Security+ The Last Mile
Security+ The Last Mile
Your guide to the finish line
About the Book
Like his popular Security+ exam prep series on YouTube, "Security+ The Last Mile" is designed as a consolidated reference that makes advanced exam topics accessible, bringing focus to important exam topics, revealing the "what and why" of key exam concepts without wasting time or space.
Table of Contents
- Preface (Read this first!)
- Legend
- Exam Prep Strategy
- Exam Mindset
- Time management
- Evaluating Exam Answers (The READ Strategy)
- Recommended Study Materials
- Books
- Practice Questions
- Video Training
- Flashcards
- Chapter 1:Domain 1: General Security Concepts
- 1.1 Compare and contrast various types of security controls
- 1.1.1 Categories
- 1.1.2 Control Types
- 1.2 Summarize fundamental security concepts
- 1.2.1 Confidentiality, Integrity, and Availability (CIA)
- 1.2.2 Non-repudiation
- 1.2.3 Authentication, Authorization, and Accounting (AAA)
- 1.2.4 Gap analysis
- 1.2.5 Zero Trust
- 1.2.6 Physical security
- 1.2.7 Deception and disruption technology
- 1.3 Explain the importance of change management processes and the impact to security
- 1.3.1 Business processes impacting security operation
- 1.3.2 Technical implications
- 1.3.3 Documentation
- 1.3.4 Version control
- 1.4 Explain the importance of using appropriate cryptographic solutions
- 1.4.1 Public key infrastructure (PKI)
- 1.4.2 Encryption
- 1.4.3 Tools
- 1.4.4 Obfuscation
- 1.4.5 Hashing
- 1.4.6 Salting
- 1.4.7 Digital signatures
- 1.4.8 Key stretching
- 1.4.9 Blockchain
- 1.4.10 Open public ledger
- 1.4.11 Certificates
- 1.1 Compare and contrast various types of security controls
- Chapter 2:Domain 2: Threats, Vulnerabilities, and Mitigations
- 2.1 Compare and contrast common threat actors and motivations
- 2.1.1 Threat actors
- 2.1.2 Attributes of actors
- 2.1.3 Motivations
- 2.2 Explain common threat vectors and attack surfaces
- 2.2.1 Message-based
- 2.2.2 Image-based
- 2.2.3 File-based
- 2.2.4 Voice call
- 2.2.5 Removable device
- 2.2.6 Vulnerable software
- 2.2.7 Unsupported systems and applications
- 2.2.8 Unsecure networks
- 2.2.9 Open service ports
- 2.2.10 Default credentials
- 2.2.11 Supply chain
- 2.2.12 Human vectors / social engineering
- 2.3 Explain various types of vulnerabilities
- 2.3.1 Application
- 2.3.2 Operating system (OS)-based
- 2.3.3 Web-based
- 2.3.4 Hardware
- 2.3.5 Virtualization
- 2.3.6 Cloud-specific
- 2.3.7 Supply chain
- 2.3.8 Cryptographic
- 2.3.9 Misconfiguration
- 2.3.10 Mobile device
- 2.3.11 Zero-day
- 2.4 Explain common attacks and indicators
- 2.4.1 Malware attacks
- 2.4.2 Physical attacks
- 2.4.3 Network attacks
- 2.4.4 Application attacks
- 2.4.5 Cryptographic attacks
- 2.4.6 Password attacks
- 2.4.7 Indicators of malicious activity
- 2.5 Explain the purpose of mitigation techniques used to secure the enterprise
- 2.5.1 Segmentation
- 2.5.2 Access control
- 2.5.3 Application allow list
- 2.5.4 Isolation
- 2.5.5 Patching
- 2.5.6 Encryption
- 2.5.7 Monitoring
- 2.5.8 Least privilege
- 2.5.9 Configuration enforcement
- 2.5.10 Decommissioning
- 2.5.11 Hardening techniques
- 2.1 Compare and contrast common threat actors and motivations
- Chapter 3:Domain 3: Security Architecture
- 3.1 Compare and contrast security implications of different architecture models
- 3.1.1 Architecture and infrastructure concepts
