Security+ Certification is offered by CompTIA®. Undoubtedly, Security+ Certification is one of the most widely recognized certification in the field of computer and network security. Security+ exam is targeted for computer service technicians with at least 2 year on-the-job experience. To get Security+ certified, one need to pass only one exam: SY0 - 601
Check out the Comptia Security+ exam notes at examguides.com
Contents
- Threats, Attacks and Vulnerabilities
- Given a scenario, analyze and determine the type of malware
- Compare and contrast types of attacks
- Explain threat actor types and attributes
- Explain penetration testing concepts
- Explain vulnerability scanning concepts
- Explain the impact associated with types of vulnerabilities
- Technologies and Tools
- Install and configure network components, both hardware and software-based, to support organizational security
- Given a scenario, use appropriate software tools to assess the security posture of an organization
- Given a scenario, troubleshoot common security issues
- Given a scenario, analyze and interpret output from security technologies
- Given a scenario, deploy mobile devices securely
- Given a scenario, implement secure protocols
- Architecture and Design
- Explain use cases and purpose for frameworks, best practices and secure configuration guides
- Given a scenario, implement secure network architecture concepts
- Given a scenario, implement secure systems design
- Summarize secure application development and deployment concepts
- Summarize cloud and virtualization concepts
- Explain how resiliency and automation strategies reduce risk
- Explain the importance of physical security controls
- Identity and Access Management
- Compare and contrast identity and access management concepts
- Given a scenario, install and configure identity and access services
- Given a scenario, implement identity and access management controls
- Given a scenario, differentiate common account management practices
- Risk Management
- Explain the importance of policies, plans and procedures related to organizational security
- Summarize business impact analysis concepts
- Explain risk management processes and concepts
- Explain disaster recovery and continuity of operations concepts
- Compare and contrast various types of controls
- Cryptography and PKI
- Compare and contrast basic concepts of cryptography
- Explain cryptography algorithms and their basic characteristics
- Given a scenario, install and configure wireless security settings
- Given a scenario, implement public key infrastructure
No comments:
Post a Comment