1.0 - Threats, Attacks and Vulnerabilities
Day 1: Sec+ Exam Objectives Section 1.1
1.1: Compare and contrast different types of social engineering techniques
- Phishing
- Smishing
- Vishing
- Spam
- Spam over Internet messaging (SPIM)
- Spear phishing
- Dumpster diving
- Shoulder surfing
- Pharming
- Tailgating
- Eliciting information
- Whaling
- Prepending
- Identity fraud
- Invoice scams
- Credential harvesting
- Reconnaissance
- Hoax
- Impersonation
- Watering hole attack
- Typosquatting
- Pretexting
- Influence campaigns
- Hybrid warfare
- Social media
- Principles
- Authority
- Intimidation
- Consensus
- Scarcity
- Familiarity
- Trust
- Urgency
Day 2: Sec+ Exam Objectives Section 1.2
1.2: Given a scenario, analyze potential indicators to determine the type of attack
- Malware
- Ransomware
- Trojans
- Worms
- Potentially unwanted programs (PUPs)
- Fileless virus
- Command and control
- Bots
- Cryptomalware
- Logic bombs
- Spyware
- Keyloggers
- Remote access Trojan(RAT)
- Rootkit
- Backdoor
- Password Attacks
- Sparying
- Dictionary
- Brute force
- Rainbow table
- Plaintext/unencrypted
- Physical attacks
- Malicious Universal
- Serial Bus (USB) cable
- Malicious flash drive
- Card cloning
- Skimming
- Adversarial artificial intelligence (AI)
- Tainted training data for machine learning (ML)
- Security of machine learning algorithms
- Supply chain attacks
- Cloud based vs. on premises attacks
- Cryptographic attacks
- Birthday
- Collision
- Downgrade
Day 3: Sec+ Exam Objectives Section 1.3 & 1.4
1.3: Given a scenario, analyze potential indicators associated with application attacks
- Privilege escalation
- Cross-site scripting
- Injections
- Structured query language (SQL)
- Dynamic link library (DLL)
- Lightweight directory
- access protocol (LDAP)
- Extensible markup language (XML)
- Pointer/object dereference
- Directory traversal
- Buffer overflows
- Race conditions
- Time of check/time of use
- Error handling
- Improper input handling
- Replay attack
- Integer overflow
- Request forgeries
- Server-side
- client-side
- Cross-site
- Application programming interface (API) attacks
- Resource exhaustion
- Memory leak
- Secure sockets layers (SSL) stripping Driver manipulation
- Driver manipulation
- Pass the hash
1.4 Given a scenario, analyze potential indicators associated with network attacks.
- Wirlessless
- Evil twin
- Rouge access point
- Bluesnarfing
- Bluejacking
- Disassociation
- Jamming
- Radio frequency identification (RFID)
- Near-field communication (NFC)
- Initialization vector (IV)
- On-path attack (previously known as man in the middle attack/man in the browser attack
- Layer 2 attacks
- Address resolution
- Protocol (ARP) poisoning
- Media access control (MAC) flooding
- MAC cloning
- Domain name system (DNS)
- Domain hijacking
- DNS poisoning
- Uniform resource
- Locator (URL) redirection
- Domain reputation
- Distributed denial of service (DDoS)
- Network
- Application
- Operational technology (OT)
- Malicious code or script execution
- PowerShell
- Python
- Bash
- Macros
- Visual Basic for Applications (VBA)
Day 4: Sec+ Exam Objectives Section 1.5
1.5: Explain different threat actors, vectors and intelligence sources
- Actors and threats
- Advanced persistent threat (APT)
- Insider threats- State actors
- Hacktivists- Script kiddies
- Criminal syndicates
- Hackers
- White hat
- Black hat
- Gray hat
- Shadow IT
- Competitors
- Attributes of actors
- Internal/external
- Level of sophistication/capability
- Resources/funding
- Intent/motivation
- Vectors
- Direct access
- Wireless
- Email
- Supply chain
- Social media
- Removable media
- Cloud
- Threat intelligence sources
- Open source intelligence (OSINT)
- Closed/proprietary
- Vulnerability databases
- Public/private information
- sharing centers
- Dark web
- Indicators of compromise
- Automated indicator sharing (AIS)
- Structured Threat Information eXpression (STIX)/Trusted Automated eXchange of Indicator
Information (TAXII)
- Predictive analysis- Threat maps