- 3.1.2 Considerations
- 3.2 Given a scenario, apply security principles to secure enterprise infrastructure
- 3.2.1 Infrastructure considerations
- 3.2.2 Secure communication/access
- 3.2.3 Selection of effective controls
- 3.3 Compare and contrast concepts and strategies to protect data
- 3.3.1 Data types
- 3.3.2 Data classifications
- 3.3.3 General data considerations
- 3.3.4 Methods to secure data
- 3.4 Explain the importance of resilience and recovery in security architecture
- 3.4.1 High availability (HA)
- 3.4.2 Site considerations
- 3.4.3 Platform diversity
- 3.4.4 Multi-cloud systems
- 3.4.5 Continuity of operations (COOP)
- 3.4.6 Capacity planning
- 3.4.7 Testing (Disaster Recovery / Incident Response Exercises)
- 3.4.8 Backups
- 3.4.9 Power
- 3.1 Compare and contrast security implications of different architecture models
- Chapter 4:Domain 4: Security Operations
- 4.1 Given a scenario, apply common security techniques to computing resources
- 4.1.1 Secure baselines
- 4.1.2 Hardening targets
- 4.1.3 Wireless devices
- 4.1.4 Mobile solutions
- 4.1.5 Wireless security settings
- 4.1.6 Application security
- 4.1.7 Sandboxing
- 4.1.8 Monitoring
- 4.2 Explain the security implications of proper hardware, software, and data asset management
- 4.2.1 Acquisition/procurement process
- 4.2.2 Assignment/accounting
- 4.2.3 Monitoring/asset tracking
- 4.2.4 Disposal/decommissioning
- 4.3 Explain various activities associated with vulnerability management
- 4.3.1 Identification methods
- 4.3.2 Analysis
- 4.3.3 Vulnerability Response and Remediation
- 4.3.4 Validation of Remediation
- 4.3.5 Reporting
- 4.4 Explain security alerting and monitoring concepts and tools
- 4.4.1 Monitoring computing resources
- 4.4.2 Activities
- 4.4.3 Tools
- 4.5 Given a scenario, modify enterprise capabilities to enhance security
- 4.5.1 Firewall
- 4.5.2 IDS/IPS
- 4.5.3 Web filter
- 4.5.4 Operating system security
- 4.5.5 Implementation of secure protocols
- 4.5.6 DNS filtering
- 4.5.7 Email security
- 4.5.8 File integrity monitoring (FIM)
- 4.5.9 Data Loss Prevention (DLP)
- 4.5.10 Network access control (NAC)
- 4.5.11 Endpoint detection and response (EDR/XDR)
- 4.5.12 User behavior analytics (UBA)
- 4.6 Given a scenario, implement and maintain identity and access management
- 4.6.1 Provisioning/de-provisioning user accounts
- 4.6.2 Permission assignments and implications
- 4.6.3 Identity proofing
- 4.6.4 Federation
- 4.6.5 Single sign-on (SSO)
- 4.6.6 Interoperability
- 4.6.7 Attestation
- 4.6.8 Access controls
- 4.6.9 Multifactor authentication (MFA)
- 4.6.10 Password concepts
- 4.6.11 Privileged access management (PAM) tools
- 4.7 Explain the importance of automation and orchestration related to secure operations
- 4.7.1 Use cases of automation and scripting
- 4.7.2 Benefits
- 4.7.3 Other considerations
- 4.8 Explain appropriate incident response activities
- 4.8.1 Process
- 4.8.2 Training
- 4.8.3 Testing
- 4.8.4 Root Cause Analysis (RCA)
- 4.8.5 Threat hunting
- 4.8.6 Digital forensics
- 4.9 Given a scenario, use data sources to support an investigation
- 4.9.1 Log data
- 4.9.2 Additional data sources
- 4.1 Given a scenario, apply common security techniques to computing resources
- Chapter 5:Domain 5: Security Program Management and Oversight
- 5.1 Summarize elements of effective security governance
- 5.1.1 Guidelines
- 5.1.2 Policies
