CompTIA Security+ Short Notes

SMN666
2 min readNov 25, 2020

It is a popular certification within the IT field. It shows how important security is within the IT field.

3 steps to take an exam.

Review the objectives. End of Chapter, You should read carefully exam topic and find more docs at Internet.

Learn the material related to the objectives.

Take practice questions again and again.

free online resources: http://gcgparemium.com/501-extras/

About the exam:

Number of questions : max 90 questions

Duration : 90mins

Passing score : 750

Grading criteria : 100to 900 (83%)

Question types : Multiple choice and performance-based

Exam format : can move back and forth to view previous questions

Chapter 1 : Mastering Security Basics

Understanding core security goals ( CIA trid, steganography)

Introducing Basic Risk ( vulnerability)

Understanding Control Types ( technical,administrative,physical)

Implementing Virtualization

Using Command-Line Tools

Chapter 2 : Understanding Identity and Access Management

Exploring Authentication Concepts

Comparing Authentication Services ( Kerberos, LDAP, SSO)

Managing Accounts

Comparing Access Control Models (role-BAC)

Chapter 3 : Exploring Network Technologies and Tools

Reviewing Basic Networking Concepts (RTP, FTP, SMTP, HTTP, NTP, DNS, DHCP)

Understanding Basic Network Devices (switch,router,firewall)

Implementing a Secure Network (DMZ,Proxy,Mail Gateway)

Summarizing Routing and Switching Use Cases (Vlan,ACL,SNMP)

Chapter 4 : Securing Your Network

Exploring Advanced Security Devices (IDS/IPS, Honeypots0

Securing Wireless Networks

Understanding Wireless Attacks ( rogue access point, jamming attack)

Using VPNs for Remote Access

Chapter 5 : Securing Hosts and Data

Implementing Secure Systems (Patch management,FDE,TPM)

Summarizing Cloud Concepts (SaaS,IaaS,Paas,CASB)

Deploying Mobile Devices Securely ( BOYD,CYOD,NFC,MDM)

Exploring Embedded Systems (SCADA)

Protecting Data (Encryption,DLP)

Chapter 6 : Comparing Threats,Vulnerabilities, and Common Attacks

Understanding Threat Actors (Hacktivist,Insiders,APT)

Determining Malware Types (Viruses,worms,ransomware,rootkits)

Recognizing Common Attacks (social-engineering attack)

Blocking Malware and Other Attacks (anti-virus,DEP,anti-spam)

Chapter 7 : Protecting Against Advanced Attacks

Comparing Common Attacks (DDOS,Spoofing,ARP poisoning,DNS poisoning,Clickjacking,Replay attack)

Summarizing Secure Coding Concepts

Identifying Application Attacks (SQL injection,XSS,XSRF)

Understanding Frameworks and Guides (PCI DSS)

Chapter 8 : Using Risk Management Tools

Understanding Risk Management

Comparing Scanning and Testing Tools

Using Security Tools (Wireshark,Tcpdump,Nmap,SIEM)

Chapter 9 : Implementing Controls to Protect Assets

Implementing Defense in Depth

Comparing Physical Security Controls

Adding Redundancy and Fault Tolerance (RAID,Load balancers)

Protecting Data with Backups

Comparing Business Continuity Elements (BIA,RTO,ROP,MTBF)

Chapter 10 : Understanding Cryptography and PKI

Introducing Cryptography Concepts

(Symmetric & Asymmetric encryption,Digital Signature)

Providing Integrity with Hashing (SHA,MD5,HMAC)

Providing Confidentiality with Encryption (AES,CBC,GCM,DES,RSA,ECC,ECDHE)

Using Cryptographic Protocols

Exploring PKI Components

Chapter 11 : Implementing Policies to Mitigate Risks

Exploring Security Policies

Protecting Data

Responding to Incidents

Providing Training

Hope this guide helpful to you.

Thanks you :D.

--

--