- File/code repositories
- Research sources
- Vendor websites
- Vulnerability feeds
- Conferences
- Academic journals
- Request for comments (RFC)
- Local industry groups
- Social media
- Threat feeds
- Adversary tactics
- Techniques
- and procedures (P)
Day 5: Sec+ Exam ObjectivesSection 1.6, 1.7, 1.8
1.6 Explain the security concerns associated with various types of vulnerabilities
- Cloud based vs. on premises vulnerabilities
- Zero Day
- Weak configurations
- Open permissions
- Unsecure root accounts
- Errors
- Weak encryption
- Unsecure protocols
- Default settings
- Open ports and services
- Third party risks
- Vendor management
- System integration
- Lack of vendor support
- Supply chain
- Outsourced code development
- Data storage
- Improper or weak patch management
- Firmware
- Operating system (OS)
- Applications
- Legacy platforms
- Impacts
- Data loss
- Data breaches
- Data exfiltration
- Identity theft
- Financial
- Reputation
- Availability loss
1.7: Summarize the techniques used in security assessments
- Threat hunting
- Intelligence fusion
- Threat feeds
- Advisories and bulletins
- Maneuver
- Vulnerability scans
- False positives
- False negatives
- Log reviews
- Credentialed vs. non-credentialed
- Intrusive vs. non-intrusive
- Application
- Web application
- Network
- Common Vulnerabilities and Exposures (CVE)/Common Vulnerability Scoring System (CVSS)
- Configuration review
- Syslog/Security Information and event management (SIEM)
- Review reports
- Packet capture
- Data inputs
- User behavior analysis
- Sentiment analysis
- Security monitoring
- Log aggregation
- Log collectors
- Security Orchestration, automation, and response (SOAR)
1.8: Explain the techniques used in penetration testing
- Penetration testing
- White-box
- Black-box
- Gray-box
- Rules of engagement
- Lateral movement
- Privilege escalation
- Persistence
- Cleanup
- Bug bounty
- Pivoting
- Passive and active reconnaissance
- Drones/unmanned aerial vehicle (UAV)
- War flying
- War driving
- Footprinting
- OSINT
- Exercise types
- Red-team
- Blue-team
- White-team
- Purple-team
Day 6: REVIEW
REVIEW
Review Chapter 1.0
2.0 architecture and Design
Day 7: Sec+ Exam Objectives Section 2.1, 2.2
2.1: Explain the importance of security concepts in an enterprise environment
- Configuration management
- Diagrams
- Baseline configuration
- Standard naming conventions
- Internet protocol (IP) schema
- Data sovereignty
- Data protection
- Data loss prevention (DLP)
- Masking
- Encryption
- At rest
- In transit/motion
- In processing
- Tokenization
- Rights management
- Hardware security module (HSM)
- Geographical considerations
- Cloud access security broker (CASB)
- Response and recovery controls
- Secure Sockets Layer (SSL)/Transport Layer Security (TLS) inspection
- Hashing
- API considerations
- Site resiliency
- Hot site
- Cold site
- Warm site
- Deception and disruption
- Honeypots
- Honeyfiles
- Honeynets
- Fake telemetry
- DNS sinkhole
2.2: Summarize virtualization and cloud computing concepts
- Cloud models
- Infrastructure as a service (IaaS)
- Platform as a service (PaaS)
- Software as a service (SaaS)
- Anything as a service (XaaS)
- Public
- Community
- Private
- Hybrid
- Cloud service providers
- Managed service provider (MSP)/managed security service provider (MSSP)
- On-premises vs. off-premises
- Fog computing
- Edge computing
- Thin client
- Containers
- Microservices/API
- Infrastructure as code
- Software-defined networking (SDN)
- Software-defined visibility (SDV)
- Serverless architecture
- Services integration
- Resource policies
- Transit gateway
- Virtualization
- Virtual machine (VM)
- sprawl avoidance
- VM escape protection
Day 8: Sec+ Exam Objectives Section 2.3 & 2.4
2.3 Summarize secure application development, deployment and automation concepts
- Environment
- Development
- Test
- Staging
- Production
- Quality assurance (QA)
- Provisioning and deprovisioning
- Integrity measurement
- Secure coding techniques
- Normalization
