Use this quick start guide to collect all the information about CompTIA Security+ (SY0-401) certification exam. This study guide provides a list of objectives and resources that will help you prepare for items on the SY0-401 Security+ exam. The Sample Questions will help you identify the type and difficulty level of the questions and the Practice Exams will make you familiar with the format and environment of an exam. You should refer this guide carefully before attempting your actual CompTIA Security Plus certification exam.
The CompTIA Security+ certification is mainly targeted to those candidates who want to build their career in IT Security domain. The CompTIA Security+ exam verifies that the candidate possesses the fundamental knowledge and proven skills in the area of CompTIA Security Plus.
CompTIA Security+ Exam Summary:
Exam Name | CompTIA Security+ |
Exam Code | SY0-401 |
Exam Price | $330 (USD) |
Duration | 90 mins |
Number of Questions | 90 |
Passing Score | 750 / 900 |
Books / Training | CompTIA CertMaster for Security+ |
Schedule Exam | CompTIA Marketplace |
Sample Questions | CompTIA Security+ Sample Questions |
Practice Exam | CompTIA SY0-401 Certification Practice Exam |
CompTIA SY0-401 Exam Syllabus Topics:
Topic | Details |
---|---|
Network Security 20% |
|
Implement security configuration parameters on network devices and other technologies.
|
1. Firewalls 2. Routers 3. Switches 4. Load balancers 5. Proxies 6. Web security gateways 7. VPN concentrators 8. NIDS and NIPS
9. Protocol analyzers
10. Spam filter 11. UTM security appliances
12. Web application firewall vs. network firewall
13. Application aware devices
|
Given a scenario, use secure network administration principles. |
1. Rule-based management
2. Firewall rules
2. VLAN management
3. Secure router configuration
4. Access control lists
5. Port security
6. 802.1x
7. Flood guards
8. Loop protection
9. Implicit deny
10. Network separation
11. Log analysis
12. Unified threat management
|
Explain network design elements and components. |
1. DMZ 2. Subnetting 3. VLAN 4. NAT 5. Remote access 6. Telephony 7. NAC 8. Virtualization 9. Cloud computing
10. Layered security/defense in depth
|
Given a scenario, implement common protocols and services. |
1. Protocols
2. Ports
3. OSI relevance
|
Given a scenario, troubleshoot security issues related to wireless networking.
|
1. WPA
2. WPA2
3. WEP
4. EAP
5. PEAP
6. LEAP
7. MAC filter
8. Disable SSID broadcast
9. TKIP
10. CCMP
11. Antenna placement
12. Power level controls
13. Captive portals
14. Antenna types
15. Site surveys
16. VPN (over open wireless)
|
Compliance and Operational Security 18% |
|
Explain the importance of risk related concepts. |
1. Control types
2. False positives
3. False negatives 4. Importance of policies in reducing risk
Privacy policy
Acceptable use
Security policy
Mandatory vacations
Job rotation
Separation of duties
Least privilege
5. Risk calculation
6. Quantitative vs. qualitative
7. Vulnerabilities 8. Threat vectors 9. Probability/threat likelihood 10. Risk avoidance, transference, acceptance, mitigation, deterrence 11. Risks associated with cloud computing and virtualization 12. Recovery time objective and recovery point objective |
Summarize the security implications of integrating systems and data with third parties.
|
1. On-boarding/off-boarding business partners 2. Social media networks and/or applications 3. Interoperability agreements
4. Privacy considerations
5. Risk awareness
6. Unauthorized data sharing
7. Data ownership
8. Data backups
9. Follow security policy and procedures
10. Review agreement requirements to verify compliance and performance standards
|
Given a scenario, implement appropriate risk mitigation strategies. |
1. Change management
2. Incident management
3. User rights and permissions reviews
4. Perform routine audits
5. Enforce policies and procedures to prevent data loss or theft
6. Enforce technology controls
|
Given a scenario, implement basic forensic procedures. |
1. Order of volatility
2. Capture system image
3. Network traffic and logs
4. Capture video
5. Record time offset
6. Take hashes
7. Screenshots
8. Witnesses
9. Track man hours and expense
10. Chain of custody
11. Big Data analysis
|
Summarize common incident response procedures. |
1. Preparation
2. Incident identification
3. Escalation and notification
4. Mitigation steps
5. Lessons learned
6. Reporting
7. Recovery/reconstitution procedures 8. First responder 9. Incident isolation
10. Data breach
11. Damage and loss control |
Explain the importance of security related awareness and training. |
1. Security policy training and procedures 2. Role-based training 3. Personally identifiable information 4. Information classification
5. Data labeling, handling and disposal
6. Compliance with laws, best practices and standards 7. User habits
8. New threats and new security trends/alerts
9. Use of social networking and P2P
10. Follow up and gather training metrics to validate compliance and security posture |
Compare and contrast physical security and environmental controls. |
1. Environmental controls
2. Physical security
3. Control types
|
Summarize risk management best practices. |
1. Business continuity concepts
2. Fault tolerance
3. Disaster recovery concepts
|
Given a scenario, select the appropriate control to meet the goals of security.
