o Database o Individual files o Removable media o Mobile devices  Hardware based encryption devices o TPM o HSM o USB encryption o Hard drive  Cloud computing 5.0 Access Control and Identity Management 5.1 Explain the function and purpose of authentication services  RADIUS  TACACS  TACACS+  Kerberos  LDAP  XTACACS 5.2 Explain the fundamental concepts and best practices related to authentication, authorization and access control  Identification vs. authentication  Authentication (single factor) and authorization  Multifactor authentication  Biometrics  Tokens  Common access card  Personal identification verification card  Smart card  Least privilege  Separation of duties  Single sign on  ACLs  Access control  Mandatory access control  Discretionary access control  Role/rule-based access control  Implicit deny  Time of day restrictions  Trusted OS  Mandatory vacations  Job rotation 5.3 Implement appropriate security controls when performing account management  Mitigates issues associated with users with multiple account/roles  Account policy enforcement
  • 10. CompTIA Security+ Certification Exam Objectives 10 of 16 Copyright 2010 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice. o Password complexity o Expiration o Recovery o Length o Disablement o Lockout  Group based privileges  User assigned privileges 6.0 Cryptography 6.1 Summarize general cryptography concepts  Symmetric vs. asymmetric  Fundamental differences and encryption methods o Block vs. stream  Transport encryption  Non-repudiation  Hashing  Key escrow  Steganography  Digital signatures  Use of proven technologies  Elliptic curve and quantum cryptography 6.2 Use and apply appropriate cryptographic tools and products  WEP vs. WPA/WPA2 and preshared key  MD5  SHA  RIPEMD  AES  DES  3DES  HMAC  RSA  RC4  One-time-pads  CHAP  PAP  NTLM  NTLMv2  Blowfish  PGP/GPG  Whole disk encryption  TwoFish  Comparative strengths of algorithms  Use of algorithms with transport encryption o SSL o TLS o IPSec o SSH o HTTPS
  • 11. CompTIA Security+ Certification Exam Objectives 11 of 16 Copyright 2010 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice. 6.3 Explain the core concepts of public key infrastructure  Certificate authorities and digital certificates o CA o CRLs  PKI  Recovery agent  Public key  Private key  Registration  Key escrow  Trust models 6.4 Implement PKI, certificate management and associated components  Certificate authorities and digital certificates o CA o CRLs  PKI  Recovery agent  Public key  Private keys  Registration  Key escrow  Trust models
  • 12. CompTIA Security+ Certification Exam Objectives 12 of 16 Copyright 2010 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice. SECURITY+ ACRONYMS 3DES – Triple Digital Encryption Standard AAA – Authentication, Authorization, and Accounting ACL – Access Control List AES - Advanced Encryption Standard AES256 – Advanced Encryption Standards 256bit AH - Authentication Header ALE - Annualized Loss Expectancy AP - Access Point API - Application Programming Interface ASP - Application Service Provider ARO - Annualized Rate of Occurrence ARP - Address Resolution Protocol AUP - Acceptable Use Policy BCP – Business Continuity Planning BIOS – Basic Input / Output System BOTS – Network Robots CA – Certificate Authority CAC - Common Access Card CAN - Controller Area Network CCMP – Counter-Mode/CBC-Mac Protocol CCTV - Closed-circuit television CERT – Computer Emergency Response Team CHAP – Challenge Handshake Authentication Protocol CIRT – Computer Incident Response Team CMM – Capability Maturity Model COOP – Continuity of Operation Planning CP – Contingency Planning CRC – Cyclical Redundancy Check CRL – Certification Revocation List CSU – Channel Service Unit DAC – Discretionary Access Control DDOS – Distributed Denial of Service DEP – Data Execution Prevention DES – Digital Encryption Standard DHCP – Dynamic Host Configuration Protocol DLL - Dynamic Link Library DLP - Data Loss Prevention DMZ – Demilitarized Zone DNS – Domain Name Service (Server) DOS – Denial of Service
  • 13. CompTIA Security+ Certification Exam Objectives 13 of 16 Copyright 2010 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice. DRP – Disaster Recovery Plan DSA – Digital Signature Algorithm DSL - Digital Subscriber line DSU – Data Service Unit EAP - Extensible Authentication Protocol ECC - Elliptic Curve Cryptography EFS – Encrypted File System EMI – Electromagnetic Interference ESP – Encapsulated Security Payload FTP – File Transfer Protocol GPO – Group Policy Object GPU - Graphic Processing Unit GRE - Generic Routing Encapsulation HDD – Hard Disk Drive HIDS – Host Based Intrusion Detection System HIPS – Host Based Intrusion Prevention System HMAC – Hashed Message Authentication Code HSM – Hardware Security Module HTML – HyperText Markup Language HTTP – Hypertext Transfer Protocol