- Stored procedures
- Obfuscation/camouflage
- Code reuse/dead code
- Server-side vs. client-side execution and validation
- Memory management
- Use of third-party libraries and software development kits (SDKs)
- Data exposure
- Open Web Application Security Project (OWASP)
- Software diversity
- Automation/scripting
- Automated courses of action
- Continuous monitoring
- Continuous validation
- Continuous integration
- Continuous delivery
- Continuous deployment
- Elasticity
- Scalability
- Version control
2.4: summarize authentication and authorization design concepts
- Authentication methods
- Directory services
- Federation
- Attestation
- Technologies
- Time-based one time password (TOTP)
- HMAC-based one-time password (HOTP)
- Short message service (SMS)
- Token key
- Static codes
- Authentication applications
- Push notifications
- Phone call
- Smart card authentication
- Biometrics
- Fingerprint
- Retina
- Iris
- Facial
- Voice
- Vein
- Gait analysis
- Efficacy rates
- False acceptance
- False rejection
- Crossover error rate
- Multifactor authentication (MFA) factors and attributes
- Factors
- Something you know
- Something you have
- Something you are
- Attributes
- Somewhere you are
- Something you can do
- Something you exhibit
- Someone you know
- Authentication, authorization, and accounting (A)
- Cloud vs. on-premises requirements
Day 9: Sec+ Exam Objectives Section 2.5, 2.6
2.5: Given a scenario, implement cybersecurity resilience
- Redundancy
- Geographic dispersal
- Disk
- Redundant array of inexpensive disks (RAID) levels
- Multipath
- Network
- Load balancers
- Network interface card (NIC) teaming
- Power
- Uninterruptible power supply (UPS)
- Generator
- Dual supply
- Managed power distribution units (PDUs)
- Replication
- On-premises vs. cloud
- Backup types
- Full
- Incremental
- Snapshot
- Differential
- Tape
- Disk
- Copy
- Network-attached storage (NAS)
- Storage area network
- Cloud
- Image
- Online vs. offline
- Offsite storage
- Non-persistence
- Revert to known state
- Last known-good configuration
- Live boot media
- High availability
- Restoration order
- Diversity
- Technologies
- Vendors
- Crypto
- Controls
2.6: Explain the security implications of embedded and specialized systems.
- Embedded systems
- Raspberry Pi
- Field-programmable gate array (FPGA)
- Arduino
- Supervisory control and data acquisition (SCADA)/industrial control system (ICS)
- Facilities
- Industrial
- Manufacturing
- Energy
- Logistics
- Internet of Things (IoT)
- Sensors
- Smart devices
- Wearables
- Facility automation
- Weak defaults
- Specialized
- Medical systems
- Vehicles
- Aircraft
- Smart meters
- Voice over IP (VoIP)
- Heating, ventilation, air conditioning (HVAC)
- Drones/AVs
- Multifunction printer (MFP)
- Real-time operating system (RTOS)
- Surveillance systems
- System on chip (SoC)
- Communication considerations
- 5G
- Narrow-band
- Baseband radio
- Subscriber identity module (SIM) cards
- Zigbee
- Constraints
- Power
- Compute
- Network
- Crypto
- Inability to patch
- Authentication
- Range
- Cost
- Implied trust
Day 10: Sec+ Exam Objectives Section 2.7, 2.8
2.7: Explain the importance of physical security controls.
- Bollards/barricades
- Mantraps
- Badges
- Alarms
- Signage
- Cameras
- Motion recognition
- Object detection
- Closed-circuit television (CCTV)
- Industrial camouflage
- Personnel
- Guards
- Robot sentries
- Reception
- Two-person integrity/control
- Locks
- Biometrics
- Electronic
- Physical
- Cable locks
- USB data blocker
- Lighting
- Fencing
- Fire suppression
- Sensors
- Motion detection
- Noise detection
- Proximity reader
- Moisture detection
- Cards
- Temperature
- Drones/UAV
- Visitor logs
- Faraday cages
- Air gap
- Demilitarized zone (DMZ)
- Protected cable distribution
- Secure areas
- Air gap
- Vault
- Safe
- Hot aisle
- Cold aisle
- Secure data destruction
- Burning
- Shredding
- Pulping
- Pulverizing
- Degaussing
- Third-party solutions
2.8: Summarize the basics of cryptographic concepts.
