Meetings Stub Page [mx-stub]
CompTIA Security+ Certification (Exam SYO-601)
Agenda
1 - COMPARING SECURITY ROLES AND SECURITY CONTROLS
- Compare and Contrast Information Security Roles
- Compare and Contrast Security Control and Framework Types
2 - EXPLAINING THREAT ACTORS AND THREAT INTELLIGENCE
- Explain Threat Actor Types and Attack Vectors
- Explain Threat Intelligence Sources
3 - PERFORMING SECURITY ASSESSMENTS
- Assess Organizational Security with Network Reconnaissance Tools
- Explain Security Concerns with General Vulnerability Types
- Summarize Vulnerability Scanning Techniques
- Explain Penetration Testing Concepts
4 - IDENTIFYING SOCIAL ENGINEERING AND MALWARE
- Compare and Contrast Social Engineering Techniques
- Analyze Indicators of Malware-Based Attacks
5 - SUMMARIZING BASIC CRYPTOGRAPHIC CONCEPTS
- Compare and Contrast Cryptographic Ciphers
- Summarize Cryptographic Modes of Operation
- Summarize Cryptographic Use Cases and Weaknesses
- Summarize Other Cryptographic Technologies
6 - IMPLEMENTING PUBLIC KEY INFRASTRUCTURE
- Implement Certificates and Certificate Authorities
- Implement PKI Management
7 - IMPLEMENTING AUTHENTICATION CONTROLS
- Summarize Authentication Design Concepts
- Implement Knowledge-Based Authentication
- Implement Authentication Technologies
- Summarize Biometrics Authentication Concepts
8 - IMPLEMENTING IDENTITY AND ACCOUNT MANAGEMENT CONTROLS
- Implement Identity and Account Types
- Implement Account Policies
- Implement Authorization Solutions
- Explain the Importance of Personnel Policies
9 - IMPLEMENTING SECURE NETWORK DESIGNS
- Implement Secure Network Designs
- Implement Secure Switching and Routing
- Implement Secure Wireless Infrastructure
- Implement Load Balancers
10 - IMPLEMENTING NETWORK SECURITY APPLIANCES
- Implement Firewalls and Proxy Servers
- Implement Network Security Monitoring
- Summarize the Use of SIEM
11 - IMPLEMENTING SECURE NETWORK PROTOCOLS
- Implement Secure Network Operations Protocols
- Implement Secure Application Protocols
- Implement Secure Remote Access Protocols
12 - IMPLEMENTING HOST SECURITY SOLUTIONS
- Implement Secure Firmware
- Implement Endpoint Security
- Explain Embedded System Security Implications
13 - IMPLEMENTING SECURE MOBILE SOLUTIONS
- Implement Mobile Device Management
- Implement Secure Mobile Device Connections
14 - SUMMARIZING SECURE APPLICATION CONCEPTS
- Analyze Indicators of Application Attacks
- Analyze Indicators of Web Application Attacks
- Summarize Secure Coding Practices
- Implement Secure Script Environments
- Summarize Deployment and Automation Concepts
15 - IMPLEMENTING SECURE CLOUD SOLUTIONS
- Summarize Secure Cloud and Virtualization Services
- Apply Cloud Security Solutions
- Summarize Infrastructure as Code Concepts
16 - EXPLAINING DATA PRIVACY AND PROTECTION CONCEPTS
- Explain Privacy and Data Sensitivity Concepts
- Explain Privacy and Data Protection Controls
17 - PERFORMING INCIDENT RESPONSE
- Summarize Incident Response Procedures
- Utilize Appropriate Data Sources for Incident Response
- Apply Mitigation Controls
18 - EXPLAINING DIGITAL FORENSICS
- Explain Key Aspects of Digital Forensics Documentation
- Explain Key Aspects of Digital Forensics Evidence Acquisition
19 - SUMMARIZING RISK MANAGEMENT CONCEPTS
- Explain Risk Management Processes and Concepts
- Explain Business Impact Analysis Concepts
20 - IMPLEMENTING CYBERSECURITY RESILIENCE
- Implement Redundancy Strategies
- Implement Backup Strategies
- Implement Cybersecurity Resiliency Strategies
21 - EXPLAINING PHYSICAL SECURITY
- Explain the Importance of Physical Site Security Controls
- Explain the Importance of Physical Host Security Controls