{"id":211,"date":"2019-11-02T18:57:49","date_gmt":"2019-11-02T18:57:49","guid":{"rendered":"http:\/\/www.spktechfit.com\/?p=211"},"modified":"2020-08-28T20:10:12","modified_gmt":"2020-08-28T20:10:12","slug":"comptia-security-sy0-501-study-notes","status":"publish","type":"post","link":"https:\/\/www.spktechfit.com\/?p=211","title":{"rendered":"Comptia Security+ (SY0-501) Study Notes"},"content":{"rendered":"<h4>I am working my way through the online course &#8220;Cert Prep: CompTIA Security+&#8221; by Michael Chapple. This is available on Lynda and LinkedIn Learning. These are my study notes-<\/h4>\n<h2>Section 1 &#8211; Threats, Attacks and Vulnerabilities<\/h2>\n<p><a href=\"http:\/\/www.spktechfit.com\/?p=109\" target=\"_blank\" rel=\"noopener noreferrer\">1.1 Malware<\/a><\/p>\n<p><a href=\"http:\/\/www.spktechfit.com\/?p=117\" target=\"_blank\" rel=\"noopener noreferrer\">1.2 Understanding Attackers<\/a><\/p>\n<p><a href=\"http:\/\/www.spktechfit.com\/?p=122\" target=\"_blank\" rel=\"noopener noreferrer\">1.3 Understanding Attack Types<\/a><\/p>\n<p><a href=\"http:\/\/www.spktechfit.com\/?p=159\">1.4 Application Attacks<\/a><\/p>\n<p><a href=\"http:\/\/www.spktechfit.com\/?p=183\">1.5 Vulnerability Scanning and Penetration Testing<\/a><\/p>\n<p><a href=\"http:\/\/www.spktechfit.com\/?p=193\">1.6 Impact of Vulnerabilities<\/a><\/p>\n<p>&nbsp;<\/p>\n<h2>Section 2 &#8211; Technologies and Tools<\/h2>\n<p><a href=\"http:\/\/www.spktechfit.com\/?p=198\">2.1 TCP\/IP<\/a><\/p>\n<p><a href=\"http:\/\/www.spktechfit.com\/?p=208\">2.2 Network Security Devices<\/a><\/p>\n<p><a href=\"http:\/\/www.spktechfit.com\/?p=234\">2.3 Managing Secure Networks<\/a><\/p>\n<p><a href=\"http:\/\/www.spktechfit.com\/?p=241\">2.4 Wireless Networking<\/a><\/p>\n<p><a href=\"http:\/\/www.spktechfit.com\/?p=249\" target=\"_blank\" rel=\"noopener noreferrer\">2.5 Security and Monitoring Technologies<\/a><\/p>\n<p><a href=\"http:\/\/www.spktechfit.com\/?p=262\" target=\"_blank\" rel=\"noopener noreferrer\">2.6 Security Assessment Tools<\/a><\/p>\n<p><a href=\"http:\/\/www.spktechfit.com\/?p=268\" target=\"_blank\" rel=\"noopener noreferrer\">2.7 Security Troubleshooting<\/a><\/p>\n<p><a href=\"http:\/\/www.spktechfit.com\/?p=276\" target=\"_blank\" rel=\"noopener noreferrer\">2.8 Personnel Security<\/a><\/p>\n<p><a href=\"http:\/\/www.spktechfit.com\/?p=280\" target=\"_blank\" rel=\"noopener noreferrer\">2.9 Host Security<\/a><\/p>\n<p><a href=\"http:\/\/www.spktechfit.com\/?p=283\" target=\"_blank\" rel=\"noopener noreferrer\">2.10 Mobile Device Security<\/a><\/p>\n<p><a href=\"http:\/\/www.spktechfit.com\/?p=287\" target=\"_blank\" rel=\"noopener noreferrer\">2.11 Securing Protocols<\/a><\/p>\n<p>&nbsp;<\/p>\n<h2>Section 3 &#8211; Architecture &amp; Design<\/h2>\n<p><a href=\"http:\/\/www.spktechfit.com\/?p=306\" target=\"_blank\" rel=\"noopener noreferrer\">3.1 Security Design<\/a><\/p>\n<p><a href=\"http:\/\/www.spktechfit.com\/?p=316\" target=\"_blank\" rel=\"noopener noreferrer\">3.2 User Training<\/a><\/p>\n<p><a href=\"http:\/\/www.spktechfit.com\/?p=321\" target=\"_blank\" rel=\"noopener noreferrer\">3.3 Security Network Design<\/a><\/p>\n<p><a href=\"http:\/\/www.spktechfit.com\/?p=333\" target=\"_blank\" rel=\"noopener noreferrer\">3.4 Secure Systems Design<\/a><\/p>\n<p><a href=\"http:\/\/www.spktechfit.com\/?p=336\" target=\"_blank\" rel=\"noopener noreferrer\">3.5. Secure Staging and Development<\/a><\/p>\n<p><a href=\"http:\/\/www.spktechfit.com\/?p=342\" target=\"_blank\" rel=\"noopener noreferrer\">3.6 Embedded System Security<\/a><\/p>\n<p><a href=\"http:\/\/www.spktechfit.com\/?p=346\" target=\"_blank\" rel=\"noopener noreferrer\">3.7 Software Development Security<\/a><\/p>\n<p><a href=\"http:\/\/www.spktechfit.com\/?p=354\" target=\"_blank\" rel=\"noopener noreferrer\">3.8 Cloud Computing and Virtualisation<\/a><\/p>\n<p><a