0%

Learn, prepare, and practice for CompTIA Security+ SY0-601 exam success with this CompTIA Security+ SY0-601 Cert Guide from Pearson IT Certification, a leader in IT certification learning.

CompTIA Security+ SY0-601 Cert Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. Do I Know This Already? quizzes open each chapter and enable you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly.

CompTIA Security+ SY0-601 Cert Guide focuses specifically on the objectives for the CompTIA Security+ SY0-601 exam. Leading security experts Omar Santos, Ron Taylor, and Joseph Mlodzianowski share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.

This complete study package includes* A test-preparation routine proven to help you pass the exams* Do I Know This Already? quizzes, which allow you to decide how much time you need to spend on each section* Chapter-ending exercises, which help you drill on key concepts you must know thoroughly* An online interactive Flash Cards application to help you drill on Key Terms by chapter* A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies* Study plan suggestions and templates to help you organize and optimize your study time Well regarded for its level of detail, assessment features, and challenging review questions and exercises, this official study guide helps you master the concepts and techniques that ensure your exam success.

This study guide helps you master all the topics on the CompTIA Security+ SY0-601 exam, including* Cyber attacks, threats, and vulnerabilities* Social engineering, wireless attacks, denial of service attacks* Threat hunting and incident response* Indicators of compromise and threat intelligence* Cloud security concepts and cryptography* Security assessments and penetration testing concepts* Governance, risk management, and cyber resilience* Authentication, Authorization, and Accounting (AAA)* IoT and Industrial Control Systems (ICS) security* Physical and administrative security controls

Table of Contents

  1. Cover Page
  2. About This eBook
  3. Title Page
  4. Copyright Page
  5. Contents at a Glance
  6. Table of Contents
  7. About the Authors
  8. Dedication
  9. Acknowledgments
  10. About the Technical Reviewer
  11. We Want to Hear from You!
  12. Reader Services
  13. Introduction
    1. Goals and Methods
    2. Who Should Read This Book?
    3. CompTIA Security+ Exam Topics
    4. Companion Website
    5. Pearson Test Prep Practice Test Software
    6. Premium Edition eBook and Practice Tests
    7. Figure Credits
  14. Part I: Threats, Attacks, and Vulnerabilities
    1. Chapter 1. Comparing and Contrasting Different Types of Social Engineering Techniques
    2. “Do I Know This Already?” Quiz
    3. Foundation Topics
    4. Social Engineering Fundamentals
    5. User Security Awareness Education
    6. Chapter Review Activities
    7. Review Key Topics
    8. Define Key Terms
    9. Review Questions
    10. Chapter 2. Analyzing Potential Indicators to Determine the Type of Attack
    11. “Do I Know This Already?” Quiz
    12. Foundation Topics
    13. Malicious Software (Malware)
    14. Password Attacks
    15. Physical Attacks
    16. Adversarial Artificial Intelligence
    17. Supply-Chain Attacks
    18. Cloud-based vs. On-premises Attacks
    19. Cryptographic Attacks
    20. Chapter Review Activities
    21. Review Key Topics
    22. Define Key Terms
    23. Review Questions
    24. Chapter 3. Analyzing Potential Indicators Associated with Application Attacks
    25. “Do I Know This Already?” Quiz
    26. Foundation Topics
    27. Privilege Escalation
    28. Cross-Site Scripting (XSS) Attacks
    29. Injection Attacks
    30. Pointer/Object Dereference
    31. Directory Traversal
    32. Buffer Overflows
    33. Race Conditions
    34. Error Handling
    35. Improper Input Handling
    36. Replay Attacks
    37. Request Forgeries
    38. Application Programming Interface (API) Attacks
    39. Resource Exhaustion
    40. Memory Leaks
    41. Secure Socket Layer (SSL) Stripping
    42. Driver Manipulation
    43. Pass the Hash
    44. Chapter Review Activities
    45. Review Key Topics
    46. Define Key Terms
    47. Review Questions
    48. Chapter 4. Analyzing Potential Indicators Associated with Network Attacks
    49. “Do I Know This Already?” Quiz
    50. Foundation Topics
    51. Wireless Attacks
    52. On-Path Attacks
    53. Layer 2 Attacks
    54. Domain Name System (DNS) Attacks
    55. Distributed Denial-of-Service (DDoS) Attacks
    56. Malicious Code or Script Execution Attacks
    57. Chapter Review Activities
    58. Review Key Topics
    59. Define Key Terms
    60. Review Questions
    61. Chapter 5. Understanding Different Threat Actors, Vectors, and Intelligence Sources
    62. “Do I Know This Already?” Quiz
    63. Foundation Topics
    64. Actors and Threats
    65. Attributes of Threat Actors
    66. Attack Vectors
    67. Threat Intelligence and Threat Intelligence Sources
    68. Research Sources
    69. Chapter Review Activities
    70. Review Key Topics
    71. Define Key Terms
    72. Review Questions
    73. Chapter 6. Understanding the Security Concerns Associated with Various Types of Vulnerabilities
    74. “Do I Know This Already?” Quiz
    75. Foundation Topics
    76. Cloud-based vs. On-premises Vulnerabilities
    77. Zero-day Vulnerabilities
    78. Weak Configurations
    79. Third-party Risks
    80. Improper or Weak Patch Management
    81. Legacy Platforms
    82. The Impact of Cybersecurity Attacks and Breaches
    83. Chapter Review Activities
    84. Review Key Topics
    85. Define Key Terms
    86. Review Questions
    87. Chapter 7. Summarizing the Techniques Used in Security Assessments
    88. “Do I Know This Already?” Quiz
    89. Foundation Topics
    90. Threat Hunting
    91. Vulnerability Scans
    92. Logs and Security Information and Event Management (SIEM)
    93. Security Orchestration, Automation, and Response (SOAR)
    94. Chapter Review Activities
    95. Review Key Topics
    96. Define Key Terms
    97. Review Questions
    98. Chapter 8. Understanding the Techniques Used in Penetration Testing
    99. “Do I Know This Already?” Quiz
    100. Foundation Topics
    101. Penetration Testing
    102. Passive and Active Reconnaissance
    103. Exercise Types
    104. Chapter Review Activities
    105. Review Key Topics
    106. Define Key Terms
    107. Review Questions
  15. Part II: Architecture and Design
    1. Chapter 9. Understanding the Importance of Security Concepts in an Enterprise Environment
    2. “Do I Know This Already?” Quiz
    3. Foundation Topics
    4. Configuration Management
    5. Data Sovereignty and Data Protection
    6. Site Resiliency
    7. Deception and Disruption
    8. Chapter Review Activities
    9. Review Key Topics
    10. Define Key Terms
    11. Review Questions
    12. Chapter 10. Summarizing Virtualization and Cloud Computing Concepts
    13. “Do I Know This Already?” Quiz
    14. Foundation Topics
    15. Cloud Models
    16. Cloud Service Providers
    17. Cloud Architecture Components
    18. Virtual Machine (VM) Sprawl Avoidance and VM Escape Protection
    19. Chapter Review Activities
    20. Review Key Topics
    21. Define Key Terms
    22. Review Questions
    23. Chapter 11. Summarizing Secure Application Development, Deployment, and Automation Concepts
    24. “Do I Know This Already?” Quiz
    25. Foundation Topics
    26. Software Development Environments and Methodologies
    27. Application Provisioning and Deprovisioning
    28. Software Integrity Measurement
    29. Secure Coding Techniques
    30. Open Web Application Security Project (OWASP)
    31. Software Diversity
    32. Automation/Scripting
    33. Elasticity and Scalability
    34. Chapter Review Activities
    35. Review Key Topics
    36. Define Key Terms
    37. Review Questions
    38. Chapter 12. Summarizing Authentication and Authorization Design Concepts
    39. “Do I Know This Already?” Quiz
    40. Foundation Topics
    41. Authentication Methods
    42. Biometrics
    43. Multifactor Authentication (MFA) Factors and Attributes
    44. Authentication, Authorization, and Accounting (AAA)
    45. Cloud vs. On-premises Requirements
    46. Chapter Review Activities
    47. Review Key Topics
    48. Define Key Terms
    49. Review Questions
