Security+ (SY0-601)

(ITP-SY0-601.AA2)
Lab
Get A Free Trial

Skills You’ll Get

1

Compare and Contrast Different Types of Social Engineering Techniques

  • Examining Social Engineering Attacks
2

Given a Scenario, Analyze Indicators of Compromise and Determine the Malware

  • Analyzing Malware
3

Given a Scenario, Analyze Potential Indicators Associated with Application Attacks

  • Cracking Passwords
  • Attacking a Website Using XSS Injection
4

Given a Scenario, Analyze Potential Indicators Associated with Network Attacks

  • Using PowerShell
  • Simulating a DoS Attack
  • Performing Spoofing
5

Explain Different Threat Actors, Vectors and Intelligence Sources

  • Gathering OSINT
6

Summarize the Techniques Used in Security Assessments

  • Examining Common Vulnerabilities and Exposures Entries
7

Explain the Techniques Used in Penetration Testing

  • Performing Passive Reconnaissance
8

Explain the Importance of Security Concepts in an Enterprise Environment

  • Setting Up a Honeypot
9

Summarize Secure Application Development, Deployment, and Automation Concepts

  • Reviewing the Top 10 OWASP Attacks
10

Summarize Authentication and Authorization Design Concepts

  • Analyzing Pwned Passwords
11

Summarize the Basics of Cryptographic Concepts

  • Using Symmetric Encryption
  • Examining Asymmetric Encryption
  • Observing an MD5-Generated Hash Value
12

Given a Scenario, Implement Secure Protocols

  • Simulating an Eavesdropping Attack Using Wireshark
13

Given a Scenario, Implement Host or Application Security Solutions

  • Using Windows Firewall
14

Given a Scenario, Install and Configure Wireless Security Settings

  • Configuring Wi-Fi Security Settings
15

Given a Scenario, Implement Authentication and Authorization Solutions

  • Installing a RADIUS Server
  • Examining Kerberos Settings
16

Given a Scenario, Implement Public Key Infrastructure

  • Examining PKI Certificates
17

Given a Scenario, Use the Appropriate Tool to Assess Organizational Security

  • Using Reconnaissance Tools
  • Capturing Packets Using Wireshark
  • Scanning the Network
  • Cracking a Linux Password Using John the Ripper
18

Summarize the Importance of Policies, Processes, and Procedures for Incident Response

  • Configuring Account Lockout Policy
  • Enforcing Password Policies
  • Examining MITRE ATT&CK
19

Given an Incident, Utilize Appropriate Data Sources to Support an Investigation

  • Examining Windows Event Logs
20

Explain the Importance of Policies to Organizational Security

  • Studying a Non-Disclosure Agreement

Related Courses

All Courses
scroll to top