- Digital signatures
- Key length
- Key stretching
- Salting
- Hashing
- Key exchange
- Elliptic-curve cryptography
- Perfect forward secrecy
- Quantum
- Post-quantum
- Ephemeral
- Modes of operation
- Authenticated
- Unauthenticated
- Counter
- Blockchain
- Cipher suites
- Symmetric vs. asymmetric
- Lightweight cryptography
- Steganography
- Homomorphic encryption
- Common use cases
- Low power devices
- Low latency
- High resiliency
- Supporting confidentiality
- Supporting integrity
- Supporting obfuscation
- Supporting authentication
- Supporting non-repudiation
- Resource vs. security constraints
- Limitations
- Speed
- Size
- Weak keys
- Time
- Longevity
- Predictability
- Reuse
- Entropy
- Computational overheads
- Resource vs. security constraints
Day 11: REVIEW 1.0 and 2.0
REVIEW
Review Chapter 1.0 and 2.0
3.0 - Implementation
Day 12: Sec+ Exam Objectives Section 3.1, 3.2
3.1: Given a scenario, implement secure protocols
- Protocols
- Domain Name System Security Extension (DNSSEC)
- SSH
- Secure/Multipurpose Internet Mail Extensions (S/MIME)
- Secure Real-time Protocol (SRTP)
- Lightweight Directory Access Protocol Over SSL (LDAPS)
- File Transfer Protocol, Secure (FTPS)
- SSH File Transfer Protocol (SFTP)
- Simple Network Management Protocol, version 3 (SNMPv3)
- Hypertext transfer protocol over SSL/TLS (H
- PS)
- IPSec
- Authentication header (AH)/Encapsulating Security Payloads (ESP)
- Tunnel/transport
- Secure Post Office Protocol (POP)/Internet Message Access Protocol (IMAP)
- Use cases
- Voice and video
- Time synchronization
- Email and web
- File transfer
- Directory services
- Remote access
- Domain name resolution
- Routing and switching
- Network address allocation
- Subscription services
3.2: Given a scenario, implement host or application security solutions
- Endpoint protection
- Antivirus
- Anti-malware
- Endpoint detection and response (EDR)
- DLP
- Next-generation firewall (NGFW)
- Host-based intrusion prevention system (HIPS)
- Host-based intrusion detection system (HIDS)
- Host-based firewall
- Boot integrity
- Boot security/Unified Extensible Firmware Interface (UEFI)
- Measured boot
- Boot attestation
- Database
- Tokenization
- Salting
- Hashing
- Application security
- Input validations
- Secure cookies
- Hypertext Transfer Protocol (H
- P) headers
- Code signing
- Whitelisting
- Blacklisting
- Secure coding practices
- Static code analysis
- Dynamic code analysis
- Fuzzing
- Hardening
- Open ports and services
- Registry
- Disk encryption
- OS
- Patch management
- Third-party updates
- Auto-update
- Self-encrypting drive (SED)/full-disk encryption (FDE)
- Hardware root of trust
- Trusted Platform Module (TPM)
- Sandboxing
Day 13: Sec+ Exam Objectives Section 3.3, 3.4
3.3: Given a scenario, implement secure network designs.
- Load balancing
- Active/active
- Active/passive
- Scheduling
- Virtual IP
- Persistence
- Network segmentation
- Virtual local area network (VLAN)
- DMZ
- East-west traffic
- Extranet
- Intranet
- Zero Trust
- Virtual private network (VPN)
- Always-on
- Split tunnel vs. full tunnel
- Remote access vs. site-to-site
- IPSec
- SSL/TLS
- HTML5
- Layer 2 tunneling protocol (L2TP)
- DNS
- Network access control (NAC)
- Out-of-band management
- Port security
- Broadcast storm prevention
- Bridge Protocol Data Unit (BPDU) guard
- Loop prevention
- Dynamic Host Configuration Protocol (DHCP) snooping
- Media access control (MAC) filtering
- Network appliances
- Jump servers
- Proxy servers
- Network-based intrusion detection system (NIDS)/network-based intrusion prevention system
(NIPS)
- Signature-based
- Heuristic/behavior
- Anomaly
- Inline vs. passive
- HSM
- Sensors
- Collectors
- Aggregators
- Firewalls
- Web application firewall (WAF)?
- NGFW
- Stateful
- Stateless
- Unified threat management (UTM)
- Network address translation (NAT) gateway
- Content/URL filter
- Open-source vs. proprietary
- Hardware vs. software
- Appliance vs. host-based vs. virtual
- Access control list (ACL)
- Route security
- Quality of service (QoS)
- Implications of IPv6
- Port spanning/port mirroring
- Monitoring services
- File integrity monitors
3.4: Given a scenario, install and configure wireless security settings.
