課程名稱:CompTIA Security+ 國際認可證書課程 - 簡稱:CompTIA Security+ Training Course |
SY0-701 CompTIA Security+ (30 Hours)
1. General Security Concepts
1.1 Compare and contrast various types of security controls
1.1.1 Categories
1.1.2 Control Types
1.2 Compare and contrast various types of security controls (cont.)
1.2.1 Confidentiality, Integrity, and Availability (CIA)
1.2.2 Confidentiality and Encryption Strength
1.2.3 Integrity
1.2.4 Digital Signatures
1.2.5 Avialability
1.2.6 Non-repudiation
1.2.7 Authentication, Authorization, and Accounting (AAA)
1.2.8 Gap analysis
1.2.9 Zero Trust
1.2.10 Physical security
1.2.11 Deception and Disruptive Technology
1.3 Explain the importance of change management processes and the impact to security
1.3.1 Business processes impacting security operation
1.3.2 Technical implications
1.3.3 Documentation
1.3.4 Version control
1.4 Explain the importance of using appropriate cryptographic solutions
1.4.1 Public key infrastructure (PKI)
1.4.2 Encryption
1.4.3 Tools
1.4.4 Obfuscation
1.4.5 Hashing
1.4.6 Salting
1.4.7 Digital signatures
1.4.8 Key stretching
1.4.9 Blockchain
1.4.10 Open public ledger
1.5 Digital Certificates
1.5.1 Using Public Key Infrastructure
1.5.2 Using a Certification Authority
1.5.3 Registration Authority
1.5.4 Implementing Certificates
1.5.5 X.509 Certificates
1.5.6 Certificate Policies
1.5.7 Certificate Practice Statements
1.5.8 Certificate Revocation Process
1.5.9 Concepts of Trust Models
1.5.10 Hierarchical Trust Model
1.5.11 Bridge Trust Model
1.5.12 Mesh Trust Model
1.5.13 Hybrid Trust Model
2. Threats, Vulnerabilities, and Mitigations
2.1 Compare and contrast common threat actors and motivations
2.1.1 Threat actors
2.1.2 Attributes of actors
2.1.3 Motivations
2.2 Explain common threat vectors and attack surfaces
2.2.1 Message-based
2.2.2 Image-based
2.2.3 File-based
2.2.4 Voice call
2.2.5 Removable device
2.2.6 Vulnerable software
2.2.7 Unsupported systems and applications
2.2.8 Unsecure networks
2.2.9 Open service ports
2.2.10 Default credentials
2.2.11 Supply chain
2.2.12 Human vectors
2.2.13 Social Engineering
2.2.14 Types of Social Engineering Attacks
2.2.15 Shoulder Surfing
2.2.16 Dumpster Diving
2.2.17 Tailgating
2.2.18 Impersonation
2.2.19 Hoaxes
2.3 Explain various types of vulnerabilities
2.3.1 Application
2.3.2 Operating system (OS)-based
2.3.3 Web-based
2.3.4 Hardware
2.3.5 Virtualization
2.3.6 Cloud-specific
2.3.7 Supply chain
2.3.8 Cryptographic
2.3.9 Misconfiguration
2.3.10 Mobile device
2.3.11 Zero-day
2.4 Given a scenario, analyze indicators of malicious activity
2.4.1 Malware attacks
2.4.2 Physical attacks
2.4.3 Network attacks
2.4.4 Application attacks
2.4.5 Cryptographic attacks
2.4.6 Password attacks
2.5 Explain the purpose of mitigation techniques used to secure the enterprise
2.5.1 Segmentation
2.5.2 Access control
2.5.3 Application allow list
2.5.4 Isolation
2.5.5 Patching
2.5.6 Encryption
2.5.7 Monitoring
2.5.8 Least privilege
2.5.9 Configuration enforcement
2.5.10 Decommissioning
2.5.11 Hardening techniques
3. Security Architecture
3.1 Compare and contrast security implications of different architecture models
3.1.1 Architecture and infrastructure concepts
3.1.2 Considerations
3.2 Given a scenario, apply security principles to secure enterprise infrastructure
3.2.1 Infrastructure considerations
3.2.2 Secure communication/access
3.2.3 Demilitarized Zones
3.2.4 Subnetting
3.2.5 Virtual Local Area Networks
3.2.6 Remote Access
3.2.7 A Quick Comparison of different Tunneling protocols
3.2.8 Network Address Translation
3.2.9 Telephony
3.2.10 Selection of effective controls
3.3 Compare and contrast concepts and strategies to protect data
3.3.1 Data types
3.3.2 Data classifications
3.3.3 General data considerations
3.3.4 Methods to secure data
3.4 Explain the importance of resilience and recovery in security architecture
3.4.1 High availability
3.4.2 Site considerations
3.4.3 Platform diversity
3.4.4 Multi-cloud systems
3.4.5 Continuity of operations
3.4.6 Capacity planning
3.4.7 Testing
3.4.8 Backups
4. Security Operations
4.1 Apply common security techniques to computing resources
4.1.1 Secure baselines
4.1.2 Hardening targets
4.1.3 Wireless devices
4.1.4 Wireless security settings
4.1.5 Mobile solutions
4.1.6 Application security
4.1.7 Sandboxing
4.1.8 Monitoring
4.2 Explain the security implications of proper hardware, software, and data asset management
4.2.1 Acquisition/procurement process
4.2.2 Assignment/accounting
4.2.3 Disposal/decommissioning
4.3 Explain various activities associated with vulnerability management
4.3.1 Identification methods
