SlideShare una empresa de Scribd logo
1 de 11
Descargar para leer sin conexión
www.infosectrain.com | sales@infosectrain.com 01
The latest version of
Security+ SY0-601 have 5 Domains:
Domain 1.0: Attacks, Threats, and Vulnerabilities (24%)
Domain 2.0: Architecture and Design (21%)
Domain 3.0: Implementation (25%)
Domain 4.0: Operations and Incident Response (16%)
Domain 5.0: Governance, Risk, and Compliance (14%)
In this blog, we discuss the second domain 2: Architecture and Design.
www.infosectrain.com | sales@infosectrain.com 02
Architecture and Design
D O M A I N 2
A well-managed Information Security environment depends heavily
on architecture and design. This domain will show you how to put
security measures into effect and establish a safe working
environment for your organization. The weightage of this domain is
21%. The subtopics covered in this domain are listed below
1. Importance of security concepts in an enterprise environment.
2. Virtualization and cloud computing concepts.
3. Secure application development, deployment, and automation
concepts.
4. Authentication and authorization design concepts.
5. Implement cybersecurity resilience.
6. Security implications of embedded and specialized systems.
7. Importance of physical security controls.
www.infosectrain.com | sales@infosectrain.com 03
Importance of security concepts
in an enterprise environment
01
In this part, we will learn Configuration management and its
subtopics Diagrams, Baseline Configuration, Standard naming
conventions, Internet protocol schema.
We cover Data sovereignty, Data protection, Geographical
considerations, Response and recovery controls, SSL (Secure
Sockets Layer)/ TLS (Transport Layer Security) inspection, API
considerations, Site resiliency- Hot site- Cold site- Warm site, and
we understand Deception and disruption concept
• Honeypots
• Honeyfiles
• Honeynets
• Fake Telemetry
• DNS Sinkhole
www.infosectrain.com | sales@infosectrain.com 04
Virtualization and Cloud
Computing Concepts
02
The core premise behind cloud computing is that
you’ll access and control your applications and
data from any computer, everywhere in the world,
while virtualization hides or abstracts the storage
technique and location.
To conduct a breach in a cloud, a hacker just
requires a good Internet connection and a
dictionary of obtained password hashes or SSH
(Secure Shell) keys. A lack of supervision in cloud
providers’ security processes can greatly raise a
business’s danger.
As a security expert, you should be able to analyze the dangers and
weaknesses associated with cloud service and delivery models, as
well as the virtualization technologies that support them.
So in this part, we cover Cloud Service Models- Infrastructure as a
Service (laaS), Software as a Service (SaaS), Platform as a Service
(PaaS). We understand Virtualization Technologies concepts, VM
Escape protection, VM Sprawl Avoidance, Cloud Security Controls,
and we cover Infrastructure as Code.
www.infosectrain.com | sales@infosectrain.com 05
Secure Application Development,
Deployment, and Automation
Concepts
03
Development (programming and scripting) is at the foundation of
secure network administration and management, including
automation techniques for durability, disaster recovery, and
incident response. Along with your career, secure application
development will become increasingly important. In this lesson, we
will cover Secure Coding Techniques- Input validation,
Normalization, and Output Encoding, Server-side and Client-side
Validation, Data Exposure and Memory Management, Software
development kit (SDK), Stored procedures. We understand what
Automation is and what it provides? Scalability, Elasticity. We also
cover a Secure Application Development Environment
Development, Test, Staging, Production. In Automation/scripting we
learn deeply Automated courses of action, Continuous Monitoring,
Continuous Validation, Continuous Integration, Continuous Delivery,
Continuous deployment.
www.infosectrain.com | sales@infosectrain.com 06
Authentication and
authorization design concepts
04
In this lesson, we will learn Authentication Methods, Biometrics
concepts, Multi-Factor Authentication Factors, Authentication
Attributes, we also cover AAA (Authentication, Authorization, and
Accounting) and Cloud versus On-premises Requirements. In
Authentication Methods, we cover Directory Services, Federation,
Attestation, Smart Card Authentication, Authentication
Technologies like- TOTP (Time-based One- time password), HOTP
(HMAC-based one-time password), Short message service (SMS),
Token key, Static codes, Authentication applications, Push
notifications, Phone call.
In Biometrics we learn how it works and about its various topics like
Fingerprint, Retina, Iris, Facial, Voice, Vein, Gait analysis, Efficacy
rates, False acceptance, False rejection, Crossover error rate. In the
Authentication Factor, we learn some authentication factors which
ensure that the account can only be used by the account user.
The factors are Something you know, Something you have,
Something you are. And in Authentication Attributes,
we cover Somewhere you are, Something you can
do, Something you exhibit, Someone you know.
www.infosectrain.com | sales@infosectrain.com 07
Implement cybersecurity
resilience
05
In this lesson, we learn how to secure the whole organization. The
topics we cover inside this are Redundancy, Replication, Backup
types, Non-persistence, High availability, Scalability, Restoration
order, Diversity. Let’s see what sub-topics we will learn, in
Redundancy we cover, Geographic dispersal, Disk, Redundant array
of inexpensive disks (RAID) levels, Multipath, Network, Load
balancers, Network interface card (NIC) teaming, Power,
Uninterruptible power supply (UPS), Generator, Dual supply,
Managed power distribution units (PDUs). Inside Replication, we
learn Storage area networks and VM. In Backup, we understand
types of backup like Full, Incremental, Snapshot, Differential, Tape,
Disk, Copy, Network-attached storage (NAS), Storage area network,
Cloud, Image, Online and offline, Offsite storage, Distance
considerations.
www.infosectrain.com | sales@infosectrain.com 08
Security implications of
embedded and specialized
systems
06
In this lesson, we learn Embedded systems, Specialized, Supervisory
control and data acquisition (SCADA)/industrial control system
(ICS), Supervisory control and data acquisition (SCADA)/industrial
control system (ICS), Communication considerations, Constraints,
Voice over IP (VoIP), Heating, ventilation, air conditioning (HVAC),
Drones, Multifunction printer (MFP), Real-time operating system
(RTOS), Surveillance systems, System on chip (SoC). In Embedded
Systems we cover Raspberry Pi, Field-programmable gate array
(FPGA), Arduino. In Specialized we cover Medical systems, Vehicles,
Aircraft, Smart meters. Inside the Internet of Things (IoT) we learn
about, Sensors, Smart devices, Wearables, Facility automation,
Weak defaults.
www.infosectrain.com | sales@infosectrain.com 09
Importance of physical
security controls
07
In this lesson, we will learn about the importance of physical
security. This part will clear your concepts on Bollards/barricades,
Access control vestibules, Badges, Alarms, Signage, Cameras, USB
data blocker, Lighting, Fencing, Fire suppression, Sensors, Drones,
Visitor logs, Faraday cages, Air gap, Screened subnet (previously
known as demilitarized zone), Protected cable distribution, Secure
data destruction. Inside Sensors, we cover Motion detection, Noise
detection, Proximity reader, Moisture detection, Cards, Temperature.
We also cover secure data destruction sub-topics like Burning,
Shredding, Pulping, Pulverizing, Degaussing, Third-party solutions.
www.infosectrain.com | sales@infosectrain.com

