Introduction |
|
ix | |
Part 1 Security Fundamentals |
|
1 | (62) |
|
Module 1 Introduction To Security |
|
|
3 | (30) |
|
What Is Information Security? |
|
|
5 | (2) |
|
|
5 | (1) |
|
Defining Information Security |
|
|
5 | (2) |
|
Who Are the Threat Actors? |
|
|
7 | (4) |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
10 | (1) |
|
Vulnerabilities and Attacks |
|
|
11 | (11) |
|
|
11 | (3) |
|
|
14 | (1) |
|
Social Engineering Attacks |
|
|
15 | (6) |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
23 | (1) |
|
|
24 | (6) |
|
|
30 | (3) |
|
Module 2 Threat Management And Cybersecurity Resources |
|
|
33 | (30) |
|
|
34 | (8) |
|
Defining Penetration Testing |
|
|
34 | (1) |
|
|
35 | (1) |
|
Who Should Perform the Test? |
|
|
35 | (2) |
|
|
37 | (2) |
|
Performing a Penetration Test |
|
|
39 | (3) |
|
|
42 | (8) |
|
What Is a Vulnerability Scan? |
|
|
42 | (1) |
|
Conducting a Vulnerability Scan |
|
|
43 | (4) |
|
|
47 | (2) |
|
|
49 | (1) |
|
|
50 | (5) |
|
|
50 | (2) |
|
|
52 | (1) |
|
|
53 | (1) |
|
|
53 | (1) |
|
Benchmarks/Secure Configuration Guides |
|
|
54 | (1) |
|
|
54 | (1) |
|
|
55 | (1) |
|
|
56 | (1) |
|
|
57 | (4) |
|
|
61 | (2) |
Part 2 Endpoint Security |
|
63 | (92) |
|
Module 3 Threats And Attacks On Endpoints |
|
|
65 | (30) |
|
|
66 | (11) |
|
|
67 | (2) |
|
|
69 | (4) |
|
|
73 | (2) |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
77 | (6) |
|
|
78 | (1) |
|
|
78 | (2) |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
81 | (2) |
|
Adversarial Artificial Intelligence Attacks |
|
|
83 | (3) |
|
What Are Artificial Intelligence (Al) and Machine Learning (ML)? |
|
|
84 | (1) |
|
|
84 | (1) |
|
Risks in Using Al and ML in Cybersecurity |
|
|
85 | (1) |
|
|
86 | (2) |
|
|
88 | (1) |
|
|
88 | (5) |
|
|
93 | (2) |
|
Module 4 Endpoint And Application Development Security |
|
|
95 | (32) |
|
Threat Intelligence Sources |
|
|
96 | (5) |
|
|
97 | (2) |
|
Sources of Threat Intelligence |
|
|
99 | (2) |
|
Securing Endpoint Computers |
|
|
101 | (11) |
|
|
101 | (2) |
|
|
103 | (4) |
|
|
107 | (5) |
|
Creating and Deploying SecDevOps |
|
|
112 | (6) |
|
Application Development Concepts |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
115 | (3) |
|
|
118 | (2) |
|
|
120 | (1) |
|
|
120 | (5) |
|
|
125 | (2) |
|
Module 5 Mobile, Embedded, And Specialized Device Security |
|
|
127 | (28) |
|
|
129 | (11) |
|
Introduction to Mobile Devices |
|
|
129 | (5) |
|
|
134 | (2) |
|
Protecting Mobile Devices |
|
|
136 | (4) |
|
Embedded Systems and Specialized Devices |
|
|
140 | (5) |
|
|
140 | (4) |
|
|
144 | (1) |
|
|
145 | (2) |
|
|
147 | (1) |
|
|
148 | (4) |
|
|
152 | (3) |
Part 3 Cryptography |
|
155 | (68) |
|
Module 6 Basic Cryptography |
|
|
157 | (34) |
|
|
158 | (2) |
|
|
158 | (2) |
|
|
160 | (12) |
|
Limitations of Cryptography |
|
|
162 | (2) |
|
|
164 | (1) |
|
|
165 | (1) |
|
Symmetric Cryptographic Algorithms |
|
|
166 | (2) |
|