- Cryptographic protocols
- WiFi protected access II (WPA2)
- WiFi protected access III (WPA3)
- Counter-mode/CBC-MAC protocol (CCMP)
- Simultaneous Authentication of Equals (SAE)
- uthentication protocols
- Extensible Authentication Protocol (EAP)
- Protected Extensible Application Protocol (PEAP)
- EAP-FAST
- EAP-TLS
- EAP-
- LS
- IEEE 802.1X
- Remote Authentication Dial-in User Service (RADIUS) Federation
- Methods
- Pre-shared key (PSK) vs. Enterprise vs. Open
- WiFi Protected Setup (WPS)
- Captive portals
- Installation considerations
- Site surveys
- Heat maps
- WiFi analyzers
- Channel overlays
- Wireless access point (WAP) placement
- Controller and access point security
Day 14: Sec+ Exam Objectives Section 3.5, 3.6
3.5: Given a scenario, implement secure mobile solutions.
- Connection methods and receivers
- Cellular
- WiFi
- Bluetooth
- NFC
- Infrared
- USB
- Point-to-point
- Point-to-multipoint
- Global Positioning System (GPS)
- RFID.
- Mobile device management (MDM)
- Application management
- Content management
- Remote wipe
- Geofencing
- Geolocation
- Screen locks
- Push notifications
- Passwords and pins
- Biometrics
- Context-aware authentication
- Containerization
- Storage segmentation
- Full device encryption
- Mobile Devices
- MicroSD HSM
- MDM/Unified Endpoint Management (UEM)
- Mobile application management (MAM)
- SEAndroid
- Enforcement and monitoring of:
- Third-party application stores
- Rooting/jailbreaking
- Sideloading
- Custom firmware
- Carrier unlocking
- Firmware over-the-air (OTA) updates
- Camera use
- SMS/Multimedia Messaging Service (MMS)/Rich communication services (RCS)
- External media
- USB On-The-Go (USB OTG)
- Recording microphone
- GPS tagging
- WiFi direct/ad hoc
- Tethering
- Hotspot
- Payment methods
- Deployment models
- Bring your own device (BYOD)
- Corporate-owned personally enabled (COPE)
- Choose your own device (CYOD)
- Corporate-owned
- Virtual desktop infrastructure (VDI)
3.6: Given a scenario, apply cybersecurity solutions to the cloud.
- Cloud security controls
- High availability across zones
- Resource policies
- Secrets management
- Integration and auditing
- Storage
- Permissions
- Encryption
- Replication
- High availability
- Network
- Virtual networks
- Public and private subnets
- Segmentation
- API inspection and integration
- Compute
- Security groups
- Dynamic resource allocation
- TInstance awareness
- Virtual private cloud (VPC) endpoint
- Container security
- Solutions
- CASB
- TApplication security
- Next-generation Secure Web Gateway (SWG)
- Firewall considerations in a cloud environment
- Cost
- Need for segmentation
- Open Systems Interconnection (OSI) layers
- Cloud native controls vs. third-party solutions
Day 15: Sec+ Exam Objectives Section 3.7 & 3.8
3.7: Given a scenario, implement identity and account management controls.
- Identity
- Identity provider (IdP)
- Attributes
- Certificates
- Tokens
- SSH keys
- Smart cards
- Account types
- User account
- Shared and generic accounts/credentials
- Guest accounts
- Service accounts
- Account policies
- Password complexity
- Password history
- Password reuse
- Time of day
- Network location
- Geofencing
- Geotagging
- Geolocation
- Time-based logins
- Access policies
- Account permissions
- Account audits
- Impossible travel time/risky login
- Lockout
- Disablement
3.8: Given a scenario, implement authentication and authorization solutions.
- Authentication management
- Password keys
- Password vaults
- TPM
- HSM
- Knowledge-based authentication
- Authentication
- EAP
- Challenge Handshake Authentication Protocol (CHAP)
- Password Authentication Protocol (PAP)
- 802.1X
- RADIUS
- Single sign-on (SSO)
- Security Assertions Markup Language (SAML)
- Terminal Access Controller Access Control System Plus (TACACS+)
- OAuth
- OpenID
- Kerberos
- Access control schemes
- Attribute-based access control (ABAC)
- Role-based access control
- Rule-based access control
- MAC
- Discretionary access control (DAC)
- Conditional access
- Privilege access management
- Filesystem permissions
Day 16: Sec+ Exam Objectives Section 3.9
3.9: Given a scenario, implement public key infrastructure.