Más contenido relacionado

La actualidad más candente

Security Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and ToolsSecurity Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and Tools
Yulian Slobodyan
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas
 

La actualidad más candente (20)

Comptia security-sy0-601-exam-objectives-(2-0)
Comptia security-sy0-601-exam-objectives-(2-0)Comptia security-sy0-601-exam-objectives-(2-0)
Comptia security-sy0-601-exam-objectives-(2-0)
 
Cyber Threat Intelligence: Building and maturing an intelligence program that...
Cyber Threat Intelligence: Building and maturing an intelligence program that...Cyber Threat Intelligence: Building and maturing an intelligence program that...
Cyber Threat Intelligence: Building and maturing an intelligence program that...
 
Chapter 5 - Identity Management
Chapter 5 - Identity ManagementChapter 5 - Identity Management
Chapter 5 - Identity Management
 
Cybersecurity & Project Management
Cybersecurity & Project ManagementCybersecurity & Project Management
Cybersecurity & Project Management
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Network security
Network securityNetwork security
Network security
 
Security Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and ToolsSecurity Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and Tools
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptx
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Info Security - Vulnerability Assessment
Info Security - Vulnerability AssessmentInfo Security - Vulnerability Assessment
Info Security - Vulnerability Assessment
 
Secure coding practices
Secure coding practicesSecure coding practices
Secure coding practices
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
 
