Book description
Learn, prepare, and practice for CompTIA Security+ SY0-601 exam success with this CompTIA Security+ SY0-601 Cert Guide from Pearson IT Certification, a leader in IT certification learning.
Related Content
Video: CompTIA Security+ SY0-601
Live Courses: CompTIA Security + SY0-601 Crash Course
CompTIA Security+ SY0-601 Cert Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. Do I Know This Already? quizzes open each chapter and enable you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly.
CompTIA Security+ SY0-601 Cert Guide focuses specifically on the objectives for the CompTIA Security+ SY0-601 exam. Leading security experts Omar Santos, Ron Taylor, and Joseph Mlodzianowski share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.
This complete study package includes* A test-preparation routine proven to help you pass the exams* Do I Know This Already? quizzes, which allow you to decide how much time you need to spend on each section* Chapter-ending exercises, which help you drill on key concepts you must know thoroughly* An online interactive Flash Cards application to help you drill on Key Terms by chapter* A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies* Study plan suggestions and templates to help you organize and optimize your study time Well regarded for its level of detail, assessment features, and challenging review questions and exercises, this official study guide helps you master the concepts and techniques that ensure your exam success.
This study guide helps you master all the topics on the CompTIA Security+ SY0-601 exam, including* Cyber attacks, threats, and vulnerabilities* Social engineering, wireless attacks, denial of service attacks* Threat hunting and incident response* Indicators of compromise and threat intelligence* Cloud security concepts and cryptography* Security assessments and penetration testing concepts* Governance, risk management, and cyber resilience* Authentication, Authorization, and Accounting (AAA)* IoT and Industrial Control Systems (ICS) security* Physical and administrative security controls.
..
Table of contents
- Cover Page
- About This eBook
- Title Page
- Copyright Page
- Contents at a Glance
- Table of Contents
- About the Authors
- Dedication
- Acknowledgments
- About the Technical Reviewer
- We Want to Hear from You!
- Reader Services
- Introduction
-
Part I: Threats, Attacks, and Vulnerabilities
- Chapter 1. Comparing and Contrasting Different Types of Social Engineering Techniques
-
Chapter 2. Analyzing Potential Indicators to Determine the Type of Attack
- “Do I Know This Already?” Quiz
- Foundation Topics
- Malicious Software (Malware)
- Password Attacks
- Physical Attacks
- Adversarial Artificial Intelligence
- Supply-Chain Attacks
- Cloud-based vs. On-premises Attacks
- Cryptographic Attacks
- Chapter Review Activities
- Review Key Topics
- Define Key Terms
- Review Questions
-
Chapter 3. Analyzing Potential Indicators Associated with Application Attacks
- “Do I Know This Already?” Quiz
- Foundation Topics
- Privilege Escalation
- Cross-Site Scripting (XSS) Attacks
- Injection Attacks
- Pointer/Object Dereference
- Directory Traversal
- Buffer Overflows
- Race Conditions
- Error Handling
- Improper Input Handling
- Replay Attacks
- Request Forgeries
- Application Programming Interface (API) Attacks
- Resource Exhaustion
- Memory Leaks
- Secure Socket Layer (SSL) Stripping
- Driver Manipulation
- Pass the Hash
- Chapter Review Activities
- Review Key Topics
- Define Key Terms
- Review Questions
- Chapter 4. Analyzing Potential Indicators Associated with Network Attacks
- Chapter 5. Understanding Different Threat Actors, Vectors, and Intelligence Sources
-
Chapter 6. Understanding the Security Concerns Associated with Various Types of Vulnerabilities
- “Do I Know This Already?” Quiz
- Foundation Topics
- Cloud-based vs. On-premises Vulnerabilities
- Zero-day Vulnerabilities
- Weak Configurations
- Third-party Risks
- Improper or Weak Patch Management
- Legacy Platforms
- The Impact of Cybersecurity Attacks and Breaches
- Chapter Review Activities
- Review Key Topics
- Define Key Terms
- Review Questions
