CompTIA Security+ SY0-601

(ITP-SY0-601.AA1)
Lessons
Lab
Get A Free Trial

Skills You’ll Get

1

Compare and Contrast Different Types of Social Engineering Techniques

  • Social Engineering Principles
  • Social Engineering Attack Vectors
  • Influence Campaigns
2

Given a Scenario, Analyze Indicators of Compromise and Determine the Malware

  • Malware Primer
  • Malware Families
3

Given a Scenario, Analyze Potential Indicators Associated with Application Attacks

  • Input and Output Validation
  • Injection, XSS and Forgery Attacks
4

Given a Scenario, Analyze Potential Indicators Associated with Network Attacks

  • Digital Infrastructure Attacks
5

Explain Different Threat Actors, Vectors and Intelligence Sources

6

Explain the Security Concerns Associated with Various Types of Vulnerabilities

  • Operational Vulnerabilities
7

Summarize the Techniques Used in Security Assessments

  • Threat Hunting and Vulnerability Identification
  • Syslog, SIEM & SOAR
8

Explain the Techniques Used in Penetration Testing

  • Penetration Testing Concepts
9

Explain the Importance of Security Concepts in an Enterprise Environment

  • Configuration Management
  • Data Protection
  • Deception and Disruption
10

Summarize Virtualization and Cloud Computing Concepts

  • Cloud Computing
  • Virtualization
11

Summarize Secure Application Development, Deployment, and Automation Concepts

12

Summarize Authentication and Authorization Design Concepts

13

Given a Scenario, Implement Cybersecurity Resilience

  • Resiliency and Redundancy
  • Backup and Recovery
14

Explain the Security Implications of Embedded and Specialized Systems

15

Explain the Importance of Physical Security Controls

16

Summarize the Basics of Cryptographic Concepts

  • Cryptography Primer
  • Steganography
  • Symmetric Encryption
  • Asymmetric Encryption
  • Hashing
17

Given a Scenario, Implement Secure Protocols

  • Secure Communications Protocols
  • Secure Network Protocols
18

Given a Scenario, Implement Host or Application Security Solutions

  • Trusted Computing Base
  • Endpoint Security
  • Database and Application Security
19

Given a Scenario, Implement Secure Network Designs

  • Zones and Segments
20

Given a Scenario, Install and Configure Wireless Security Settings

21

Given a Scenario, Implement Secure Mobile Solutions

  • Mobile Connectivity
  • Mobile Device Management
22

Given a Scenario, Apply Cybersecurity Solutions to the Cloud

  • Cloud Infrastructure
  • Virtual Private Clouds
  • Cloud Security Controls
23

Given a Scenario, Implement Identity and Account Management Controls

  • Identity and Access Management
24

Given a Scenario, Implement Authentication and Authorization Solutions

  • Authentication Protocols
  • Federated Identity
  • Authorization and Access Control
25

Given a Scenario, Implement Public Key Infrastructure

  • PKI Cryptographic Review
  • Digital Certificates
26

Given a Scenario, Use the Appropriate Tool to Assess Organizational Security

  • Reconnaissance and Discovery
  • Packet Capture and NetFlows
  • Linux Commands
27

Summarize the Importance of Policies, Processes, and Procedures for Incident Response

28

Given an Incident, Utilize Appropriate Data Sources to Support an Investigation

  • Data Sources
29

Given an Incident, Apply Mitigation Techniques or Controls to Secure an Environment

30

Explain the Key Aspects of Digital Forensics

31

Compare and Contrast Various Types of Controls

32

Explain the Importance of Applicable Regulations...orks That Impact Organizational Security Posture

33

Explain the Importance of Policies to Organizational Security

34

Summarize Risk Management Processes and Concepts

35

Explain Privacy and Sensitive Data Concepts in Relation to Security

36

Preparing for the Exam

1

Compare and Contrast Different Types of Social Engineering Techniques

  • Using Social Engineering Techniques to Plan an Attack
2

Given a Scenario, Analyze Indicators of Compromise and Determine the Malware

  • Creating a Remote Access Trojan (RAT)
  • Detecting Rootkits
  • Identifying Virus Threats
  • Using an Anti-Spyware Tool
3

Given a Scenario, Analyze Potential Indicators Associated with Application Attacks

  • Understanding the Pass-the-hash Attack
  • Conducting a Cross-Site Request Forgery Attack
  • Attacking a Website Using XSS Injection
  • Exploiting a Website Using SQL Injection
4

Given a Scenario, Analyze Potential Indicators Associated with Network Attacks

  • Performing ARP Poisoning
  • Spoofing MAC Address with SMAC
  • Performing a Man-in-the-Middle Attack
  • Simulating a DoS Attack
5

Explain the Security Concerns Associated with Various Types of Vulnerabilities

  • Conducting Vulnerability Scanning Using Nessus
6

Summarize the Techniques Used in Security Assessments

  • Overview of OSSIM and Demonstrate Log Review of Scanned Machines
7

Explain the Techniques Used in Penetration Testing

  • Footprinting a Website
8

Explain the Importance of Security Concepts in an Enterprise Environment

  • Using the SHA Series Algorithm
  • Using the MD5 Hash Algorithm
  • Setting up a Honeypot on Kali Linux
9

Summarize Virtualization and Cloud Computing Concepts

  • Creating a Virtual Machine
  • Enabling the Hyper‐V Feature
10

Given a Scenario, Implement Cybersecurity Resilience

  • Scheduling a Server Backup
11

Summarize the Basics of Cryptographic Concepts

  • Using Symmetric Encryption
  • Examining Asymmetric Encryption
  • Cracking a Password Hash
  • Using OpenSSL to Create a Public/Private Key Pair
12

Given a Scenario, Implement Secure Protocols

  • Configuring IPSec
  • Configuring DNSSEC on an Active Directory Integrated Zone
13

Given a Scenario, Implement Host or Application Security Solutions

  • Enabling a Virtual Machine Secure Boot and TPM
  • Configuring Windows Firewall
  • Scanning Malware Using Antivirus
14

Given a Scenario, Implement Secure Network Designs

  • Configuring VLANs
  • Configuring Network Address Translation
15

Given a Scenario, Implement Secure Mobile Solutions

  • Setting Up a VPN in Android
16

Given a Scenario, Apply Cybersecurity Solutions to the Cloud

  • Creating a VPC
17

Given a Scenario, Implement Identity and Account Management Controls

  • Configuring a Password Policy
  • Configuring Account-Lockout Policies
18

Given a Scenario, Implement Authentication and Authorization Solutions

  • Managing NTFS Permissions
  • Configuring AAA for Device Access Control
  • Examining Kerberos Settings
  • Installing a RADIUS Server
19

Given a Scenario, Implement Public Key Infrastructure

  • Examining PKI certificates
  • Backing Up CA
20

Given a Scenario, Use the Appropriate Tool to Assess Organizational Security

  • Performing Reconnaissance on a Network
  • Capturing Packets Using Wireshark
  • Using the ifconfig Command
  • Using the traceroute Command

Related Courses

All Courses
scroll to top