Threat Modelling - It's not just for developers
Threat Modelling - It's not just for developersThreat Modelling - It's not just for developers
Threat Modelling - It's not just for developers
 
Cyber security training course ppt
Cyber security training course pptCyber security training course ppt
Cyber security training course ppt
 

Similar a CompTIA Security+ SY0-601 Domain 2

Causes And Consequences Of Data Leakage
Causes And Consequences Of Data LeakageCauses And Consequences Of Data Leakage
Causes And Consequences Of Data Leakage
Patty Buckley
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunal
Kashyap Kunal
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
Tiffany Graham
 

Similar a CompTIA Security+ SY0-601 Domain 2 (20)

CompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptxCompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
 
Comp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementationComp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementation
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdf
 
Top Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxTop Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptx
 
CompTIA CySA+ Domain 2 Software and Systems Security.pptx
CompTIA CySA+ Domain 2 Software and Systems Security.pptxCompTIA CySA+ Domain 2 Software and Systems Security.pptx
CompTIA CySA+ Domain 2 Software and Systems Security.pptx
 
CompTIA CySA Domain 3 Security Operations and Monitoring.pptx
CompTIA CySA  Domain 3 Security Operations and Monitoring.pptxCompTIA CySA  Domain 3 Security Operations and Monitoring.pptx
CompTIA CySA Domain 3 Security Operations and Monitoring.pptx
 
Protecting Businesses with Top Cybersecurity Companies.pptx
Protecting Businesses with Top Cybersecurity Companies.pptxProtecting Businesses with Top Cybersecurity Companies.pptx
Protecting Businesses with Top Cybersecurity Companies.pptx
 
R ramya devi cloud computing
R ramya devi cloud computingR ramya devi cloud computing
R ramya devi cloud computing
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud security
 
Cloud and compliance REX
Cloud and compliance REXCloud and compliance REX
Cloud and compliance REX
 
Causes And Consequences Of Data Leakage
Causes And Consequences Of Data LeakageCauses And Consequences Of Data Leakage
Causes And Consequences Of Data Leakage
 
Security in a Virtualised Computing
Security in a Virtualised ComputingSecurity in a Virtualised Computing
Security in a Virtualised Computing
 
Aligning Risk with Growth - Cloud Security for startups
Aligning Risk with Growth - Cloud Security for startupsAligning Risk with Growth - Cloud Security for startups
Aligning Risk with Growth - Cloud Security for startups
 
Cognitive security
Cognitive securityCognitive security
Cognitive security
 
Seceon's aiXDR_ Automating Cybersecurity Threat Detection in 2023 - Seceon.pptx
Seceon's aiXDR_ Automating Cybersecurity Threat Detection in 2023 - Seceon.pptxSeceon's aiXDR_ Automating Cybersecurity Threat Detection in 2023 - Seceon.pptx
Seceon's aiXDR_ Automating Cybersecurity Threat Detection in 2023 - Seceon.pptx
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunal
 
Securing Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureSecuring Your Public Cloud Infrastructure
Securing Your Public Cloud Infrastructure
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutions
 

Más de ShivamSharma909

Más de ShivamSharma909 (20)

Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdf
 
CYBERSECURITY Interview Questions for Freshers.pdf
CYBERSECURITY Interview Questions for Freshers.pdfCYBERSECURITY Interview Questions for Freshers.pdf
CYBERSECURITY Interview Questions for Freshers.pdf
 
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
 
Top 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfTop 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdf
 
Top 25 Azure Architect Interview Questions and Answers.pdf
Top 25 Azure Architect Interview Questions and Answers.pdfTop 25 Azure Architect Interview Questions and Answers.pdf
Top 25 Azure Architect Interview Questions and Answers.pdf
 
Top 20 Azure Administrator Interview Questions.pdf
Top 20 Azure Administrator Interview Questions.pdfTop 20 Azure Administrator Interview Questions.pdf
Top 20 Azure Administrator Interview Questions.pdf
 
Threat Hunting Professional Online Training Course
Threat Hunting Professional Online Training CourseThreat Hunting Professional Online Training Course
Threat Hunting Professional Online Training Course
 
Why cloud security engineers find CCSE as a perfect fit
Why cloud security engineers find CCSE as a perfect fitWhy cloud security engineers find CCSE as a perfect fit
Why cloud security engineers find CCSE as a perfect fit
 
Top 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerTop 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answer
 