- Chapter 7. Summarizing the Techniques Used in Security Assessments
- Chapter 8. Understanding the Techniques Used in Penetration Testing
-
Part II: Architecture and Design
- Chapter 9. Understanding the Importance of Security Concepts in an Enterprise Environment
- Chapter 10. Summarizing Virtualization and Cloud Computing Concepts
-
Chapter 11. Summarizing Secure Application Development, Deployment, and Automation Concepts
- “Do I Know This Already?” Quiz
- Foundation Topics
- Software Development Environments and Methodologies
- Application Provisioning and Deprovisioning
- Software Integrity Measurement
- Secure Coding Techniques
- Open Web Application Security Project (OWASP)
- Software Diversity
- Automation/Scripting
- Elasticity and Scalability
- Chapter Review Activities
- Review Key Topics
- Define Key Terms
- Review Questions
-
Chapter 12. Summarizing Authentication and Authorization Design Concepts
- “Do I Know This Already?” Quiz
- Foundation Topics
- Authentication Methods
- Biometrics
- Multifactor Authentication (MFA) Factors and Attributes
- Authentication, Authorization, and Accounting (AAA)
- Cloud vs. On-premises Requirements
- Chapter Review Activities
- Review Key Topics
- Define Key Terms
- Review Questions
- Chapter 13. Implementing Cybersecurity Resilience
-
Chapter 14. Understanding the Security Implications of Embedded and Specialized Systems
- “Do I Know This Already?” Quiz
- Foundation Topics
- Embedded Systems
- Supervisory Control and Data Acquisition (SCADA)/Industrial Control Systems (ICS)
- Internet of Things (IoT)
- Specialized Systems
- Voice over IP (VoIP)
- Heating, Ventilation, and Air Conditioning (HVAC)
- Drones
- Multifunction Printers (MFP)
- Real-Time Operating Systems (RTOS)
- Surveillance Systems
- System on a Chip (SoC)
- Communication Considerations
- Embedded System Constraints
- Chapter Review Activities
- Review Key Topics
- Define Key Terms
- Review Questions
-
Chapter 15. Understanding the Importance of Physical Security Controls
- “Do I Know This Already?” Quiz
- Foundation Topics
- Bollards/Barricades
- Access Control Vestibules
- Badges
- Alarms
- Signage
- Cameras
- Closed-Circuit Television (CCTV)
- Industrial Camouflage
- Personnel
- Locks
- USB Data Blockers
- Lighting
- Fencing
- Fire Suppression
- Sensors
- Drones
- Visitor Logs
- Faraday Cages
- Air Gap
- Screened Subnet (Previously Known as Demilitarized Zone [DMZ])
- Protected Cable Distribution
- Secure Areas
- Secure Data Destruction
- Chapter Review Activities
- Review Key Topics
- Define Key Terms
- Review Questions
-
Chapter 16. Summarizing the Basics of Cryptographic Concepts
- “Do I Know This Already?” Quiz
- Foundation Topics
- Digital Signatures
- Key Length
- Key Stretching
- Salting
- Hashing
- Key Exchange
- Elliptic-Curve Cryptography
- Perfect Forward Secrecy
- Quantum
- Post-Quantum
- Ephemeral
- Modes of Operation
- Blockchain
- Cipher Suites
- Symmetric vs. Asymmetric Encryption
- Lightweight Cryptography
- Steganography
- Homomorphic Encryption
- Common Use Cases
- Limitations
- Chapter Review Activities
- Review Key Topics
- Define Key Terms
- Review Questions
-
Part III: Implementation
- Chapter 17. Implementing Secure Protocols
-
Chapter 18. Implementing Host or Application Security Solutions
- “Do I Know This Already?” Quiz
- Foundation Topics
- Endpoint Protection
- Antimalware
- Next-Generation Firewall
- Host-based Intrusion Prevention System
- Host-based Intrusion Detection System
- Host-based Firewall
- Boot Integrity
- Database
- Application Security
- Hardening
- Self-Encrypting Drive/Full-Disk Encryption
- Hardware Root of Trust
- Trusted Platform Module
- Sandboxing
- Chapter Review Activities
- Review Key Topics
- Define Key Terms
- Review Questions
-
Chapter 19. Implementing Secure Network Designs
- “Do I Know This Already?” Quiz
- Foundation Topics
- Load Balancing
- Network Segmentation
- Virtual Private Network
- DNS
- Network Access Control
- Out-of-Band Management
- Port Security
- Network Appliances
- Access Control List
- Route Security
- Quality of Service
- Implications of IPv6
- Port Spanning/Port Mirroring
- Monitoring Services
- File Integrity Monitors
