CompTIA Security+ examination blueprint

Posted on November 3, 2010. Filed under: CompTIA Security+ |


The following list is the example topics and concepts copied from CompTIA Security+ official site.

1.0   Network Security

1.1 Explain the security function and purpose of network devices and

technologies

 Firewalls

 Routers

 Switches

 Load Balancers

 Proxies

 Web security gateways

 VPN concentrators

 NIDS and NIPS (Behavior based, signature based, anomaly based,

heuristic)

 Protocol analyzers

 Sniffers

 Spam filter, all-in-one security appliances

 Web application firewall vs. network firewall

 URL filtering, content inspection, malware inspection

1.2 Apply and implement secure network administration principles

 Rule-based management

 Firewall rules

 VLAN management

 Secure router configuration

 Access control lists

 Port Security

 802.1x

 Flood guards

 Loop protection

 Implicit deny

 Prevent network bridging by network separation

 Log analysis

1.3 Distinguish and differentiate network design elements and compounds

 DMZ

 Subnetting

 VLAN

 NAT

 Remote Access

 Telephony

 NAC

 Virtualization

 Cloud Computing

o Platform as a Service

o Software as a Service

o Infrastructure as a Service

1.4 Implement and use common protocols

 IPSec

 SNMP

 SSH

 DNS

 TLS

 SSL

 TCP/IP

 FTPS

 HTTPS

 SFTP

 SCP

 ICMP

 IPv4 vs. IPv6

1.5 Identify commonly used default network ports

 FTP

 SFTP

 FTPS

 TFTP

 TELNET

 HTTP

 HTTPS

 SCP

 SSH

 NetBIOS

1.6 Implement wireless network in a secure manner

 WPA

 WPA2

 WEP

 EAP

 PEAP

 LEAP

 MAC filter

 SSID broadcast

 TKIP

 CCMP

 Antenna Placement

 Power level controls

2.0   Compliance and Operational Security

2.1 Explain risk related concepts

 Control types

o Technical

o Management

o Operational

 False positives

 Importance of policies in reducing risk

o Privacy policy

o Acceptable use

o Security policy

o Mandatory vacations

o Job rotation

o Separation of duties

o Least privilege

 Risk calculation

o Likelihood

o ALE

o Impact

 Quantitative vs. qualitative

 Risk-avoidance, transference, acceptance, mitigation, deterrence

 Risks associated to Cloud Computing and Virtualization

2.2 Carry out appropriate risk mitigation strategies

 Implement security controls based on risk

 Change management

 Incident management

 User rights and permissions reviews

 Perform routine audits

 Implement policies and procedures to prevent data loss or theft

2.3 Execute appropriate incident response procedures

 Basic forensic procedures

o Order of volatility

o Capture system image

o Network traffic and logs

o Capture video

o Record time offset

o Take hashes

o Screenshots

o Witnesses

o Track man hours and expense

 Damage and loss control

 Chain of custody

 Incident response: first responder

2.4 Explain the importance of security related awareness and training

 Security policy training and procedures

 Personally identifiable information

 Information classification: Sensitivity of data (hard or soft)