- Public key infrastructure (PKI)
- Key management
- Certificate authority (CA)
- Intermediate CA
- Registration authority (RA)
- Certificate revocation list (CRL)
- Certificate attributes
- Online Certificate Status Protocol (OCSP)
- Certificate signing request (CSR)
- CN
- Subject alternative name
- Expiration
- Types of certificates
- Wildcard
- Subject alternative name
- Code signing
- Self-signed
- Machine/computer
- Email
- User
- Root
- Domain validation
- Extended validation
- Certificate formats
- Distinguished encoding rules (DER)
- Privacy enhanced mail (PEM)
- Personal information exchange (PFX)
- .cer
- P12
- P7B
- Concepts
- Online vs. offline CA
- Stapling
- Pinning
- Trust model
- Key escrow
- Certificate chaining
Review 3.0
4.0 - Operations and Incident Response
Day 17: Sec+ Exam Objectives Section 4.1, 4.2
4.1: Given a scenario, use the appropriate tool to assess organizational security.
- Network reconnaissance and discovery
- tracert/traceroute
- nslookup/dig
- ipconfig/ifconfig
- nmap
- ping/pathping
- hping
- netstat
- netcat
- IP scanners
- arp
- route
- curl
- the harvester
- sn1per
- scanless
- dnsenum
- Nessus
- Cucko
- File manipulation
- head
- tail
- cat
- grep
- chmod
- Logger
- Shell and script environments
- SSH
- PowerShell
- Python
- OpenSSL
- Packet capture and replay
- Tcpreplay
- Tcpdump
- Wireshark
- Forensics
- dd
- Memdump
- WinHex
- FTK imager
- Autopsy
- Exploitation frameworks
- Password crackers
- Data sanitization
4.2: Summarize the importance of policies, processes, and procedures for incident response.
- Incident response plans
- Incident response process
- Preparation
- Identification
- Containment
- Eradication
- Recovery
- Lessons learned
- Exercises
- Tabletop
- Walkthroughs
- Simulations
- Attack frameworks
- MITRE A&CK
- The Diamond Model of Intrusion Analysis
- Cyber Kill Chain
- Stakeholder management
- Communication plan
- Disaster recovery plan
- Business continuity plan
- Continuity of operations planning (COOP)
- Incident response team
- Retention policies
Day 18: Sec+ Exam Objectives Section 4.3, 4.4
4.3: Given an incident, utilize appropriate data sources to support an investigation.
- Vulnerability scan output
- SIEM dashboards
- Sensor
- Sensitivity
- Trends
- Alerts
- Correlation
- Log files
- Network
- System
- Application
- Security
- Web
- DNS
- Authentication
- Dump files
- VoIP and call managers
- Session Initiation Protocol (SIP) traffic
- syslog/rsyslog/syslog-ng
- Journalctl
- Nxlog
- Retention
- Bandwidth monitors
- Metadata
- Netflow/sflow
- Protocol analyzer output
4.4: Given an incident, apply mitigation techniques or controls to secure an environment.
- Reconfigure endpoint security solutions
- Application whitelisting
- Application blacklisting
- Quarantine
- Configuration changes
- Firewall rules
- MDM
- DLP
- Content filter/URL filter
- Update or revoke certificates
- Isolation
- Containment
- Segmentation
- SOAR
Day 19: Sec+ Exam Objectives Section 4.5
4.5: Explain the key aspects of digital forensics.
- Documentation/evidence
- Legal hold
- Video
- Admissibility
- Chain of custody
- Timelines of sequence of events
- Tags
- Reports
- Event logs
- Interviews
- Acquisition
- Order of volatility
- Disk
- Random-access memory (RAM)
- Swap/pagefile
- OS
- Device
- Firmware
- Snapshot
- Cache
- Network
- Artifacts
- On-premises vs. cloud
- Right-to-audit clauses
- Regulatory/jurisdiction
- Data breach notification laws
- Integrity
- Hashing
- Checksums
- Provenance
- Preservation
- E-discovery
- Data recovery
- Non-repudiation
- Strategic intelligence/counterintelligence
Review 3.0, 4.0
5.0 - Governance, Risk, and Compliance
Day 20: Sec+ Exam Objectives Section 5.1
5.1: Compare and contrast various types of controls.