Top 20 azure interview questions
Top 20 azure interview questionsTop 20 azure interview questions
Top 20 azure interview questions
 
Top 15 aws security interview questions
Top 15 aws security interview questionsTop 15 aws security interview questions
Top 15 aws security interview questions
 
EC-Council Certified SOC Analyst
EC-Council Certified SOC AnalystEC-Council Certified SOC Analyst
EC-Council Certified SOC Analyst
 
Ctia course outline
Ctia course outlineCtia course outline
Ctia course outline
 
Domain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingDomain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network Hacking
 
Domain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application HackingDomain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application Hacking
 
Domain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter HackingDomain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter Hacking
 
Domain 3 of CEH v11: System Hacking Phases and Attack Techniques
Domain 3 of CEH v11: System Hacking Phases and Attack TechniquesDomain 3 of CEH v11: System Hacking Phases and Attack Techniques
Domain 3 of CEH v11: System Hacking Phases and Attack Techniques
 
Domain 2 of CEH v11: Reconnaissance Techniques
Domain 2 of CEH v11: Reconnaissance TechniquesDomain 2 of CEH v11: Reconnaissance Techniques
Domain 2 of CEH v11: Reconnaissance Techniques
 
Domain 1 of CEH v11: Information Security and Ethical Hacking
Domain 1 of CEH v11: Information Security and Ethical HackingDomain 1 of CEH v11: Information Security and Ethical Hacking
Domain 1 of CEH v11: Information Security and Ethical Hacking
 
How is az 303 different from az-304
How is az 303 different from az-304How is az 303 different from az-304
How is az 303 different from az-304
 

Último

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Último (20)