HTTPS – Hypertext Transfer Protocol over SSL HVAC – Heating, Ventilation Air Conditioning IaaS - Infrastructure as a Service ICMP - Internet Control Message Protocol ID – Identification IKE – Internet Key Exchange IM - Instant messaging IMAP4 - Internet Message Access Protocol v4 IP - Internet Protocol IPSEC – Internet Protocol Security IRC - Internet Relay Chat ISP – Internet Service Provider ITCP – IT Contingency Plan IV - Initialization Vector KDC - Key Distribution Center L2TP – Layer 2 Tunneling Protocol LAN – Local Area Network LANMAN – Local Area Network Manager LDAP – Lightweight Directory Access Protocol LEAP – Lightweight Extensible Authentication Protocol MAC – Mandatory Access Control / Media Access Control MAC - Message Authentication Code
  • 14. CompTIA Security+ Certification Exam Objectives 14 of 16 Copyright 2010 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice. MAN - Metropolitan Area Network MBR – Master Boot Record MD5 – Message Digest 5 MPLS – Multi-Protocol Layer Switch MSCHAP – Microsoft Challenge Handshake Authentication Protocol MTBF – Mean Time Between Failures MTTR – Mean Time to Recover MTU - Maximum Transmission Unit NAC – Network Access Control NAT – Network Address Translation NDA – Non-Disclosure Agreement NIDS – Network Based Intrusion Detection System NIPS – Network Based Intrusion Prevention System NIST – National Institute of Standards & Technology NOS – Network Operating System NTFS - New Technology File System NTLM – New Technology LANMAN NTP - Network Time Protocol OCSP – Online Certification Security Protocol OLA – Open License Agreement OS – Operating System OVAL – Open Vulnerability Assessment Language PAM – Pluggable Authentication Modules PAP – Password Authentication Protocol PAT - Port Address Translation PBX – Private Branch Exchange PCAP – Packet Capture PEAP – Protected Extensible Authentication Protocol PED - Personal Electronic Device PGP – Pretty Good Privacy PII – Personally Identifiable Information PIV – Personal Identity Verification PKI – Public Key Infrastructure POTS – Plain Old Telephone Service PPP - Point-to-point Protocol PPTP – Point to Point Tunneling Protocol PSK – Pre-Shared Key PTZ – Pan-Tilt-Zoom RA – Recovery Agent RAD - Rapid application development RADIUS – Remote Authentication Dial-in User Server RAID – Redundant Array of Inexpensive Disks
  • 15. CompTIA Security+ Certification Exam Objectives 15 of 16 Copyright 2010 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice. RAS – Remote Access Server RBAC – Role Based Access Control RBAC – Rule Based Access Control RIPEMD – RACE Integrity Primitives Evaluation Message Digest ROI – Return of Investment RPO – Recovery Point Objective RSA – Rivest, Shamir, & Adleman RTO – Recovery Time Objective RTP – Real-Time Transport Protocol S/MIME – Secure / Multipurpose internet Mail Extensions SAML – Security Assertions Markup Language SaaS - Software as a Service SCAP - Security Content Automation Protocol SCSI - Small Computer System Interface SDLC - Software Development Life Cycle SDLM - Software Development Life Cycle Methodology SEH – Structured Exception Handler SHA – Secure Hashing Algorithm SHTTP – Secure Hypertext Transfer Protocol SIM – Subscriber Identity Module SLA – Service Level Agreement SLE - Single Loss Expectancy SMS - Short Message Service SMTP – Simple Mail Transfer Protocol SNMP - Simple Network Management Protocol SOAP – Simple Object Access Point SONET – Synchronous Optical Network Technologies SPIM - Spam over Internet Messaging SSD – Solid State Drive SSH – Secure Shell SSL – Secure Sockets Layer SSO – Single Sign On STP – Shielded Twisted Pair TACACS – Terminal Access Controller Access Control System TCP/IP – Transmission Control Protocol / Internet Protocol TKIP - Temporal Key Integrity Protocol TLS – Transport Layer Security TPM – Trusted Platform Module TSIG – Transaction Signature UAT - User Acceptance Testing UEFI – Unified Extensible Firmware Interface UPS - Uninterruptable Power Supply
  • 16. CompTIA Security+ Certification Exam Objectives 16 of 16 Copyright 2010 by the Computing Technology Industry Association. All rights reserved. The CompTIA Security+ Certification Exam Objectives are subject to change without notice. URL - Universal Resource Locator USB – Universal Serial Bus UTP – Unshielded Twisted Pair VDI – Virtualization Desktop Infrastructure VLAN – Virtual Local Area Network VoIP - Voice over IP VPN – Virtual Private Network VTC – Video Teleconferencing WAF- Web-Application Firewall WAP – Wireless Access Point WEP – Wired Equivalent Privacy WIDS – Wireless Intrusion Detection System WIPS – Wireless Intrusion Prevention System WPA – Wireless Protected Access WTLS – Wireless TLS XML – Extensible Markup Language XSRF - Cross-Site Request Forgery XSRF- Cross-Site Request Forgery XSS - Cross-Site Scripting Version 2.0