ALPHAGRAD

AlphaGrad Zero to IT Hero Security+ Guide

1.0 - Threats, Attacks and Vulnerabilities
Day 1: Sec+ Exam Objectives Section 1.1

1.1: Compare and contrast different types of social engineering techniques

Day 2: Sec+ Exam Objectives Section 1.2

1.2: Given a scenario, analyze potential indicators to determine the type of attack

Day 3: Sec+ Exam Objectives Section 1.3 & 1.4

1.3: Given a scenario, analyze potential indicators associated with application attacks

1.4 Given a scenario, analyze potential indicators associated with network attacks.

Day 4: Sec+ Exam Objectives Section 1.5

1.5: Explain different threat actors, vectors and intelligence sources

Day 5: Sec+ Exam ObjectivesSection 1.6, 1.7, 1.8

1.6 Explain the security concerns associated with various types of vulnerabilities

1.7: Summarize the techniques used in security assessments

1.8: Explain the techniques used in penetration testing

Day 6: REVIEW

REVIEW

Review Chapter 1.0

2.0 architecture and Design
Day 7: Sec+ Exam Objectives Section 2.1, 2.2

2.1: Explain the importance of security concepts in an enterprise environment

2.2: Summarize virtualization and cloud computing concepts

Day 8: Sec+ Exam Objectives Section 2.3 & 2.4

2.3 Summarize secure application development, deployment and automation concepts

2.4: summarize authentication and authorization design concepts

Day 9: Sec+ Exam Objectives Section 2.5, 2.6

2.5: Given a scenario, implement cybersecurity resilience

2.6: Explain the security implications of embedded and specialized systems.

Day 10: Sec+ Exam Objectives Section 2.7, 2.8

2.7: Explain the importance of physical security controls.

2.8: Summarize the basics of cryptographic concepts.

Day 11: REVIEW 1.0 and 2.0

REVIEW

Review Chapter 1.0 and 2.0

3.0 - Implementation
Day 12: Sec+ Exam Objectives Section 3.1, 3.2

3.1: Given a scenario, implement secure protocols

3.2: Given a scenario, implement host or application security solutions

Day 13: Sec+ Exam Objectives Section 3.3, 3.4

3.3: Given a scenario, implement secure network designs.

3.4: Given a scenario, install and configure wireless security settings.

Day 14: Sec+ Exam Objectives Section 3.5, 3.6

3.5: Given a scenario, implement secure mobile solutions.

3.6: Given a scenario, apply cybersecurity solutions to the cloud.

Day 15: Sec+ Exam Objectives Section 3.7 & 3.8

3.7: Given a scenario, implement identity and account management controls.

3.8: Given a scenario, implement authentication and authorization solutions.

Day 16: Sec+ Exam Objectives Section 3.9

3.9: Given a scenario, implement public key infrastructure.

Review 3.0

4.0 - Operations and Incident Response
Day 17: Sec+ Exam Objectives Section 4.1, 4.2

4.1: Given a scenario, use the appropriate tool to assess organizational security.

4.2: Summarize the importance of policies, processes, and procedures for incident response.

Day 18: Sec+ Exam Objectives Section 4.3, 4.4

4.3: Given an incident, utilize appropriate data sources to support an investigation.

4.4: Given an incident, apply mitigation techniques or controls to secure an environment.

Day 19: Sec+ Exam Objectives Section 4.5

4.5: Explain the key aspects of digital forensics.

Review 3.0, 4.0

5.0 - Governance, Risk, and Compliance
Day 20: Sec+ Exam Objectives Section 5.1

5.1: Compare and contrast various types of controls.

5.2: Explain the importance of applicable regulations, standards, or frameworks that impact organizational security posture.

Day 21: Sec+ Exam Objectives Section 5.3

5.3: Explain the importance of policies to organizational security.

Day 22: Sec+ Exam Objectives Section 5.4

5.4: Summarize risk management processes and concepts.

Day 23: Sec+ Exam Objectives Section 5.5

5.5: Explain privacy and sensitive data concepts in relation to security.

Day 24: Review 1.0, 2.0

REVIEW

Review Chapter 1.0, 2.0

Day 25: Review 3.0-5.5

REVIEW

Review Chapter 3.0-5.5

Day 26: 1.0-5.5

REVIEW

Review Chapter 1.0-5.5

Day 27: EXAM Day

REVIEW

EXAM Day