href=\"http:\/\/www.spktechfit.com\/?p=362\" target=\"_blank\" rel=\"noopener noreferrer\">3.9 Physical Security<\/a><\/p>\n<p>&nbsp;<\/p>\n<h2>Section 4 &#8211; Identification, Authentication, Authorisation, Accounting<\/h2>\n<p><a href=\"http:\/\/www.spktechfit.com\/?p=370\" target=\"_blank\" rel=\"noopener noreferrer\">4.1 Identification<\/a><\/p>\n<p><a href=\"http:\/\/www.spktechfit.com\/?p=372\" target=\"_blank\" rel=\"noopener noreferrer\">4.2 Authentication<\/a><\/p>\n<p><a href=\"http:\/\/www.spktechfit.com\/?p=389\" target=\"_blank\" rel=\"noopener noreferrer\">4.3 Authorisation<\/a><\/p>\n<p><a href=\"http:\/\/www.spktechfit.com\/?p=392\" target=\"_blank\" rel=\"noopener noreferrer\">4.4 Account Management<\/a><\/p>\n<p>&nbsp;<\/p>\n<h2>Section 5 &#8211; Risk Management<\/h2>\n<p><a href=\"http:\/\/www.spktechfit.com\/?p=396\" target=\"_blank\" rel=\"noopener noreferrer\">5.1 Control and Risks<\/a><\/p>\n<p><a href=\"http:\/\/www.spktechfit.com\/?p=410\" target=\"_blank\" rel=\"noopener noreferrer\">5.2 Supply Chain Risk<\/a><\/p>\n<p><a href=\"http:\/\/www.spktechfit.com\/?p=415\" target=\"_blank\" rel=\"noopener noreferrer\">5.3 Business Continuity and Disaster Recovery<\/a><\/p>\n<p><a href=\"http:\/\/www.spktechfit.com\/?p=422\" target=\"_blank\" rel=\"noopener noreferrer\">5.4 Incident Response<\/a><\/p>\n<p><a href=\"http:\/\/www.spktechfit.com\/?p=426\" target=\"_blank\" rel=\"noopener noreferrer\">5.5 Forensics<\/a><\/p>\n<p><a href=\"http:\/\/www.spktechfit.com\/?p=430\" target=\"_blank\" rel=\"noopener noreferrer\">5.6 Data Security and Privacy<\/a><\/p>\n<p>&nbsp;<\/p>\n<h2>Section 6 &#8211; Cryptography<\/h2>\n<p><a href=\"http:\/\/www.spktechfit.com\/?p=435\" target=\"_blank\" rel=\"noopener noreferrer\">6.1 Encryption<\/a><\/p>\n<p><a href=\"https:\/\/www.spktechfit.com\/?p=451\" target=\"_blank\" rel=\"noopener noreferrer\">6.2 Symmetric Cryptography<\/a><\/p>\n<p><a href=\"https:\/\/www.spktechfit.com\/?p=458\" target=\"_blank\" rel=\"noopener noreferrer\">6.3 Asymmetric Cyptography<\/a><\/p>\n<p><a href=\"https:\/\/www.spktechfit.com\/?p=469\" target=\"_blank\" rel=\"noopener noreferrer\">6.4 Key Management<\/a><\/p>\n<p><a href=\"https:\/\/www.spktechfit.com\/?p=475\" target=\"_blank\" rel=\"noopener noreferrer\">6.5 Public Key Infrastructure (PKI)<\/a><\/p>\n<p><a href=\"https:\/\/www.spktechfit.com\/?p=491\" target=\"_blank\" rel=\"noopener noreferrer\">6.6 Cryptanalytic Attacks<\/a><\/p>\n<p><a href=\"https:\/\/www.spktechfit.com\/?p=494\" target=\"_blank\" rel=\"noopener noreferrer\">6.7 Cryptographic Applications<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I am working my way through the online course &#8220;Cert Prep: CompTIA Security+&#8221; by Michael Chapple. This is available on Lynda and LinkedIn Learning. These are my study notes- Section 1 &#8211; Threats, Attacks and Vulnerabilities 1.1 Malware 1.2 Understanding Attackers 1.3 Understanding Attack Types 1.4 Application Attacks 1.5 Vulnerability Scanning and Penetration Testing 1.6 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":115,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[11,10,3],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=\/wp\/v2\/posts\/211"}],"collection":[{"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=211"}],"version-history":[{"count":39,"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=\/wp\/v2\/posts\/211\/revisions"}],"predecessor-version":[{"id":496,"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=\/wp\/v2\/posts\/211\/revisions\/496"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=\/wp\/v2\/media\/115"}],"wp:attachment":[{"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=211"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=211"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=211"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}