Skip to Main Content

Meetings Stub Page [mx-stub]

CompTIA Security+ Certification

Agenda

1 - COMPARING AND CONTRASTING ATTACKS
  • Compare and Contrast Information Security Roles
  • Explain Threat Actor Types
  • Compare and Contrast Social Engineering Attack Types
  • Determine Malware Types
2 - COMPARING AND CONTRASTING SECURITY CONTROLS
  • Compare and Contrast Security Control and Framework Types
  • Follow Incident Response Procedures
3 - ASSESSING SECURITY POSTURE WITH SOFTWARE TOOLS
  • Explain Penetration Testing Concepts
  • Assess Security Posture with Topology Discovery Software Tools
  • Assess Security Posture with Fingerprinting and Sniffing Software Tools
  • Assess Security Posture with Vulnerability Scanning Software Tools
4 - EXPLAINING BASIC CRYPTOGRAPHY CONCEPTS
  • Compare and Contrast Basic Concepts of Cryptography
  • Explain Hashing and Symmetric Cryptographic Algorithms
  • Explain Asymmetric Cryptographic Algorithms
5 - IMPLEMENTING A PUBLIC KEY INFRASTRUCTURE
  • Implement Certificates and Certificate Authorities
  • Implement PKI Management
6 - IMPLEMENTING IDENTITY AND ACCESS MANAGEMENT CONTROLS
  • Compare and Contrast Identity and Authentication Concepts
  • Install and Configure Authentication Protocols
  • Implement Multifactor Authentication
7 - MANAGING ACCESS SERVICES AND ACCOUNTS
  • Install and Configure Authorization and Directory Services
  • Implement Access Management Controls
  • Differentiate Account Management Practices
  • Implement Account Auditing and Recertification
8 - IMPLEMENTING A SECURE NETWORK ARCHITECTURE
  • Implement Secure Network Architecture Concepts
  • Install and Configure a Secure Switching Infrastructure
  • Install and Configure Network Access Control
  • Install and Configure a Secure Routing and NAT Infrastructure
9 - INSTALLING AND CONFIGURING SECURITY APPLIANCES
  • Install and Configure Firewalls and Proxies
  • Install and Configure Load Balancers
  • Install and Configure Intrusion Detection/Prevention Systems
  • Install and Configure Data Loss Prevention (DLP) Systems
  • Install and Configure Logging and SIEM Systems
10 - INSTALLING AND CONFIGURING WIRELESS AND PHYSICAL ACCESS SECURITY
  • Install and Configure a Wireless Infrastructure
  • Install and Configure Wireless Security Settings
  • Explain the Importance of Physical Security Controls
11 - DEPLOYING SECURE HOST, MOBILE, AND EMBEDDED SYSTEMS
  • Implement Secure Hardware Systems Design
  • Implement Secure Host Systems Design
  • Implement Secure Mobile Device Systems Design
  • Implement Secure Embedded Systems Design
12 - IMPLEMENTING SECURE NETWORK ACCESS PROTOCOLS
  • Implement Secure Network Operations Protocols
  • Implement Secure Remote Access Protocols
  • Implement Secure Remote Administration Protocols
13 - IMPLEMENTING SECURE NETWORK APPLICATIONS
  • Implement Secure Web Services
  • Implement Secure Communications Services
  • Summarize Secure Virtualization Infrastructure
  • Summarize Secure Cloud Services
14 - EXPLAINING RISK MANAGEMENT AND DISASTER RECOVERY CONCEPTS
  • Explain Risk Management Processes and Concepts
  • Explain Resiliency and Automation Strategies
  • Explain Disaster Recovery and Continuity of Operation Concepts
  • Summarize Basic Concepts of Forensics
15 - SUMMARIZING SECURE APPLICATION DEVELOPMENT CONCEPTS
  • Explain the Impact of Vulnerability Types
  • Summarize Secure Application Development Concepts
16 - EXPLAINING ORGANIZATIONAL SECURITY CONCEPTS
  • Explain the Importance of Security Policies
  • Implement Data Security and Privacy Practices
  • Explain the Importance of Personnel Management
You are using an unsupported version of Internet Explorer. To ensure security, performance, and full functionality, please upgrade to an up-to-date browser.