- Chapter Review Activities
- Review Key Topics
- Define Key Terms
- Review Questions
- Chapter 20. Installing and Configuring Wireless Security Settings
- Chapter 21. Implementing Secure Mobile Solutions
- Chapter 22. Applying Cybersecurity Solutions to the Cloud
- Chapter 23. Implementing Identity and Account Management Controls
- Chapter 24. Implementing Authentication and Authorization Solutions
- Chapter 25. Implementing Public Key Infrastructure
-
Part IV: Operations and Incident Response
-
Chapter 26. Using the Appropriate Tool to Assess Organizational Security
- “Do I Know This Already?” Quiz
- Foundation Topics
- Network Reconnaissance and Discovery
- File Manipulation
- Shell and Script Environments
- Packet Capture and Replay
- Forensics
- Exploitation Frameworks
- Password Crackers
- Data Sanitization
- Chapter Review Activities
- Review Key Topics
- Define Key Terms
- Review Questions
-
Chapter 27. Summarizing the Importance of Policies, Processes, and Procedures for Incident Response
- “Do I Know This Already?” Quiz
- Foundation Topics
- Incident Response Plans
- Incident Response Process
- Exercises
- Attack Frameworks
- Stakeholder Management
- Communication Plan
- Disaster Recovery Plan
- Business Continuity Plan
- Continuity of Operations Planning (COOP)
- Incident Response Team
- Retention Policies
- Chapter Review Activities
- Review Key Topics
- Define Key Terms
- Review Questions
- Chapter 28. Using Appropriate Data Sources to Support an Investigation
- Chapter 29. Applying Mitigation Techniques or Controls to Secure an Environment
- Chapter 30. Understanding the Key Aspects of Digital Forensics
-
Chapter 26. Using the Appropriate Tool to Assess Organizational Security
-
Part V: Governance, Risk, and Compliance
- Chapter 31. Comparing and contrasting the Various Types of Controls
- Chapter 32. Understanding the Importance of Applicable Regulations, Standards, or Frameworks That Impact Organizational Security Posture
- Chapter 33. Understanding the Importance of Policies to Organizational Security
- Chapter 34. Summarizing Risk Management Processes and Concepts
-
Chapter 35. Understanding Privacy and Sensitive Data Concepts in Relation to Security
- “Do I Know This Already?” Quiz
- Foundation Topics
- Organizational Consequences of Privacy and Data Breaches
- Notifications of Breaches
- Data Types and Asset Classification
- PII
- PHI
- Privacy Enhancing Technologies
- Roles and Responsibilities
- Information Lifecycle
- Impact Assessment
- Terms of Agreement
- Privacy Notice
- Chapter Review Activities
- Review Key Topics
- Define Key Terms
- Review Questions
- Part VI: Final Preparation
- Glossary of Key Terms
-
Appendix A. Answers to the “Do I Know This Already?” Quizzes and Review Questions
- Chapter 1
- Chapter 2
- Chapter 3
- Chapter 4
- Chapter 5
- Chapter 6
- Chapter 7
- Chapter 8
- Chapter 9
- Chapter 10
- Chapter 11
- Chapter 12
- Chapter 13
- Chapter 14
- Chapter 15
- Chapter 16
- Chapter 17
- Chapter 18
- Chapter 19
- Chapter 20
- Chapter 21
- Chapter 22
- Chapter 23
- Chapter 24
- Chapter 25
- Chapter 26
- Chapter 27
- Chapter 28
- Chapter 29
- Chapter 30
- Chapter 31
- Chapter 32
- Chapter 33
- Chapter 34
- Chapter 35
- Appendix B. CompTIA Security+ (SY0-601) Cert Guide Exam Updates
- Index
- Appendix C. Study Planner
- Where are the companion content files? - Register
- Inside Front Cover
- Inside Back Cover
- Code Snippets
Product information
- Title: CompTIA Security+ SY0-601 Cert Guide, 5th Edition
- Author(s):
- Release date: August 2021
- Publisher(s): Pearson IT Certification
- ISBN: 9780136770091
You might also like
book
CCNA 200-301 Official Cert Guide Library
Cisco Press has the only study guides approved by Cisco for the new CCNA certification. The …
video
CompTIA Security+ Certification SY0-601: The Total Course
Excel in the CompTIA Security+ Certification SY0-601 exam by taking this course, which deep dives into …
video
CISSP, 3rd Edition
27+ Hours of Video Instruction Overview: CISSP Complete Video Course, 3rd Edition, is your full study …
video
CompTIA Security+ SY0-701
27+ Hours of Video Instruction Get the edge you need to successfully study for the CompTIA …