Asymmetric Cryptographic Algorithms |
|
|
168 | (4) |
|
Cryptographic Attacks and Defenses |
|
|
172 | (3) |
|
|
173 | (1) |
|
Quantum Cryptographic Defenses |
|
|
174 | (1) |
|
|
175 | (5) |
|
Encryption through Software |
|
|
175 | (2) |
|
|
177 | (1) |
|
|
178 | (2) |
|
|
180 | (1) |
|
|
181 | (1) |
|
|
181 | (6) |
|
|
187 | (4) |
|
Module 7 Public Key Infrastructure And Cryptographic Protocols |
|
|
191 | (32) |
|
|
192 | (10) |
|
Defining Digital Certificates |
|
|
192 | (2) |
|
Managing Digital Certificates |
|
|
194 | (3) |
|
Types of Digital Certificates |
|
|
197 | (5) |
|
Public Key Infrastructure (PKI) |
|
|
202 | (5) |
|
What Is Public Key Infrastructure (PKI)? |
|
|
202 | (1) |
|
|
202 | (2) |
|
|
204 | (1) |
|
|
205 | (2) |
|
|
207 | (4) |
|
Secure Sockets Layer (SSL) |
|
|
208 | (1) |
|
Transport Layer Security (TLS) |
|
|
208 | (1) |
|
|
208 | (1) |
|
Hypertext Transport Protocol Secure (HTTPS) |
|
|
209 | (1) |
|
Secure/Multipurpose Internet Mail Extensions (S/MIME) |
|
|
209 | (1) |
|
Secure Real-time Transport Protocol (SRTP) |
|
|
209 | (1) |
|
|
210 | (1) |
|
Weaknesses of Cryptographic Protocols |
|
|
210 | (1) |
|
Implementing Cryptography |
|
|
211 | (3) |
|
|
211 | (1) |
|
|
212 | (1) |
|
Block Cipher Modes of Operation |
|
|
212 | (1) |
|
|
213 | (1) |
|
|
214 | (1) |
|
|
215 | (1) |
|
|
216 | (4) |
|
|
220 | (3) |
Part 4 Network Security |
|
223 | (128) |
|
Module 8 Networking Threats, Assessments, And Defenses |
|
|
225 | (30) |
|
|
226 | (10) |
|
|
227 | (1) |
|
|
228 | (3) |
|
|
231 | (2) |
|
Distributed Denial of Service Attack |
|
|
233 | (1) |
|
Malicious Coding and Scripting Attacks |
|
|
234 | (2) |
|
Tools for Assessment and Defense |
|
|
236 | (4) |
|
Network Reconnaissance and Discovery Tools |
|
|
237 | (1) |
|
Linux File Manipulation Tools |
|
|
238 | (1) |
|
|
238 | (1) |
|
Packet Capture and Replay Tools |
|
|
238 | (2) |
|
Physical Security Controls |
|
|
240 | (1) |
|
External Perimeter Defenses |
|
|
240 | (8) |
|
Internal Physical Security Controls |
|
|
243 | (2) |
|
Computer Hardware Security |
|
|
245 | (1) |
|
|
246 | (2) |
|
|
248 | (1) |
|
|
248 | (4) |
|
|
252 | (3) |
|
Module 9 Network Security Appliances And Technologies |
|
|
255 | (30) |
|
|
256 | (10) |
|
|
257 | (4) |
|
|
261 | (1) |
|
|
261 | (2) |
|
Intrusion Detection and Prevention Systems |
|
|
263 | (1) |
|
Network Hardware Security Modules |
|
|
264 | (1) |
|
|
265 | (1) |
|
|
266 | (10) |
|
|
266 | (3) |
|
Technologies for Monitoring and Managing |
|
|
269 | (3) |
|
|
272 | (4) |
|
|
276 | (2) |
|
|
278 | (1) |
|
|
279 | (3) |
|
|
282 | (3) |
|
Module 10 Cloud And Virtualization Security |
|
|
285 | (32) |
|
|
286 | (12) |
|
Introduction to Cloud Computing |
|
|
286 | (6) |
|
|
292 | (6) |
|
|
298 | (6) |
|
|
298 | (2) |
|
|
300 | (2) |
|
Security Concerns for Virtual Environments |
|
|
302 | (2) |
|
|
304 | (4) |
|
Simple Network Management Protocol (SNMP) |
|
|