    50. Chapter 13. Implementing Cybersecurity Resilience
    51. “Do I Know This Already?” Quiz
    52. Foundation Topics
    53. Redundancy
    54. Replication
    55. On-premises vs. Cloud
    56. Backup Types
    57. Non-persistence
    58. High Availability
    59. Restoration Order
    60. Diversity
    61. Chapter Review Activities
    62. Review Key Topics
    63. Define Key Terms
    64. Review Questions
    65. Chapter 14. Understanding the Security Implications of Embedded and Specialized Systems
    66. “Do I Know This Already?” Quiz
    67. Foundation Topics
    68. Embedded Systems
    69. Supervisory Control and Data Acquisition (SCADA)/Industrial Control Systems (ICS)
    70. Internet of Things (IoT)
    71. Specialized Systems
    72. Voice over IP (VoIP)
    73. Heating, Ventilation, and Air Conditioning (HVAC)
    74. Drones
    75. Multifunction Printers (MFP)
    76. Real-Time Operating Systems (RTOS)
    77. Surveillance Systems
    78. System on a Chip (SoC)
    79. Communication Considerations
    80. Embedded System Constraints
    81. Chapter Review Activities
    82. Review Key Topics
    83. Define Key Terms
    84. Review Questions
    85. Chapter 15. Understanding the Importance of Physical Security Controls
    86. “Do I Know This Already?” Quiz
    87. Foundation Topics
    88. Bollards/Barricades
    89. Access Control Vestibules
    90. Badges
    91. Alarms
    92. Signage
    93. Cameras
    94. Closed-Circuit Television (CCTV)
    95. Industrial Camouflage
    96. Personnel
    97. Locks
    98. USB Data Blockers
    99. Lighting
    100. Fencing
    101. Fire Suppression
    102. Sensors
    103. Drones
    104. Visitor Logs
    105. Faraday Cages
    106. Air Gap
    107. Screened Subnet (Previously Known as Demilitarized Zone [DMZ])
    108. Protected Cable Distribution
    109. Secure Areas
    110. Secure Data Destruction
    111. Chapter Review Activities
    112. Review Key Topics
    113. Define Key Terms
    114. Review Questions
    115. Chapter 16. Summarizing the Basics of Cryptographic Concepts
    116. “Do I Know This Already?” Quiz
    117. Foundation Topics
    118. Digital Signatures
    119. Key Length
    120. Key Stretching
    121. Salting
    122. Hashing
    123. Key Exchange
    124. Elliptic-Curve Cryptography
    125. Perfect Forward Secrecy
    126. Quantum
    127. Post-Quantum
    128. Ephemeral
    129. Modes of Operation
    130. Blockchain
    131. Cipher Suites
    132. Symmetric vs. Asymmetric Encryption
    133. Lightweight Cryptography
    134. Steganography
    135. Homomorphic Encryption
    136. Common Use Cases
    137. Limitations
    138. Chapter Review Activities
    139. Review Key Topics
    140. Define Key Terms
    141. Review Questions
  16. Part III: Implementation
    1. Chapter 17. Implementing Secure Protocols
    2. “Do I Know This Already?” Quiz
    3. Foundation Topics
    4. Use Cases
    5. Chapter Review Activities
    6. Review Key Topics
    7. Define Key Terms
    8. Review Questions
    9. Chapter 18. Implementing Host or Application Security Solutions
    10. “Do I Know This Already?” Quiz
    11. Foundation Topics
    12. Endpoint Protection
    13. Antimalware
    14. Next-Generation Firewall
    15. Host-based Intrusion Prevention System
    16. Host-based Intrusion Detection System
    17. Host-based Firewall
    18. Boot Integrity
    19. Database
    20. Application Security
    21. Hardening
    22. Self-Encrypting Drive/Full-Disk Encryption
    23. Hardware Root of Trust
    24. Trusted Platform Module
    25. Sandboxing
    26. Chapter Review Activities
    27. Review Key Topics
    28. Define Key Terms
    29. Review Questions
    30. Chapter 19. Implementing Secure Network Designs
    31. “Do I Know This Already?” Quiz
    32. Foundation Topics
    33. Load Balancing
    34. Network Segmentation
    35. Virtual Private Network
    36. DNS
    37. Network Access Control
    38. Out-of-Band Management
    39. Port Security
    40. Network Appliances
    41. Access Control List
    42. Route Security
    43. Quality of Service
    44. Implications of IPv6
    45. Port Spanning/Port Mirroring
