THREATS, ATTACKS AND VULNERABILITIES
- Compare and contrast different types of social engineering techniques
- Analyze potential indicators to determine the type of attack
- Analyze potential indicators associated with application attacks
- Analyze potential indicators associated with network attacks
- Explain different threat actors, vectors, and intelligence sources
- Explain the security concerns associated with various types of vulnerabilities
- Summarize the techniques used in security assessments
- Explain the techniques used in penetration testing
ARCHITECTURE AND DESIGN
- Explain the importance of security concepts in an enterprise environment
- Summarize virtualization and cloud computing concepts
- Summarize secure application development, deployment, and automation concepts
- Summarize authentication and authorization design concepts
- Implement cybersecurity resilience
- Explain the security implications of embedded and specialized systems
- Explain the importance of physical security controls
- Summarize the basics of cryptographic concepts
IMPLEMENTATION
- Implement secure protocols
- Implement host or application security solutions
- Implement secure network designs
- Install and configure wireless security settings
- Implement secure mobile solutions
- Apply cybersecurity solutions to the cloud
- Given a scenario, implement identity and account management controls
- Implement authentication and authorization solutions
- Implement public key infrastructure
OPERATIONS AND INCIDENT RESPONSE
- Use the appropriate tool to assess organizational security
- Summarize the importance of policies, processes, and procedures for incident response
- Utilize appropriate data sources to support an investigation
- Apply mitigation techniques or controls to secure an environment
- Explain the key aspects of digital forensics
GOVERNANCE, RISK, AND COMPLIANCE
- Compare and contrast various types of controls
- Explain the importance of applicable regulations, standards, or frameworks that impact the organizational security posture
- Explain the importance of policies to organizational security
- Summarize risk management processes and concepts
- Explain privacy and sensitive data concepts in relation to security
COMPTIA SECURITY+ CERTIFICATION EXAM REVIEW
- Exam Structure
- Exam Registration Process
- Time Management
- Topics and Concepts
- CompTIA Security+ Certification Question Structure
- Vendor Interpretation Techniques