CompTIA Security+


CompTIA Security+ TRAINING

CompTIA Security+ is a global certification that validates the baseline skills you need to perform core security functions and pursue an IT security career.

Threats, Attacks and Vulnerabilities 21%

Given a scenario, analyze indicators of compromise
and determine the type of malware.

1. Viruses
2. Crypto-malware
3. Ransomware
4. Worm
5. Trojan
6. Rootkit
7. Keylogger
8. Adware
9. Spyware
10. Bots
11. RAT
12. Logic bomb
13. Backdoor

Compare and contrast types of attacks.

1. Social engineering
Phishing
Spear phishing
Whaling
Vishing
Tailgating
Impersonation
Dumpster diving
Shoulder surfing
Hoax
Watering hole attack
Principles (reasons for effectiveness)
Authority
Intimidation
Consensus
Scarcity
Familiarity
Trust
Urgency

2. Application/service attacks

DoS
DDoS
Man-in-the-middle
Buffer overflow
Injection
Cross-site scripting
Cross-site request forgery
Privilege escalation
ARP poisoning
Amplification
DNS poisoning
Domain hijacking
Man-in-the-browser
Zero day
Replay
Pass the hash
Hijacking and related attacks
Clickjacking
Session hijacking
URL hijacking
Typo squatting
Driver manipulation
Shimming
Refactoring
MAC spoofing
IP spoofing
3. Wireless attacks
Replay
IV
Evil twin
Rogue AP
Jamming
WPS
Bluejacking
Bluesnarfing
RFID
NFC
Disassociation

4. Cryptographic attacks

Birthday
Known plain text/cipher text
Rainbow tables
Dictionary
Brute force
Online vs. offline
Collision
Downgrade
Replay
Weak implementations
Explain threat actor types and attributes. 1. Types of actors
Script kiddies
Hacktivist
Organized crime
Nation states/APT
Insiders
Competitors

2. Attributes of actors

Internal/external
Level of sophistication
Resources/funding
Intent/motivation

 

3. Use of open-source intelligence

 

Explain penetration testing concepts. 1. Active reconnaissance
2. Passive reconnaissance
3. Pivot
4. Initial exploitation
5. Persistence
6. Escalation of privilege
7. Black box
8. White box
9. Gray box

10. Penetration testing vs. vulnerability scanning

 

Explain vulnerability scanning concepts.

 

1.Passively test security controls
2. Identify vulnerability
3. Identify lack of security controls
4. Identify common misconfigurations
5. Intrusive vs. non-intrusive
6. Credentialed vs. non-credentialed
7. False positive

Explain the impact associated with types of vulnerabilities.

 

1. Race conditions

2. Vulnerabilities due to:
End-of-life systems
Embedded systems
Lack of vendor support
3. Improper input handling
4. Improper error handling
5. Misconfiguration/weak configuration
6. Default configuration
7. Resource exhaustion
8. Untrained users
9. Improperly configured accounts
10. Vulnerable business processes
11. Weak cipher suites and implementations
12. Memory/buffer vulnerability

 

Memory leak

Integer overflow
Buffer overflow
Pointer dereference
DLL injection

13. System sprawl/undocumented assets
14. Architecture/design weaknesses
15. New threats/zero day
16. Improper certificate and key management

 

Technologies and Tools 22%

 

Install and configure network components, both hardware and software-based, to support organizational security.
1. Firewall

ACL
Application-based vs. network-based
Stateful vs. stateless
Implicit deny

2. VPN concentrator

Remote access vs. site-to-site
IPSec
Tunnel mode
Transport mode
AH
ESP
Split tunnel vs. full tunnel
TLS
Always-on VPN

3. NIPS/NIDS

Signature-based
Heuristic/behavioral
Anomaly
Inline vs. passive
In-band vs. out-of-band
Rules
Analytics
False positive
False negative

4. Router

ACLs
Antispoofing
?

5. Switch

Port security
Layer 2 vs. Layer 3
Loop prevention
Flood guard

6. Proxy

Forward and reverse proxy
Transparent
Application/multipurpose

7. Load balancer

Scheduling
Affinity
Round-robin
Active-passive
Active-active
Virtual IPs

8. Access point

SSID
MAC filtering
Signal strength
Band selection/width
Antenna types and placement
Fat vs. thin
Controller-based vs. standalone

9. SIEM

Aggregation
Correlation
Automated alerting and triggers
Time synchronization
Event deduplication
Logs/WORM

10. DLP

USB blocking
Cloud-based
Email

11. NAC

Dissolvable vs. permanent
Host health checks
Agent vs. agentless

12. Mail gateway

Spam filter
DLP
Encryption
13. Bridge
14. SSL/TLS accelerators
15. SSL decryptors
16. Media gateway
17. Hardware security module

 

Given a scenario, use appropriate software tools to assess the security posture of an organization.