4.3.2 Analysis
4.3.3 Vulnerability response and remediation
4.3.4 Validation of remediation
4.3.5 Reporting
4.4 Explain security alerting and monitoring concepts and tools
4.4.1 Monitoring computing resources
4.4.2 Activities
4.4.3 Tools
4.5 Modify enterprise capabilities to enhance security
4.5.1 Firewall
4.5.2 IDS/IPS
4.5.3 Web filter
4.5.4 Operating system security
4.5.5 Implementation of secure protocols
4.5.6 DNS filtering
4.5.7 Email security
4.5.8 File integrity monitoring
4.5.9 Data loss prevention (DLP)
4.5.10 Network access control (NAC)
4.5.11 Endpoint detection and response
4.6 Implement and maintain identity and access management
4.6.1 Provisioning/de-provisioning user accounts
4.6.2 Permission assignments and implications
4.6.3 Identity proofing
4.6.4 Federation
4.6.5 Single sign-on (SSO)
4.6.6 Common scenarios and recommendations
4.6.7 How Azure AD Delivers Cloud Governed Management for On-Premises Workloads
4.6.8 The Azure AD approach to cloud governed identity management
4.6.9 Cloud governed management for AD-integrated applications
4.6.10 Credential management for Active Directory accounts
4.6.11 Cloud governed management for on-premises federation-based applications
4.6.12 Ongoing access management across cloud and on-premises applications
4.6.13 Future directions
4.6.14 Interoperability
4.6.15 JSON Web Key Set Properties
4.6.16 OAuth 2.0 authorization code flow
4.6.17 Attestation
4.6.18 Access controls
4.6.19 Multifactor authentication
4.6.20 Password concepts
4.6.21 Privileged access management tools
4.7 Explain the importance of automation and orchestration related to secure operations
4.7.1 Use cases of automation and scripting
4.7.2 Benefits
4.7.3 Other considerations
4.8 Appropriate incident response activities
4.8.1 Process
4.8.2 Training
4.8.3 Testing
4.8.4 Root cause analysis
4.8.5 Threat hunting
4.8.6 Digital forensics
4.9 Use data sources to support an investigation.
4.9.1 Log data
4.9.2 Data sources
5. Security Program Management and Oversight
5.1 Summarize elements of effective security governance
5.1.1 Guidelines
5.1.2 Policies
5.1.3 Standards
5.1.4 Procedures
5.1.5 External considerations
5.1.6 Monitoring and revision
5.1.7 Types of governance structures
5.1.8 Roles and responsibilities for systems and data
5.2 Explain elements of the risk management process
5.2.1 Risk Assessment
5.2.2 Computing Risk Assessment and Risk Calculations
5.2.3 Quantitative vs. Qualitative Risk Assessment
5.2.4 Risk – related Terminology
5.2.5 Recovery Time Objective
5.2.6 Recovery Point Objective
5.2.7 Acting on Your Risk Assessment
5.2.8 A Case Study of Acting and Reacting to Risks
5.2.9 Cloud Computing Risks
5.2.10 Virtualization Risks
5.2.11 Developing Policies, Standards, and Guidelines
5.2.12 Implementing Policies
5.2.13 Incorporating Standards
5.2.14 Following Guidelines
5.2.15 Business Policies to Implement
5.2.16 Separation of Duties Policies
5.2.17 Privacy Policies
5.2.18 Acceptable Use Policies
5.2.19 Least Privilege
5.2.20 Succession Planning
5.2.21 Business Impact Analysis (BIA)
5.2.22 Identifying Critical Systems and Components
5.2.23 Formulating Business Continuity Plans
5.2.24 High Availability (HA)
5.2.25 Redundancy
5.2.26 Fault Tolerance (FT)
5.3 The processes associated with third-party risk assessment and management
5.3.1 Vendor assessment
5.3.2 Vendor selection
5.3.3 Agreement types
5.3.4 Vendor monitoring
5.3.5 Questionnaires
5.3.6 Rules of engagement
5.4 Summarize elements of effective security compliance
5.4.1 Compliance reporting
5.4.2 Consequences of non-compliance
5.4.3 Compliance monitoring
5.4.4 Privacy
5.5 Types and purposes of audits and assessments
5.5.1 Attestation
5.5.2 Internal
5.5.3 External
5.5.4 Penetration testing
5.6 Implement security awareness practices
5.6.1 Phishing
5.6.2 Anomalous behavior recognition
5.6.3 User guidance and training
5.6.4 Reporting and monitoring
5.6.5 Development
5.6.6 Execution
5.7 Cloud Security Risk Assessment
5.8 Cloud Security Posture Assessment
5.8.1 Why Do A Cloud Security Assessment?
5.8.2 What is a Cloud Security Posture Assessment?
5.8.3 What Happens During a Cloud Security Posture Assessment?
5.8.4 Benefits of Doing a Cloud Security Posture Assessment
5.8.5 Conclusion
5.9 Cloud Data Security Life Cycle
5.10 Cloud Data Sensitivity and Classification
5.10.1 Introduction
5.10.2 Data classification fundamentals
5.10.3 Controlling access to data
5.10.4 Roles and responsibilities in cloud computing
5.10.5 Classification process
5.10.6 Protecting confidential data
5.10.7 Data loss prevention
5.10.8 Conclusion
|