- 5.1.3 Standards
- 5.1.4 Procedures
- 5.1.5 External considerations
- 5.1.6 Monitoring and revision
- 5.1.7 Types of governance structures
- 5.1.8 Roles and responsibilities for systems and data
- 5.2 Explain elements of the risk management process
- 5.2.1 Risk Identification
- 5.2.2 Risk Assessment
- 5.2.3 Risk Analysis
- 5.2.4 The Risk Register and Risk Matrix
- 5.2.5 Risk Tolerance
- 5.2.6 Risk Appetite
- 5.2.7 Risk Management Strategies (Risk Treatment/Response)
- 5.2.8 Risk Reporting
- 5.2.9 Business Impact Analysis (BIA)
- 5.3 Explain the processes associated with third-party risk assessment and management
- 5.3.1 Vendor assessment
- 5.3.2 Vendor selection
- 5.3.3 Agreement types
- 5.3.4 Vendor Monitoring
- 5.3.5 Questionnaires
- 5.3.6 Rules of Engagement (RoE)
- 5.4 Summarize elements of effective security compliance
- 5.4.2 Consequences of non-compliance
- 5.4.3 Compliance monitoring
- 5.4.4 Privacy
- 5.5 Explain types and purposes of audits and assessments
- 5.5.1 Attestation
- 5.5.2 Internal
- 5.5.3 External
- 5.5.4 Penetration testing
- 5.6 Given a scenario, implement security awareness practices
- 5.6.1 Phishing
- 5.6.2 Anomalous behavior recognition
- 5.6.3 User guidance and training
- 5.6.4 Reporting and monitoring (of the awareness program)
- 5.6.5 Development (of training materials)
- 5.6.6 Execution (of training program)
- What’s Next?
- 5.1 Summarize elements of effective security governance
- Appendix A - Acronyms (CompTIA Security+ Official)
- Appendix B - Ports and Protocols Reference
- Appendix C - Frameworks Reference
- Preface (Read this first!)
The Leanpub 60 Day 100% Happiness Guarantee
Within 60 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.
Now, this is technically risky for us, since you'll have the book or course files either way. But we're so confident in our products and services, and in our authors and readers, that we're happy to offer a full money back guarantee for everything we sell.
You can only find out how good something is by trying it, and because of our 100% money back guarantee there's literally no risk to do so!
So, there's no reason not to click the Add to Cart button, is there?
See full terms...
Earn $8 on a $10 Purchase, and $16 on a $20 Purchase
We pay 80% royalties on purchases of $7.99 or more, and 80% royalties minus a 50 cent flat fee on purchases between $0.99 and $7.98. You earn $8 on a $10 sale, and $16 on a $20 sale. So, if we sell 5000 non-refunded copies of your book for $20, you'll earn $80,000.
(Yes, some authors have already earned much more than that on Leanpub.)
In fact, authors have earnedover $14 millionwriting, publishing and selling on Leanpub.
Learn more about writing on Leanpub
Free Updates. DRM Free.
If you buy a Leanpub book, you get free updates for as long as the author updates the book! Many authors use Leanpub to publish their books in-progress, while they are writing them. All readers get free updates, regardless of when they bought the book or how much they paid (including free).
Most Leanpub books are available in PDF (for computers) and EPUB (for phones, tablets and Kindle). The formats that a book includes are shown at the top right corner of this page.
Finally, Leanpub books don't have any DRM copy-protection nonsense, so you can easily read them on any supported device.
Learn more about Leanpub's ebook formats and where to read them