 

1. Protocol analyzer
2. Network scanners

Rogue system detection
Network mapping
3. Wireless scanners/cracker
4. Password cracker
5. Vulnerability scanner
6. Configuration compliance scanner
7. Exploitation frameworks
8. Data sanitization tools
9. Steganography tools
10. Honeypot
11. Backup utilities
12. Banner grabbing
13. Passive vs. active
14. Command line tools

ping
netstat
tracert
nslookup/dig
arp
ipconfig/ip/ifconfig
tcpdump
nmap
netcat

Given a scenario, troubleshoot common security issues.

1. Unencrypted credentials/clear text
2. Logs and events anomalies
3. Permission issues
4. Access violations
5. Certificate issues
6. Data exfiltration
7. Misconfigured devices
Firewall
Content filter
Access points
8. Weak security configurations
9. Personnel issues

Policy violation
Insider threat
Social engineering
Social media
Personal email
10. Unauthorized software
11. Baseline deviation
12. License compliance violation (availability/integrity)
13. Asset management
14. Authentication issues

Given a scenario, analyze and interpret output from security technologies.

1. HIDS/HIPS
2. Antivirus
3. File integrity check
4. Host-based firewall
5. Application whitelisting
6. Removable media control
7. Advanced malware tools
8. Patch management tools
9. UTM
10. DLP
11. Data execution prevention
12. Web application firewall

Given a scenario, deploy mobile devices securely.

1. Connection methods
Cellular
WiFi
SATCOM
Bluetooth
NFC
ANT
Infrared
USB

2. Mobile device management concepts

Application management
Content management
Remote wipe
Geofencing
Geolocation
Screen locks
Push notification services
Passwords and pins
Biometrics
Context-aware authentication
Containerization
Storage segmentation
Full device encryption

3. Enforcement and monitoring for:

Third-party app stores
Rooting/jailbreaking
Sideloading
Custom firmware
Carrier unlocking
Firmware OTA updates
Camera use
SMS/MMS
External media
USB OTG
Recording microphone
GPS tagging
WiFi direct/ad hoc
Tethering
Payment methods

4. Deployment models

BYOD
COPE
CYOD
Corporate-owned
VDI
Given a scenario, implement secure protocols. 1. Protocols
DNSSEC
SSH
S/MIME
SRTP
LDAPS
FTPS
SFTP
SNMPv3
SSL/TLS
HTTPS
Secure POP/IMAP

2. Use cases

Voice and video
Time synchronization
Email and web
File transfer
Directory services
Remote access
Domain name resolution
Routing and switching
Network address allocation
Subscription services
Architecture and Design 15%
Explain use cases and purpose for frameworks, best practices and secure configuration guides. 1. Industry-standard frameworks and reference architectures
Regulatory
Non-regulatory
National vs. international
Industry-specific frameworks

2. Benchmarks/secure configuration guides

Platform/vendor-specific guides
Web server
Operating system
Application server
Network infrastructure devices
General purpose guides

3. Defense-in-depth/layered security

Vendor diversity
Control diversity
Administrative
Technical
User training
Given a scenario, implement secure network architecture concepts. 1. Zones/topologies
DMZ
Extranet
Intranet
Wireless
Guest
Honeynets
NAT
Ad hoc

2. Segregation/segmentation/isolation

Physical
Logical (VLAN)
Virtualization
Air gaps

3. Tunneling/VPN

Site-to-site
Remote access

4. Security device/technology placement

Sensors
Collectors
Correlation engines
Filters
Proxies
Firewalls
VPN concentrators
SSL accelerators
Load balancers
DDoS mitigator
Aggregation switches
Taps and port mirror

5. SDN

Given a scenario, implement secure systems design.

1. Hardware/firmware security
FDE/SED
TPM
HSM
UEFI/BIOS
Secure boot and attestation
Supply chain
Hardware root of trust
EMI/EMP

2. Operating systems

Types
Network
Server
Workstation
Appliance
Kiosk
Mobile OS
Patch management
Disabling unnecessary ports and services
Least functionality
Secure configurations
Trusted operating system
Application whitelisting/blacklisting
Disable default accounts/passwords

3. Peripherals

Wireless keyboards
Wireless mice
Displays
WiFi-enabled MicroSD cards
Printers/MFDs
External storage devices
Digital cameras

Explain the importance of secure staging deployment concepts.

1. Sandboxing
2. Environment
Development
Test
Staging
Production
3. Secure baseline
Integrity measurement

Explain the security implications of embedded systems.