    46. Monitoring Services
    47. File Integrity Monitors
    48. Chapter Review Activities
    49. Review Key Topics
    50. Define Key Terms
    51. Review Questions
    52. Chapter 20. Installing and Configuring Wireless Security Settings
    53. “Do I Know This Already?” Quiz
    54. Foundation Topics
    55. Cryptographic Protocols
    56. Authentication Protocols
    57. Methods
    58. Installation Considerations
    59. Chapter Review Activities
    60. Review Key Topics
    61. Define Key Terms
    62. Review Questions
    63. Chapter 21. Implementing Secure Mobile Solutions
    64. “Do I Know This Already?” Quiz
    65. Foundation Topics
    66. Connection Methods and Receivers
    67. Mobile Device Management
    68. Mobile Device Management Enforcement and Monitoring
    69. Mobile Devices
    70. Deployment Models
    71. Chapter Review Activities
    72. Review Key Topics
    73. Define Key Terms
    74. Review Questions
    75. Chapter 22. Applying Cybersecurity Solutions to the Cloud
    76. “Do I Know This Already?” Quiz
    77. Foundation Topics
    78. Cloud Security Controls
    79. Solutions
    80. Cloud Native Controls vs. Third-Party Solutions
    81. Chapter Review Activities
    82. Review Key Topics
    83. Define Key Terms
    84. Review Questions
    85. Chapter 23. Implementing Identity and Account Management Controls
    86. “Do I Know This Already?” Quiz
    87. Foundation Topics
    88. Identity
    89. Account Types
    90. Account Policies
    91. Chapter Review Activities
    92. Review Key Topics
    93. Define Key Terms
    94. Review Questions
    95. Chapter 24. Implementing Authentication and Authorization Solutions
    96. “Do I Know This Already?” Quiz
    97. Foundation Topics
    98. Authentication Management
    99. Authentication/Authorization
    100. Access Control Schemes
    101. Chapter Review Activities
    102. Review Key Topics
    103. Define Key Terms
    104. Review Questions
    105. Chapter 25. Implementing Public Key Infrastructure
    106. “Do I Know This Already?” Quiz
    107. Foundation Topics
    108. Public Key Infrastructure
    109. Types of Certificates
    110. Certificate Formats
    111. PKI Concepts
    112. Chapter Review Activities
    113. Review Key Topics
    114. Define Key Terms
    115. Review Questions
  17. Part IV: Operations and Incident Response
    1. Chapter 26. Using the Appropriate Tool to Assess Organizational Security
    2. “Do I Know This Already?” Quiz
    3. Foundation Topics
    4. Network Reconnaissance and Discovery
    5. File Manipulation
    6. Shell and Script Environments
    7. Packet Capture and Replay
    8. Forensics
    9. Exploitation Frameworks
    10. Password Crackers
    11. Data Sanitization
    12. Chapter Review Activities
    13. Review Key Topics
    14. Define Key Terms
    15. Review Questions
    16. Chapter 27. Summarizing the Importance of Policies, Processes, and Procedures for Incident Response
    17. “Do I Know This Already?” Quiz
    18. Foundation Topics
    19. Incident Response Plans
    20. Incident Response Process
    21. Exercises
    22. Attack Frameworks
    23. Stakeholder Management
    24. Communication Plan
    25. Disaster Recovery Plan
    26. Business Continuity Plan
    27. Continuity of Operations Planning (COOP)
    28. Incident Response Team
    29. Retention Policies
    30. Chapter Review Activities
    31. Review Key Topics
    32. Define Key Terms
    33. Review Questions
    34. Chapter 28. Using Appropriate Data Sources to Support an Investigation
    35. “Do I Know This Already?” Quiz
    36. Foundation Topics
    37. Vulnerability Scan Output
    38. SIEM Dashboards
    39. Log Files
    40. syslog/rsyslog/syslog-ng
    41. journalctl
    42. NXLog
    43. Bandwidth Monitors
    44. Metadata
    45. NetFlow/sFlow
    46. Protocol Analyzer Output
    47. Chapter Review Activities
    48. Review Key Topics
    49. Define Key Terms
    50. Review Questions
    51. Chapter 29. Applying Mitigation Techniques or Controls to Secure an Environment
    52. “Do I Know This Already?” Quiz
    53. Foundation Topics
    54. Reconfigure Endpoint Security Solutions