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 

CompTIA Security+ SY0-601 Domain 2

  • 1.
  • 2. www.infosectrain.com | sales@infosectrain.com 01 The latest version of Security+ SY0-601 have 5 Domains: Domain 1.0: Attacks, Threats, and Vulnerabilities (24%) Domain 2.0: Architecture and Design (21%) Domain 3.0: Implementation (25%) Domain 4.0: Operations and Incident Response (16%) Domain 5.0: Governance, Risk, and Compliance (14%) In this blog, we discuss the second domain 2: Architecture and Design.
  • 3. www.infosectrain.com | sales@infosectrain.com 02 Architecture and Design D O M A I N 2 A well-managed Information Security environment depends heavily on architecture and design. This domain will show you how to put security measures into effect and establish a safe working environment for your organization. The weightage of this domain is 21%. The subtopics covered in this domain are listed below 1. Importance of security concepts in an enterprise environment. 2. Virtualization and cloud computing concepts. 3. Secure application development, deployment, and automation concepts. 4. Authentication and authorization design concepts. 5. Implement cybersecurity resilience. 6. Security implications of embedded and specialized systems. 7. Importance of physical security controls.
  • 4. www.infosectrain.com | sales@infosectrain.com 03 Importance of security concepts in an enterprise environment 01 In this part, we will learn Configuration management and its subtopics Diagrams, Baseline Configuration, Standard naming conventions, Internet protocol schema. We cover Data sovereignty, Data protection, Geographical considerations, Response and recovery controls, SSL (Secure Sockets Layer)/ TLS (Transport Layer Security) inspection, API considerations, Site resiliency- Hot site- Cold site- Warm site, and we understand Deception and disruption concept • Honeypots • Honeyfiles • Honeynets • Fake Telemetry • DNS Sinkhole
  • 5. www.infosectrain.com | sales@infosectrain.com 04 Virtualization and Cloud Computing Concepts 02 The core premise behind cloud computing is that you’ll access and control your applications and data from any computer, everywhere in the world, while virtualization hides or abstracts the storage technique and location. To conduct a breach in a cloud, a hacker just requires a good Internet connection and a dictionary of obtained password hashes or SSH (Secure Shell) keys. A lack of supervision in cloud providers’ security processes can greatly raise a business’s danger. As a security expert, you should be able to analyze the dangers and weaknesses associated with cloud service and delivery models, as well as the virtualization technologies that support them. So in this part, we cover Cloud Service Models- Infrastructure as a Service (laaS), Software as a Service (SaaS), Platform as a Service (PaaS). We understand Virtualization Technologies concepts, VM Escape protection, VM Sprawl Avoidance, Cloud Security Controls, and we cover Infrastructure as Code.
  • 6. www.infosectrain.com | sales@infosectrain.com 05 Secure Application Development, Deployment, and Automation Concepts 03 Development (programming and scripting) is at the foundation of secure network administration and management, including automation techniques for durability, disaster recovery, and incident response. Along with your career, secure application development will become increasingly important. In this lesson, we will cover Secure Coding Techniques- Input validation, Normalization, and Output Encoding, Server-side and Client-side Validation, Data Exposure and Memory Management, Software development kit (SDK), Stored procedures. We understand what Automation is and what it provides? Scalability, Elasticity. We also cover a Secure Application Development Environment Development, Test, Staging, Production. In Automation/scripting we learn deeply Automated courses of action, Continuous Monitoring, Continuous Validation, Continuous Integration, Continuous Delivery, Continuous deployment.
  • 7. www.infosectrain.com | sales@infosectrain.com 06 Authentication and authorization design concepts 04 In this lesson, we will learn Authentication Methods, Biometrics concepts, Multi-Factor Authentication Factors, Authentication Attributes, we also cover AAA (Authentication, Authorization, and Accounting) and Cloud versus On-premises Requirements. In Authentication Methods, we cover Directory Services, Federation, Attestation, Smart Card Authentication, Authentication Technologies like- TOTP (Time-based One- time password), HOTP (HMAC-based one-time password), Short message service (SMS), Token key, Static codes, Authentication applications, Push notifications, Phone call. In Biometrics we learn how it works and about its various topics like Fingerprint, Retina, Iris, Facial, Voice, Vein, Gait analysis, Efficacy rates, False acceptance, False rejection, Crossover error rate. In the Authentication Factor, we learn some authentication factors which ensure that the account can only be used by the account user. The factors are Something you know, Something you have, Something you are. And in Authentication Attributes, we cover Somewhere you are, Something you can do, Something you exhibit, Someone you know.
  • 8. www.infosectrain.com | sales@infosectrain.com 07 Implement cybersecurity resilience 05 In this lesson, we learn how to secure the whole organization. The topics we cover inside this are Redundancy, Replication, Backup types, Non-persistence, High availability, Scalability, Restoration order, Diversity. Let’s see what sub-topics we will learn, in Redundancy we cover, Geographic dispersal, Disk, Redundant array of inexpensive disks (RAID) levels, Multipath, Network, Load balancers, Network interface card (NIC) teaming, Power, Uninterruptible power supply (UPS), Generator, Dual supply, Managed power distribution units (PDUs). Inside Replication, we learn Storage area networks and VM. In Backup, we understand types of backup like Full, Incremental, Snapshot, Differential, Tape, Disk, Copy, Network-attached storage (NAS), Storage area network, Cloud, Image, Online and offline, Offsite storage, Distance considerations.
  • 9. www.infosectrain.com | sales@infosectrain.com 08 Security implications of embedded and specialized systems 06 In this lesson, we learn Embedded systems, Specialized, Supervisory control and data acquisition (SCADA)/industrial control system (ICS), Supervisory control and data acquisition (SCADA)/industrial control system (ICS), Communication considerations, Constraints, Voice over IP (VoIP), Heating, ventilation, air conditioning (HVAC), Drones, Multifunction printer (MFP), Real-time operating system (RTOS), Surveillance systems, System on chip (SoC). In Embedded Systems we cover Raspberry Pi, Field-programmable gate array (FPGA), Arduino. In Specialized we cover Medical systems, Vehicles, Aircraft, Smart meters. Inside the Internet of Things (IoT) we learn about, Sensors, Smart devices, Wearables, Facility automation, Weak defaults.
  • 10. www.infosectrain.com | sales@infosectrain.com 09 Importance of physical security controls 07 In this lesson, we will learn about the importance of physical security. This part will clear your concepts on Bollards/barricades, Access control vestibules, Badges, Alarms, Signage, Cameras, USB data blocker, Lighting, Fencing, Fire suppression, Sensors, Drones, Visitor logs, Faraday cages, Air gap, Screened subnet (previously known as demilitarized zone), Protected cable distribution, Secure data destruction. Inside Sensors, we cover Motion detection, Noise detection, Proximity reader, Moisture detection, Cards, Temperature. We also cover secure data destruction sub-topics like Burning, Shredding, Pulping, Pulverizing, Degaussing, Third-party solutions.