1. SCADA/ICS
2. Smart devices/IoT
Wearable technology
Home automation
3. HVAC
4. SoC
5. RTOS
6. Printers/MFDs
7. Camera systems
8. Special purpose

Medical devices
Vehicles
Aircraft/UAV

Summarize secure application development and deployment concepts.

1. Development life-cycle models
Waterfall vs. Agile
2. Secure DevOps

Security automation
Continuous integration
Baselining
Immutable systems
Infrastructure as code
3. Version control and change management
4. Provisioning and deprovisioning
5. Secure coding techniques

Proper error handling
Proper input validation
Normalization
Stored procedures
Code signing
Encryption
Obfuscation/camouflage
Code reuse/dead code
Server-side vs. client-side execution and validation
Memory management
Use of third-party libraries and SDKs
Data exposure

6. Code quality and testing

Static code analyzers
Dynamic analysis (e.g., fuzzing)
Stress testing
Sandboxing
Model verification

7. Compiled vs. runtime code

Summarize cloud and virtualization concepts.

1. Hypervisor
Type I
Type II
Application cells/containers
2. VM sprawl avoidance
3. VM escape protection
4. Cloud storage
5. Cloud deployment models

SaaS
PaaS
IaaS
Private
Public
Hybrid
Community
6. On-premise vs. hosted vs. cloud
7. VDI/VDE
8. Cloud access security broker
9. Security as a Service

Explain how resiliency and automation strategies reduce risk.

1. Automation/scripting
Automated courses of action
Continuous monitoring
Configuration validation
2. Templates
3. Master image
4. Non-persistence

Snapshots
Revert to known state
Rollback to known configuration
Live boot media
5. Elasticity
6. Scalability
7. Distributive allocation
8. Redundancy
9. Fault tolerance
10. High availability
11. RAID

Explain the importance of physical security controls.

1. Lighting
2. Signs
3. Fencing/gate/cage
4. Security guards
5. Alarms
6. Safe
7. Secure cabinets/enclosures
8. Protected distribution/Protected cabling
9. Airgap
10. Mantrap
11. Faraday cage
12. Lock types
13. Biometrics
14. Barricades/bollards
15. Tokens/cards
16. Environmental controls
HVAC
Hot and cold aisles
Fire suppression
17. Cable locks
18. Screen filters
19. Cameras
20. Motion detection
21. Logs
22. Infrared detection
23. Key management

Identity and Access Management 16%

Compare and contrast identity and access management concepts

1. Identification, authentication, authorization and accounting (AAA)
2. Multifactor authentication
Something you are
Something you have
Something you know
Somewhere you are
Something you do
3. Federation
4. Single sign-on
5. Transitive trust

Given a scenario, install and configure identity and access services.

1. LDAP
2. Kerberos
3. TACACS+
4. CHAP
5. PAP
6. MSCHAP
7. RADIUS
8. SAML
9. OpenID Connect
10. OAUTH
11. Shibboleth
12. Secure token
13. NTLM

Given a scenario, implement identity and access management controls.

 

1. Access control models
MAC
DAC
ABAC
Role-based access control
Rule-based access control

2. Physical access control

Proximity cards
Smart cards

3. Biometric factors

Fingerprint scanner
Retinal scanner
Iris scanner
Voice recognition
Facial recognition
False acceptance rate
False rejection rate
Crossover error rate

4. Tokens

Hardware
Software
HOTP/TOTP

5. Certificate-based authentication

PIV/CAC/smart card
IEEE 802.1x

6. File system security
7. Database security

 

Given a scenario, differentiate common account management practices.

1. Account types

User account
Shared and generic accounts/credentials
Guest accounts
Service accounts
Privileged accounts

2. General Concepts

Least privilege
Onboarding/offboarding
Permission auditing and review
Usage auditing and review
Time-of-day restrictions
Recertification
Standard naming convention
Account maintenance
Group-based access control
Location-based policies

3. Account policy enforcement

Credential management
Group policy
Password complexity
Expiration
Recovery
Disablement
Lockout
Password history
Password reuse
Password length

Risk Management 14%

Explain the importance of policies, plans and procedures related to organizational security

1. Standard operating procedure

2. Agreement types
BPA
SLA
ISA
MOU/MOA

3. Personnel management

Mandatory vacations
Job rotation
Separation of duties
Clean desk
Background checks
Exit interviews
Role-based awareness training
Data owner
System administrator
System owner
User
Privileged user
Executive user
NDA
Onboarding
Continuing education
Acceptable use policy/rules of behavior
Adverse actions

4. General security policies

Social media networks/applications
Personal email
Summarize business impact analysis concepts.