- Category
- Managerial
- Operational
- Technical
- Control type
- Preventative
- Detective
- Corrective
- Deterrent
- Compensating
- Physical
5.2: Explain the importance of applicable regulations, standards, or frameworks that impact
organizational security posture.
- Regulations, standards, and legislation
- General Data Protection Regulation (GDPR)
- National, territory, or state laws
- Payment Card Industry Data Security Standard (PCI DSS)
- Key frameworks
- Center for Internet Security (CIS)
- National Institute of Standards and Technology (NIST) RMF/CSF
- International Organization for Standardization (ISO) 27001/27002/27701/31000
- SSAE SOC 2 Type I/II
- Cloud security alliance
- Cloud control matrix
- Reference architecture
- Benchmarks /secure configuration guides
- Platform/vendor-specific guides
- Web server
- OS
- Application server
- Network infrastructure devices
Day 21: Sec+ Exam Objectives Section 5.3
5.3: Explain the importance of policies to organizational security.
- Personnel
- Acceptable use policy
- Job rotation
- Mandatory vacation
- Separation of duties
- Least privilege
- Clean desk space
- Background checks
- Non-disclosure agreement (NDA)
- Social media analysis
- Onboarding
- Offboarding
- User training
- Gamification
- Capture the flag
- Phishing campaigns
- Computer-based training (CBT)
- Role-based training
- Diversity of training techniques
- Third-party risk management
- Vendors
- Supply chain
- Business partners
- Service level agreement (SLA)
- Memorandum of understanding (MOU)
- Measurement systems analysis (MSA)
- Business partnership agreement (BPA)
- End of life (EOL)
- End of service (EOS)
- NDA
- Data
- Classification
- Governance
- Retention
- Credential policies
- Personnel
- Third-party
- Devices
- Service accounts
- Administrator/root accounts
- Organizational policies
- Change management
- Change control
- Asset management
Day 22: Sec+ Exam Objectives Section 5.4
5.4: Summarize risk management processes and concepts.
- Risk types
- External
- Internal
- Legacy systems
- Multiparty
- IP theft
- Software compliance/licensing
- Risk management strategies
- Acceptance
- Avoidance
- Transference
- Mitigation
- Risk analysis
- Risk register
- Risk matrix/heat map
- Risk control assessment
- Risk control self-assessment
- Risk awareness
- Inherent risk
- Residual risk
- Control risk
- Risk appetite
- Regulations that affect risk posture
- Risk assessment types
- Likelihood of occurrence
- Impact
- Asset value
- Single loss expectancy (SLE)
- Annualized loss expectancy (ALE)
- Annualized rate of occurrence (ARO)
- Disasters
- Environmental
- Person-made
- Internal vs. external
- Business impact analysis
- Recovery time objective (RTO)
- Recovery point objective (RPO)
- Mean time to repair (MR)
- Mean time between failures (MTBF)
- Functional recovery plans
- Single point of failure
- Disaster recovery plan (DRP)
- Mission essential functions
- Identification of critical systems
- Site risk assessment
Day 23: Sec+ Exam Objectives Section 5.5
5.5: Explain privacy and sensitive data concepts in relation to security.
- Organizational consequences of privacy breaches
- Reputation damage
- Identity theft
- Fines
- IP theft
- Notifications of breaches
- Escalation
- Public notifications and disclosures
- Data types
- Classifications
- Public
- Private
- Sensitive
- Confidential
- Critical
- Proprietary
- Personally identifiable information (PII)
- Health information
- Financial information
- Government data
- Customer data
- Privacy enhancing technologies
- Data minimization
- Data masking
- Tokenization
- Anonymization
- Pseudo-anonymization
- Roles and responsibilities
- Data owners
- Data controller
- Data processor
- Data custodian/steward
- Data protection officer (DPO)
- Information life cycle
- Impact assessment
- Terms of agreement
- Privacy notice
Day 24: Review 1.0, 2.0
REVIEW
Review Chapter 1.0, 2.0
Day 25: Review 3.0-5.5
REVIEW
Review Chapter 3.0-5.5
Day 26: 1.0-5.5
REVIEW
Review Chapter 1.0-5.5
Day 27: EXAM Day
REVIEW
EXAM Day