CompTIA Security+ SY0-601 Study Notes

1.0 Threats, Attacks, and Vulnerabilities

1.1 Compare and contrast different types of social engineering techniques.

1.2 Given a scenario, analyse potential indicators to determine the type of attack.

1.3 Given a scenario, analyse potential indicators associated with application attacks.

1.4 Given a scenario, analyse potential indicators associated with network attacks.

1.5 Explain different threat actors, vectors, and intelligence sources.

1.6 Explain the security concerns associated with various types of vulnerabilities.

1.7 Summarise the techniques used in security assessments.

1.8 Explain the techniques used in penetration testing.

2.0 Architecture and Design

2.1 Explain the importance of security concepts in an enterprise environment.

2.2 Summarise virtualisation and cloud computing concepts

2.3 Summarise secure application development, deployment, and automation concepts.

2.4 Summarise authentication and authorisation design concepts.

2.5 Given a scenario, implement cybersecurity resilience.

2.6 Explain the security of implications of embedded and specialized systems.

2.7 Explain the importance of physical security controls.

2.8 Summarise the basics of cryptographic concepts.

AsyIn cryptography, Galois/Counter Mode (GCM) is a mode of operation for symmetric-key cryptographic block ciphers which is widely adopted for its performance. GCM throughput rates for state-of-the-art, high-speed communication channels can be achieved with inexpensive hardware resources.[1] The operation is an authenticated encryption algorithm designed to provide both data authenticity (integrity) and confidentiality. GCM is defined for block ciphers with a block size of 128 bits. Galois Message Authentication Code (GMAC) is an authentication-only variant of the GCM which can form an incremental message authentication code. Both GCM and GMAC can accept initialization vectors of arbitrary length. Different block cipher modes of operation can have significantly different performance and efficiency characteristics, even when used with the same block cipher. GCM can take full advantage of parallel processing and implementing GCM can make efficient use of an instruction pipeline or a hardware pipeline.mmetric Encryption

3.0 Implementation

3.1 Given a scenario, implement secure protocols.

3.2 Given a scenario, implement host or application security solutions.

3.3 Given a scenario, implement secure network designs.

3.4 Given a scenario, install and configure wireless security settings.

3.5 Given a scenario, implement secure mobile solutions.

3.6 Given a scenario, apply cybersecurity solutions to the cloud.

3.7 Given a scenario, implement identity and account management controls.

3.8 Given a scenario, implement authentication and authorisation solutions.

3.9 Given a scenario, implement public key infrastructure.

Asymmetric Encryption

4.0 Operations and Incident Response

4.1 Given a scenario, use the appropriate tool to assess organisational security.

4.2 Summarise the importance of policies, processes, and procedures for incident response.

4.3 Given an incident, utilise appropriate data sources to support and investigation.

4.4 Given an incident, apply mitigation techniques or controls to secure an environment.

4.5 Explain the key aspects of digital forensics.

5.0 Governance, Risk, and Compliance

5.1 Compare and contrast various types of controls.

5.2 Explain the importance of applicable regulations, standards or frameworks that impact organisational security posture.

5.3 Explain the importance of policies to organisational security.

5.4 Summarise risk management processes and concepts.

5.5 Explain privacy and sensitive data concepts in relation to security.