1. RTO/RPO
2. MTBF
3. MTTR
4. Mission-essential functions
5. Identification of critical systems
6. Single point of failure
7. Impact
Life
Property
Safety
Finance
Reputation
8. Privacy impact assessment
9. Privacy threshold assessment

Explain risk management processes and concepts.

1. Threat assessment
Environmental
Manmade
Internal vs. external
2. Risk assessment

SLE
ALE
ARO
Asset value
Risk register
Likelihood of occurrence
Supply chain assessment
Impact
Quantitative
Qualitative
Testing
Penetration testing authorization
Vulnerability testing authorization
Risk response techniques
Accept
Transfer
Avoid
Mitigate

3. Change management

Given a scenario, follow incident response procedures. 1. Incident response plan
Documented incident types/category definitions
Roles and responsibilities
Reporting requirements/escalation
Cyber-incident response teams
Exercise

2. Incident response process

Preparation
Identification
Containment
Eradication
Recovery
Lessons learned

Summarize basic concepts of forensics.

1. Order of volatility
2. Chain of custody
3. Legal hold
4. Data acquisition
Capture system image
Network traffic and logs
Capture video
Record time offset
Take hashes
Screenshots
Witness interviews
5. Preservation
6. Recovery
7. Strategic intelligence/ counterintelligence gathering

Active logging

8. Track man-hours

Explain disaster recovery and continuity of operation concepts.

1. Recovery sites
Hot site
Warm site
Cold site
2. Order of restoration
3. Backup concepts

Differential
Incremental
Snapshots
Full

4. Geographic considerations

Off-site backups
Distance
Location selection
Legal implications
Data sovereignty

5. Continuity of operation planning

Exercises/tabletop
After-action reports
Failover
Alternate processing sites
Alternate business practices
Compare and contrast various types of controls. 1. Deterrent
2. Preventive
3. Detective
4. Corrective
5. Compensating
6. Technical
7. Administrative
8. Physical

Given a scenario, carry out data security and privacy practices.

1. Data destruction and media sanitization

Burning
Shredding
Pulping
Pulverizing
Degaussing
Purging
Wiping

2. Data sensitivity labeling and handling

Confidential
Private
Public
Proprietary
PII
PHI

3. Data roles

Owner
Steward/custodian
Privacy officer
4. Data retention
5. Legal and compliance

Cryptography and PKI 12%

Compare and contrast basic concepts of cryptography.

1. Symmetric algorithms
2. Modes of operation
3. Asymmetric algorithms
4. Hashing
5. Salt, IV, nonce
6. Elliptic curve
7. Weak/deprecated algorithms
8. Key exchange
9. Digital signatures
10. Diffusion
11. Confusion
12. Collision
13. Steganography
14. Obfuscation
15. Stream vs. block
16. Key strength
17. Session keys
18. Ephemeral key
19. Secret algorithm
20. Data-in-transit
21. Data-at-rest
22. Data-in-use
23. Random/pseudo-random number generation
24. Key stretching
25. Implementation vs. algorithm selection
Crypto service provider
Crypto modules
26. Perfect forward secrecy
27. Security through obscurity
28. Common use cases

Low power devices

Low latency
High resiliency
Supporting confidentiality
Supporting integrity
Supporting obfuscation
Supporting authentication
Supporting non-repudiation
Resource vs. security constraints
Explain cryptography algorithms and their basic characteristics. 1. Symmetric algorithms
AES
DES
3DES
RC4
Blowfish/Twofish

2. Cipher modes

CBC
GCM
ECB
CTR
Stream vs. block

3. Asymmetric algorithms

RSA
DSA
Diffie-Hellman
Groups
DHE
ECDHE
Elliptic curve
PGP/GPG
4. Hashing algorithms

MD5
SHA
HMAC
RIPEMD
5. Key stretching algorithms

BCRYPT
PBKDF2

6. Obfuscation

XOR
ROT13
Substitution ciphers

Given a scenario, install and configure wireless security settings.

1. Cryptographic protocols
WPA
WPA2
CCMP
TKIP

2. Authentication protocols

EAP
PEAP
EAP-FAST
EAP-TLS
EAP-TTLS
IEEE 802.1x
RADIUS Federation

3. Methods

PSK vs. Enterprise vs. Open
WPS
Captive portals

Given a scenario, implement public key infrastructure.

1. Components
CA
Intermediate CA
CRL
OCSP
CSR
Certificate
Public key
Private key
Object identifiers (OID)

2. Concepts

Online vs. offline CA
Stapling
Pinning
Trust model
Key escrow
Certificate chaining

3. Types of certificates

Wildcard
SAN
Code signing
Self-signed
Machine/computer
Email
User
Root
Domain validation
Extended validation

4. Certificate formats

DER
PEM
PFX
CER
P12
P7B

Advertisement