    55. Configuration Changes
    56. Isolation
    57. Containment
    58. Segmentation
    59. SOAR
    60. Chapter Review Activities
    61. Review Key Topics
    62. Define Key Terms
    63. Review Questions
    64. Chapter 30. Understanding the Key Aspects of Digital Forensics
    65. “Do I Know This Already?” Quiz
    66. Foundation Topics
    67. Documentation/Evidence
    68. Acquisition
    69. On-premises vs. Cloud
    70. Integrity
    71. Preservation
    72. E-discovery
    73. Data Recovery
    74. Nonrepudiation
    75. Strategic Intelligence/Counterintelligence
    76. Chapter Review Activities
    77. Review Key Topics
    78. Define Key Terms
    79. Review Questions
  18. Part V: Governance, Risk, and Compliance
    1. Chapter 31. Comparing and contrasting the Various Types of Controls
    2. “Do I Know This Already?” Quiz
    3. Foundation Topics
    4. Control Category
    5. Control Types
    6. Chapter Review Activities
    7. Review Key Topics
    8. Define Key Terms
    9. Review Questions
    10. Chapter 32. Understanding the Importance of Applicable Regulations, Standards, or Frameworks That Impact Organizational Security Posture
    11. “Do I Know This Already?” Quiz
    12. Foundation Topics
    13. Regulations, Standards, and Legislation
    14. Key Frameworks
    15. Benchmarks and Secure Configuration Guides
    16. Chapter Review Activities
    17. Review Key Topics
    18. Define Key Terms
    19. Review Questions
    20. Chapter 33. Understanding the Importance of Policies to Organizational Security
    21. “Do I Know This Already?” Quiz
    22. Foundation Topics
    23. Personnel Policies
    24. Diversity of Training Techniques
    25. Third-Party Risk Management
    26. Data Concepts
    27. Credential Policies
    28. Organizational Policies
    29. Chapter Review Activities
    30. Review Key Topics
    31. Define Key Terms
    32. Review Questions
    33. Chapter 34. Summarizing Risk Management Processes and Concepts
    34. “Do I Know This Already?” Quiz
    35. Foundation Topics
    36. Risk Types
    37. Risk Management Strategies
    38. Risk Analysis
    39. Disaster Analysis
    40. Business Impact Analysis
    41. Chapter Review Activities
    42. Review Key Topics
    43. Define Key Terms
    44. Review Questions
    45. Chapter 35. Understanding Privacy and Sensitive Data Concepts in Relation to Security
    46. “Do I Know This Already?” Quiz
    47. Foundation Topics
    48. Organizational Consequences of Privacy and Data Breaches
    49. Notifications of Breaches
    50. Data Types and Asset Classification
    51. PII
    52. PHI
    53. Privacy Enhancing Technologies
    54. Roles and Responsibilities
    55. Information Lifecycle
    56. Impact Assessment
    57. Terms of Agreement
    58. Privacy Notice
    59. Chapter Review Activities
    60. Review Key Topics
    61. Define Key Terms
    62. Review Questions
  19. Part VI: Final Preparation
    1. Chapter 36. Final Preparation
    2. Hands-on Activities
    3. Suggested Plan for Final Review and Study
    4. Summary
  20. Glossary of Key Terms
  21. Appendix A. Answers to the “Do I Know This Already?” Quizzes and Review Questions
    1. Chapter 1
    2. Chapter 2
    3. Chapter 3
    4. Chapter 4
    5. Chapter 5
    6. Chapter 6
    7. Chapter 7
    8. Chapter 8
    9. Chapter 9
    10. Chapter 10
    11. Chapter 11
    12. Chapter 12
    13. Chapter 13
    14. Chapter 14
    15. Chapter 15
    16. Chapter 16
    17. Chapter 17
    18. Chapter 18
    19. Chapter 19
    20. Chapter 20
    21. Chapter 21
    22. Chapter 22
    23. Chapter 23
    24. Chapter 24
    25. Chapter 25
    26. Chapter 26
    27. Chapter 27
    28. Chapter 28
    29. Chapter 29
    30. Chapter 30
    31. Chapter 31
    32. Chapter 32
    33. Chapter 33
    34. Chapter 34
    35. Chapter 35
  22. Appendix B. CompTIA Security+ (SY0-601) Cert Guide Exam Updates
    1. Always Get the Latest at the Book’s Product Page
    2. Technical Content
  23. Index
  24. Appendix C. Study Planner
  25. Where are the companion content files? - Register
  26. Inside Front Cover
  27. Inside Back Cover
  28. Code Snippets
3.238.121.7