Course Highlights
  • Fundamental Security Concepts
  • Navigating Threats, Vulnerabilities, & Remedies
  • Decoding Security Architecture
  • Mastering Security Operations
  • Guiding Security Program Management & Oversight
Curriculum

4 Topics
Welcome to the Course!
Download the Study Guide
Exam Tips
Checkpoint: Introduction

14 Topics
Fundamentals of Security
Threats and Vulnerabilities
Confidentiality (OBJ 1.2)
Integrity (OBJ 1.2)
Availability (OBJ 1.2)
Non-repudiation (OBJ 1.2)
Authentication (OBJ 1.2)
Authorization (OBJ 1.2)
Accounting (OBJ 1.2)
Security Control Categories (OBJ 1.1)
Security Control Types (OBJ 1.1)
Gap Analysis (OBJ 1.1)
Zero Trust (OBJ 1.2)
Checkpoint: Fundamentals of Security

12 Topics
Threat Actors (OBJ 1.2 2.1 & 2.2)
Threat Actor Motivations (OBJ 2.1)
Threat Actor Attributes (OBJ 2.1)
Unskilled Attackers (OBJ 2.1)
Hacktivists (OBJ 2.1)
Organized Crime (OBJ 2.1)
Nation-state Actor (OBJ 2.1)
Insider Threats (OBJ 2.1)
Shadow IT (OBJ 2.1)
Threat Vectors and Attack Surfaces (OBJ 2.2)
Outsmarting Threat Actors (OBJ 1.2)
Checkpoint: Threat Actors

9 Topics
Physical Security (OBJ 1.2 & 2.4)
Fencing and Bollards (OBJ 1.2)
Attacking with Brute Force (OBJ 2.4)
Surveillance Systems (OBJ 1.2)
Bypassing Surveillance Systems (OBJ 2.4)
Access Control Vestibules (OBJ 1.2)
Door Locks (OBJ 1.2)
Access Badge Cloning (OBJ 2.4)
Checkpoint: Physical Security

11 Topics
Social Engineering (OBJ 2.2 & 5.6)
Motivational Triggers (OBJ 5.6)
Impersonation (OBJ 2.2)
Pretexting (OBJ 2.2)
Phishing Attacks (OBJ 2.2)
Preventing Phishing Attacks (OBJ 5.6)
Conducting an Anti-Phishing Campaign (OBJ 5.6)
Frauds and Scams (OBJ 2.2)
Influence Campaigns (OBJ 2.2)
Other Social Engineering Attacks (OBJ 2.2)
Checkpoint: Social Engineering

14 Topics
Malware (OBJ 2.4)
Viruses (OBJ 2.4)
Worms (OBJ 2.4)
Trojans (OBJ 2.4)
Viruses and Trojans (OBJ 2.4)
Ransomware (OBJ 2.4)
Zombies and Botnets (OBJ 2.4)
Rootkits (OBJ 2.4)
Backdoors and Logic Bombs (OBJ 2.4)
Keylogger (OBJ 2.4)
Spyware and Bloatware (OBJ 2.4)
Malware Attack Techniques (OBJ 2.4)
Indications of Malware Attacks (OBJ 2.4)
Checkpoint: Malware

10 Topics
Data Protection (OBJ 1.4 3.3 4.2 4.4 & 5.1)
Data Classifications (OBJ 3.3)
Data Ownership (OBJ 4.2 & 5.1)
Data States (OBJ 3.3)
Data Types (OBJ 3.3 & 1.4)
Data Sovereignty (OBJ 3.3)
Securing Data (OBJ 3.3)
Data Loss Prevention (DLP) (OBJ 4.4)
Configuring a DLP (OBJ 4.5)
Checkpoint: Data Protection

14 Topics
Cryptographic Solutions (OBJ 1.4 2.3 & 2.4)
Symmetric vs Asymmetric (OBJ 1.4)
Symmetric Algorithms (OBJ 1.4)
Asymmetric Algorithms (OBJ 1.4)
Hashing (OBJ 1.4)
Increasing Hash Security (OBJ 1.4)
Public Key Infrastructure (PKI) (OBJ 1.4)
Digital Certificates (OBJ 1.4)
Exploring Digital Certificates (OBJ 1.4)
Blockchain (OBJ 1.4)
Encryption Tools (OBJ 1.4)
Obfuscation (OBJ 1.4)
Cryptographic Attacks (OBJ 2.3 & 2.4)
Checkpoint: Cryptographic Solutions

9 Topics
Risk Management (OBJ 5.2)
Risk Assessment Frequency (OBJ 5.2)
Risk Identification (OBJ 5.2)
Risk Register (OBJ 5.2)
Qualitative Risk Analysis (OBJ 5.2)
Quantitative Risk Analysis (OBJ 5.2)
Risk Management Strategies (OBJ 5.2)
Risk Monitoring and Reporting (OBJ 5.2)
Checkpoint: Risk Management