304 | (1) |
|
Domain Name System Security Extensions (DNSSEC) |
|
|
304 | (1) |
|
File Transfer Protocol (FTP) |
|
|
305 | (1) |
|
|
306 | (1) |
|
Lightweight Directory Access Protocol (LDAP) |
|
|
306 | (1) |
|
Internet Protocol Version 6 (IPv6) |
|
|
307 | (1) |
|
|
307 | (1) |
|
|
308 | (2) |
|
|
310 | (1) |
|
|
311 | (4) |
|
|
315 | (2) |
|
Module 11 Wireless Network Security |
|
|
317 | (34) |
|
|
319 | (12) |
|
|
319 | (2) |
|
Near Field Communication (NEC) Attacks |
|
|
321 | (1) |
|
Radio Frequency Identification (RFID) Attacks |
|
|
322 | (1) |
|
Wireless Local Area Network Attacks |
|
|
323 | (8) |
|
Vulnerabilities of WLAN Security |
|
|
331 | (3) |
|
|
331 | (1) |
|
|
332 | (1) |
|
|
332 | (1) |
|
Wi-Fi Protected Access (WPA) |
|
|
333 | (1) |
|
Wireless Security Solutions |
|
|
334 | (2) |
|
Wi-Fi Protected Access 2 (WPA2) |
|
|
334 | (2) |
|
Wi-Fi Protected Access 3 (WPA3) |
|
|
336 | (1) |
|
Additional Wireless Security Protections |
|
|
336 | (4) |
|
|
337 | (1) |
|
|
338 | (1) |
|
Specialized Systems Communications |
|
|
339 | (1) |
|
Rogue AP System Detection |
|
|
339 | (1) |
|
|
340 | (2) |
|
|
342 | (1) |
|
|
342 | (5) |
|
|
347 | (4) |
Part 5 Enterprise Security |
|
351 | (128) |
|
|
353 | (36) |
|
Types of Authentication Credentials |
|
|
354 | (15) |
|
Something You Know: Passwords |
|
|
355 | (6) |
|
Something You Have: Smartphone and Security Keys |
|
|
361 | (3) |
|
Something You Are: Biometrics |
|
|
364 | (4) |
|
Something You Do: Behavioral Biometrics |
|
|
368 | (1) |
|
|
369 | (9) |
|
|
370 | (3) |
|
Secure Authentication Technologies |
|
|
373 | (5) |
|
|
378 | (1) |
|
|
379 | (1) |
|
|
380 | (6) |
|
|
386 | (3) |
|
Module 13 Incident Preparation, Response, And Investigation |
|
|
389 | (34) |
|
|
390 | (10) |
|
Reasons for Cybersecurity Incidents |
|
|
391 | (6) |
|
Preparing for an Incident |
|
|
397 | (3) |
|
|
400 | (2) |
|
Use SOAR Runbooks and Playbooks |
|
|
401 | (1) |
|
|
401 | (1) |
|
Make Configuration Changes |
|
|
402 | (1) |
|
|
402 | (11) |
|
|
402 | (3) |
|
|
405 | (8) |
|
|
413 | (2) |
|
|
415 | (1) |
|
|
415 | (5) |
|
|
420 | (3) |
|
Module 14 Cybersecurity Resilience |
|
|
423 | (30) |
|
|
424 | (12) |
|
Introduction to Business Continuity |
|
|
424 | (3) |
|
Resilience Through Redundancy |
|
|
427 | (9) |
|
|
436 | (8) |
|
|
436 | (1) |
|
Types of Security Policies |
|
|
437 | (7) |
|
|
444 | (1) |
|
|
445 | (1) |
|
|
446 | (5) |
|
|
451 | (2) |
|
Module 15 Risk Management And Data Privacy |
|
|
453 | (26) |
|
|
454 | (12) |
|
|
455 | (1) |
|
|
456 | (1) |
|
|
457 | (4) |
|
|
461 | (5) |
|
|
466 | (4) |
|
|
467 | (1) |
|
|
468 | (1) |
|
|
468 | (1) |
|
|
468 | (2) |
|
|
470 | (1) |
|
|
470 | (2) |
|
|
472 | (1) |
|
|
473 | (3) |
|
|
476 | (3) |
Appendices A CompTIA Security+ SYO-601 Certification Exam Objectives |
|
479 | (26) |
Appendices B Two Rights & A Wrong: Answers |
|
505 | (10) |
Glossary |
|
515 | (28) |
Index |
|
543 | |