|
1. Confidentiality
2. Integrity
3. Availability
4. Safety
|
Threats and Vulnerabilities 20% |
|
Explain types of malware. |
1. Adware
2. Virus
3. Spyware
4. Trojan
5. Rootkits
6. Backdoors
7. Logic bomb
8. Botnets
9. Ransomware
10. Polymorphic malware
11. Armored virus
|
Summarize various types of attacks. |
1. Man-in-the-middle
2. DDoS
3. DoS
4. Replay
5. Smurf attack
6. Spoofing
7. Spam
8. Phishing
9. Spim
10. Vishing
11. Spear phishing
12. Xmas attack
13. Pharming
14. Privilege escalation
15. Malicious insider threat
16. DNS poisoning and ARP poisoning
17 Transitive access
18. Client-side attacks
19. Password attacks
20. Typo squatting/URL hijacking
21. Watering hole attack |
Summarize social engineering attacks and the associated effectiveness with each attack.
|
1. Shoulder surfing
2. Dumpster diving
3. Tailgating
4. Impersonation
5. Hoaxes
6. Whaling 7. Vishing 8. Principles (reasons for effectiveness)
|
Explain types of wireless attacks. |
1. Rogue access points
2. Jamming/interference
3. Evil twin
4. War driving
5. Bluejacking
6. Bluesnarfing
7. War chalking
8. IV attack
9. Packet sniffing
10. Near field communication
11. Replay attacks
12. WEP/WPA attacks
13. WPS attacks
|
Explain types of application attacks. |
1. Cross-site scripting
2. SQL injection
3. LDAP injection
4. XML injection
5. Directory traversal/command injection
6. Buffer overflow
7. Integer overflow
8. Zero-day
9. Cookies and attachments
10. Locally Shared Objects (LSOs)
11. Flash cookies
12. Malicious add-ons
13. Session hijacking
14. Header manipulation
15. Arbitrary code execution/remote code execution
|
Analyze a scenario and select the appropriate type of mitigation and deterrent techniques.
|
1. Monitoring system logs
2. Hardening
3. Network security
4. Security posture
5. Reporting
6. Detection controls vs. prevention controls
|
Given a scenario, use appropriate tools and techniques to discover security threats and vulnerabilities.
|
1. Interpret results of security assessment tools 2. Tools
3. Risk calculations
4. Assessment types
5. Assessment technique
|
Explain the proper use of penetration testing versus vulnerability scanning.
|
1. Penetration testing
2. Vulnerability scanning
3. Black box
4. White box
5. Gray box
|
Application, Data and Host Security 15% |
|
Explain the importance of application security controls and techniques. |
1. Fuzzing 2. Secure coding concepts
3. Cross-site scripting prevention
4. Cross-site Request Forgery (XSRF) prevention
5. Application configuration baseline (proper settings)
6. Application hardening
7. Application patch management
8. NoSQL databases vs. SQL databases
9. Server-side vs. client-side validation
|
Summarize mobile security concepts and technologies. |
1. Device security
2. Application security
3. BYOD concerns
|
Given a scenario, select the appropriate solution to establish host security.
|
1. Operating system security and settings 2. OS hardening 3. Anti-malware
4. Patch management
5. Whitelisting vs. blacklisting applications
6. Trusted OS
7. Host-based firewalls
8. Host-based intrusion detection
9. Hardware security
10. Host software baselining
11. Virtualization
|
Implement the appropriate controls to ensure data security. |
1. Cloud storage
2. SAN
3. Handling Big Data
4. Data encryption
5. Hardware-based encryption devices
6. Data in transit, data at rest, data in use
7. Permissions/ACL
8. Data policies
|
Compare and contrast alternative methods to mitigate security risks in static environments.
|
1. Environments
2. Methods
|
Access Control and Identity Management 15% |
|
Compare and contrast the function and purpose of authentication services. |
1. RADIUS
2. TACACS+
3.Kerberos
4.LDAP
5. XTACACS
6. SAML
7. Secure LDAP
|
Given a scenario, select the appropriate authentication, authorization or access control.
|
1. Identification vs. authentication vs. authorization
2. Authorization
3. Authentication
4. Authentication factors
5. Identification
6. Federation
7. Transitive trust/authentication |
Install and configure security controls when performing account management, based on best practices.
|
1. Mitigate issues associated with users with multiple account/ roles and/or shared accounts 2. Account policy enforcement
3. Group-based privileges
4. User-assigned privileges
5. User access reviews
6. Continuous monitoring
|
Cryptography 12% |
|
Given a scenario, utilize general cryptography concepts. |
1. Symmetric vs. asymmetric
2. Session keys
3. In-band vs. out-of-band key exchange
4. Fundamental differences and encryption methods
5. Transport encryption
6. Non-repudiation
7. Hashing
8. Key escrow
9. Steganography
10. Digital signatures
11. Use of proven technologies
12. Elliptic curve and quantum cryptography
13. Ephemeral key
14. Perfect forward secrecy
|
Given a scenario, use appropriate cryptographic methods. |
1. WEP vs. WPA/WPA2 and pre-shared key
2. MD5
3. SHA
4. RIPEMD
5. AES
6. DES
7. 3DES
8. HMAC
9. RSA
10. Diffie-Hellman
11. RC4
12. One-time pads
13. NTLM
14. NTLMv2
15. Blowfish
16. PGP/GPG
17. Twofish
18. DHE
19. ECDHE
20. CHAP
21. PAP
22. Comparative strengths and performance of algorithms
23. Use of algorithms/protocols with transport encryption
24. Cipher suites
25. Key stretching
|
Given a scenario, use appropriate PKI, certificate management and associated components.
|
1. Certificate authorities and digital certificates
2. PKI
3. Recovery agent
4. Public key
5. Private key
6. Registration
7. Key escrow
8. Trust models
|
To ensure success in CompTIA Security Plus certification exam, we recommend authorized training course, practice test and hands-on experience to prepare for Security+ (SY0-401) exam.