7 Topics
Third-party Vendor Risks (OBJ 2.2 2.3 & 5.3)
Supply Chain Risks (OBJ 2.3 & 5.3)
Supply Chain Attacks (OBJ 2.2 & 5.3)
Vendor Assessment (OBJ 5.3)
Vendor Selection and Monitoring (OBJ 5.3)
Contracts and Agreements (OBJ 5.3)
Checkpoint: Third-party Vendor Risks

10 Topics
Governance and Compliance (OBJ 5.1 & 5.4)
Governance (OBJ 5.1)
Governance Structures (OBJ 5.1)
Policies (OBJ 5.1)
Standards (OBJ 5.1)
Procedures (OBJ 5.1)
Governance Considerations (OBJ 5.1)
Compliance (OBJ 5.4)
Non-compliance Consequences (OBJ 5.4)
Checkpoint: Governance and Compliance

10 Topics
Asset and Change Management (OBJ 1.3 4.1 & 4.2)
Acquisition and Procurement (OBJ 4.2)
Mobile Asset Deployments (OBJ 4.1)
Asset Management (OBJ 4.2)
Asset Disposal and Decommissioning (OBJ 4.2)
Change Management (OBJ 1.3)
Change Management Processes (OBJ 1.3)
Technical Implications of Changes (OBJ 1.3)
Documenting Changes (OBJ 1.3)
Checkpoint: Asset and Change Management

10 Topics
Audits and Assessments (OBJ 5.5)
Internal Audits and Assessments (OBJ 5.5)
Performing an Internal Assessment (OBJ 5.5)
External Audits and Assessments (OBJ 5.5)
Performing an External Assessment (OBJ 5.5)
Penetration Testing (OBJ 5.5)
Reconnaissance in Pentesting (OBJ 5.5)
Performing a Basic PenTest (OBJ 5.5)
Attestation of Findings (OBJ 5.5)
Checkpoint: Audits and Assessments

11 Topics
Cyber Resilience and Redundancy (OBJ 3.4)
High Availability (OBJ 3.4)
Data Redundancy (OBJ 3.4)
Configuring a RAID (OBJ 3.4)
Capacity Planning (OBJ 3.4)
Powering Data Centers (OBJ 3.4)
Data Backups (OBJ 3.4)
Continuity of Operations Plan (OBJ 3.4)
Redundant Site Considerations (OBJ 3.4)
Resilience and Recovery Testing (OBJ 3.4)
Checkpoint: Cyber Resilience and Redundancy

14 Topics
Security Architecture (OBJ 3.1 & 4.1)
On-premise versus the Cloud (OBJ 3.1)
Cloud Security (OBJ 3.1 & 4.1)
Virtualization and Containerization (OBJ 2.3 & 3.1)
Serverless (OBJ 3.1)
Microservices (OBJ 3.1)
Network Infrastructure (OBJ 3.1)
Software-Defined Network (SDN) (OBJ 3.1)
Infrastructure as Code (IaC) (OBJ 3.1)
Centralized vs Decentralized Architectures (OBJ 3.1)
Internet of Things (IoT) (OBJ 3.1 & 4.1)
ICS and SCADA (OBJ 3.1 & 4.1)
Embedded Systems (OBJ 3.1 & 4.1)
Checkpoint: Security Architecture

12 Topics
Security Infrastructure (OBJ 3.2 & 4.5)
Ports and Protocols (OBJ 4.5)
Firewalls (OBJ 3.2)
Configuring Firewalls (OBJ 4.5)
IDS and IPS (OBJ 3.2)
Network Appliances (OBJ 3.2)
Port Security (OBJ 3.2)
Securing Network Communications (OBJ 3.2)
SD-WAN and SASE (OBJ 3.2)
Infrastructure Considerations (OBJ 3.2)
Selecting Infrastructure Controls (OBJ 3.2)
Checkpoint: Security Infrastructure

11 Topics
Identity and Access Management (IAM) Solutions (OBJ 2.4 & 4.6)
Identity and Access Management (IAM) (OBJ 4.6)
Multifactor Authentication (OBJ 4.6)
Password Security (OBJ 4.6)
Password Attacks (OBJ 2.4)
Single Sign-On (SSO) (OBJ 4.6)
Federation (OBJ 4.6)
Privileged Access Management (PAM) (OBJ 4.6)
Access Control Models (OBJ 4.6)
Assigning Permissions (OBJ 4.6)
Checkpoint: Identity and Access Management (IAM) Solutions

12 Topics
Vulnerabilities and Attacks (OBJ 2.2 2.3 2.4 2.5 & 4.1)
Hardware Vulnerabilities (OBJ 2.2 2.3 & 2.5)
Bluetooth Vulnerabilities and Attacks (OBJ 2.3 2.5 & 4.1)
Mobile Vulnerabilities and Attacks (OBJ 2.3 2.5 & 4.1)
Zero-day Vulnerabilities (OBJ 2.3)
Operating System Vulnerabilities (OBJ 2.3 & 2.5)
SQL and XML Injections (OBJ 2.3 & 2.4)
Conducting an SQL Injection (OBJ 2.3 & 2.4)
XSS and XSRF (OBJ 2.3 & 2.4)
Buffer Overflow (OBJ 2.3 & 2.4)
Race Conditions (OBJ 2.3)
Checkpoint: Vulnerabilities and Attacks

11 Topics
Malicious Activity (OBJ 2.4)
Distributed Denial of Service (OBJ 2.4)
Domain Name System (DNS) Attacks (OBJ 2.4)
Directory Traversal Attack (OBJ 2.4)
Execution and Escalation Attack (OBJ 2.4)
Replay Attacks (OBJ 2.4)
Session Hijacking (OBJ 2.4)
On-Path Attacks
Injection Attacks
Indicators of Compromise (IoC)
Checkpoint: Malicious Activity

12 Topics
Hardening (OBJ 2.5 4.1 & 4.5)
Changing Default Configurations (OBJ 2.5)
Restricting Applications (OBJ 2.5)
Unnecessary Services (OBJ 2.5)
Trusted Operating Systems (OBJ 2.5)
Updates and Patches (OBJ 2.5)
Patch Management (OBJ 2.5)
Group Policies (OBJ 2.5 & 4.5)
SELinux (OBJ 2.5 & 4.5)
Data Encryption Levels (2.5)
Secure Baselines (OBJ 2.5 and 4.1)
Checkpoint: Hardening

11 Topics
Security Techniques (OBJ 4.1 & 4.5)
Wireless Infrastructure Security (OBJ 4.1)
Wireless Security Settings (OBJ 4.1)
Application Security (OBJ 4.1)
Network Access Control (NAC) (OBJ 4.5)
Web and DNS Filtering (OBJ 4.5)
Email Security (OBJ 4.5)
Endpoint Detection and Response (OBJ 4.5)
User Behavior Analytics (OBJ 4.5)
Selecting Secure Protocols (OBJ 4.5)
Checkpoint: Security Techniques

11 Topics
Vulnerability Management (OBJ 4.3)
Identifying Vulnerabilities (OBJ 4.3)
Threat Intelligence Feeds (OBJ 4.3)
Responsible Disclosure Programs (OBJ 4.3)
Analyzing Vulnerabilities (OBJ 4.3)
Conducting Vulnerability Scans (OBJ 4.3)
Assessing Vulnerability Scan Results (OBJ 4.3)
Vulnerability Response and Remediation (OBJ 4.3)
Validating Vulnerability Remediation (OBJ 4.3)
Vulnerability Reporting (OBJ 4.3)
Checkpoint: Vulnerability Management

10 Topics
Alerting and Monitoring (OBJ 4.4)
Monitoring Resources (OBJ 4.4)
Alerting and Monitoring Activities (OBJ 4.4)
Simple Network Management Protocol (SNMP) (OBJ 4.4)
Security Information and Event Management (SIEM) (OBJ 4.4)
Data from Security Tools (OBJ 4.4)
Security Content Automation and Protocol (SCAP) (OBJ 4.4)
NetFlow and Flow Analysis
Single Pane of Glass (OBJ 4.4)
Checkpoint: Alerting and Monitoring

9 Topics
Incident Response (OBJ 4.8)
Incident Response Process (OBJ 4.8)
Threat Hunting (OBJ 4.8)
Root Cause Analysis (OBJ 4.8)
Incident Response Training and Testing (OBJ 4.8)
Digital Forensic Procedures (OBJ 4.8)
Data Collection Procedures (OBJ 4.8)
Disk Imaging and Analysis (OBJ 4.8)
Checkpoint: Incident Response

14 Topics
Investigating an Incident (OBJ 4.9)
Investigating with Data (OBJ 4.9)
Dashboards (OBJ 4.9)
Automated Reports (OBJ 4.9)
Vulnerability Scans (OBJ 4.9)
Packet Captures (OBJ 4.9)
Firewall Logs (OBJ 4.9)
Application Logs (OBJ 4.9)
Endpoint Logs (OBJ 4.9)
OS-specific Security Logs (OBJ 4.9)
IPS/IDS Logs (OBJ 4.9)
Network Logs (OBJ 4.9)
Metadata (OBJ 4.9)
Checkpoint: Investigating an Incident

9 Topics
Automation and Orchestration (OBJ 4.7)
When to Automate and Orchestrate (OBJ 4.7)
Benefits of Automation and Orchestratation (OBJ 4.7)
Automating Support Tickets (OBJ 4.7)
Automating Onboarding (OBJ 4.7)
Automating Security (OBJ 4.7)
Automating Application Development (OBJ 4.7)
Integrations and APIs (OBJ 4.7)
Checkpoint: Automation and Orchestration

8 Topics
Security Awareness (OBJ 5.6)
Recognizing Insider Threats (OBJ 5.6)
Password Management (OBJ 5.6)
Avoiding Social Engineering (OBJ 5.6)
Policy and Handbooks (OBJ 5.6)
Remote and Hybrid Work Environments (OBJ 5.6)
Creating a Culture of Security (OBJ 5.6)
Checkpoint: Security Awareness

2 Topics
Conclusion
BONUS: Where do I go from here?

1 Topic
CompTIA Security+ (SY0-701)

  Write a Review

CompTIA Security+ (SY0-701) Complete Course & Exam

Go to Paid Course