 Data labeling, handling and disposal

 Compliance with laws, best practices and standards

 User habits

o Password behaviors

o Data handling

o Clean desk policies

o Prevent tailgating

o Personally owned devices

 Threat awareness

o New viruses

o Phishing attacks

o Zero days exploits

 Use of social networking and P2P

2.5 Compare and contrast aspects of business continuity

 Business impact analysis

 Removing single points of failure

 Business continuity planning and testing

 Continuity of operations

 Disaster recovery

 IT contingency planning

 Succession planning

2.6 Explain the impact and proper use of environmental controls

 HVAC

 Fire suppression

 EMI shielding

 Hot and cold aisles

 Environmental monitoring

 Temperature and humidity controls

 Video monitoring

2.7 Execute disaster recovery plans and procedures

 Backup / backout contingency plans or policies

 Backups, execution and frequency

 Redundancy and fault tolerance

o Hardware

o RAID

o Clustering

o Load balancing

o Servers

 High availability

 Cold site, hot site, warm site

 Mean time to restore, mean time between failures, recovery time objectives

and recovery point objectives

2.8 Exemplify the concepts of confidentiality, integrity and availability (CIA)

3.0   Threats and Vulnerabilities

3.1 Analyze and differentiate among types of malware

 Adware

 Virus

 Worms

 Spyware

 Trojan

 Rootkits

 Backdoors

 Logic bomb

 Botnets

3.2 Analyze and differentiate among types of attacks

 Man-in-the-middle

 DDoS

 DoS

 Replay

 Smurf attack

 Spoofing

 Spam

 Phishing

 Spim

 Vishing

 Spear phishing

 Xmas attack

 Pharming

 Privilege escalation

 Malicious insider threat

 DNS poisoning and ARP poisoning

 Transitive access

 Client-side attacks

3.3 Analyze and differentiate among types of social engineering attacks

 Shoulder surfing

 Dumpster diving

 Tailgating

 Impersonation

 Hoaxes

 Whaling

 Vishing

3.4 Analyze and differentiate among types of wireless attacks

 Rogue access points

 Interference

 Evil twin

 War driving

 Bluejacking

 Bluesnarfing

 War chalking

 IV attack

 Packet sniffing

3.5 Analyze and differentiate among types of application attacks

 Cross-site scripting

 SQL injection

 LDAP injection

 XML injection

 Directory traversal/command injection

 Buffer overflow

 Zero day

 Cookies and attachments

 Malicious add-ons

 Session hijacking

 Header manipulation

3.6 Analyze and differentiate among types of mitigation and deterrent techniques

 Manual bypassing of electronic controls

o Failsafe/secure vs. failopen

 Monitoring system logs

o Event logs

o Audit logs

o Security logs

o Access logs

 Physical security

o Hardware locks

o Mantraps

o Video surveillance

o Fencing

o Proximity readers

o Access list

 Hardening

o Disabling unnecessary services

o Protecting management interfaces and applications

o Password protection

o Disabling unnecessary accounts

 Port security

o MAC limiting and filtering

o 802.1x

o Disabling unused ports

 Security posture

o Initial baseline configuration

o Continuous security monitoring

o remediation

 Reporting

o Alarms

o Alerts

o Trends

 Detection controls vs. prevention controls

o IDS vs. IPS

o Camera vs. guard

3.7 Implement assessment tools and techniques to discover security threats and

vulnerabilities

 Vulnerability scanning and interpret results

 Tools

o Protocol analyzer

o Sniffer

o Vulnerability scanner

o Honeypots

o Honeynets

o Port scanner

 Risk calculations

o Threat vs. likelihood

 Assessment types

o Risk

o Threat

o Vulnerability

 Assessment technique

o Baseline reporting

o Code review

o Determine attack surface

o Architecture

o Design reviews

3.8 Within the realm of vulnerability assessments, explain the proper use of

penetration testing versus vulnerability scanning

 Penetration testing

o Verify a threat exists

o Bypass security controls

o Actively test security controls

o Exploiting vulnerabilities

 Vulnerability scanning

o Passively testing security controls

o Indentify vulnerability

o Indentify lack of security controls

o Indentify common misconfiguration

 Black box

 White box

 Gray box

4.0   Application, Data and Host Security

4.1 Explain the importance of application security

 Fuzzing

 Secure coding concepts

o Error and exception handling

o Input validation

 Cross-site scripting prevention

 Cross-site Request Forgery (XSRF) prevention

 Application configuration baseline (proper settings)

 Application hardening

 Application patch management

4.2 Carry out appropriate procedures to establish host security

 Operating system security and settings

 Anti-malware

o Anti-virus

o Anti-spam

o Anti-spyware

o Pop-up blockers

o Host-based firewalls

 Patch management

 Hardware security

o Cable locks

o Safe

o Locking cabinets

 Host software baselining

 Mobile devices

o Screen lock

o Strong password

o Device encryption

o Remote wipe/sanitation

o Voice encryption

o GPS tracking

 Virtualization

4.3 Explain the importance of data security

 Data Loss Prevention (DLP)

 Data encryption

o Full disk

o Database

o Individual files

o Removable media

o Mobile devices

 Hardware based encryption devices

o TPM

o HSM

o USB encryption

o Hard drive

 Cloud computing

5.0   Access Control and Identity Management

5.1 Explain the function and purpose of authentication services

 RADIUS

 TACACS

 TACACS+

 Kerberos

 LDAP

 XTACACS

5.2 Explain the fundamental concepts and best practices related to authentication,

authorization and access control

 Identification vs. authentication

 Authentication (single factor) and authorization

 Multifactor authentication

 Biometrics

 Tokens

 Common access card

 Personal identification verification card

 Smart card

 Least privilege

 Separation of duties

 Single sign on

 ACLs

 Access control

 Mandatory access control

 Discretionary access control

 Role/rule-based access control

 Implicit deny

 Time of day restrictions

 Trusted OS

 Mandatory vacations

 Job rotation

5.3 Implement appropriate security controls when performing account

management

 Mitigates issues associated with users with multiple account/roles

 Account policy enforcement

o Password complexity

o Expiration

o Recovery

o Length

o Disablement

o Lockout

 Group based privileges

 User assigned privileges

6.0   Cryptography

6.1 Summarize general cryptography concepts

 Symmetric vs. asymmetric

 Fundamental differences and encryption methods

o Block vs. stream

 Transport encryption

 Non-repudiation

 Hashing

 Key escrow

 Steganography

 Digital signatures

 Use of proven technologies

 Elliptic curve and quantum cryptography

6.2 Use and apply appropriate cryptographic tools and products

 WEP vs. WPA/WPA2 and preshared key

 MD5

 SHA

 RIPEMD

 AES

 DES

 3DES

 HMAC

 RSA

 RC4

 One-time-pads

 CHAP

 PAP

 NTLM

 NTLMv2

 Blowfish

 PGP/GPG

 Whole disk encryption

 TwoFish

 Comparative strengths of algorithms

 Use of algorithms with transport encryption

o SSL

o TLS

o IPSec

o SSH

o HTTPS

6.3 Explain the core concepts of public key infrastructure

 Certificate authorities and digital certificates

o CA

o CRLs

 PKI

 Recovery agent

 Public key

 Private key

 Registration

 Key escrow

 Trust models

 

6.4 Implement PKI, certificate management and associated components

 Certificate authorities and digital certificates

o CA

o CRLs

 PKI

 Recovery agent

 Public key

 Private keys

 Registration

 Key escrow

 Trust models


 

Advertisements

Make a Comment

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Liked it here?
Why not try sites on the blogroll...

%d bloggers like this: