Home > Store

CompTIA Security+ SY0-601 Cert Guide Premium Edition and Practice Test, 5th Edition

Premium Edition eBook

  • Your Price: $55.99
  • List Price: $69.99
  • About Premium Edition eBooks
  • The Premium Edition eBook and Practice Test is a digital-only certification preparation product combining an eBook with enhanced Pearson Test Prep practice tests.

    Your purchase will deliver:

    • Link to download the Pearson Test Prep exam engine
    • Access code for question database
    • eBook in the following formats, accessible from your Account page after purchase:

    EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    PDF The popular standard, which reproduces the look and layout of the printed page.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

    eBook FAQ

    eBook Download Instructions

Also available in other formats.

Register your product to gain access to bonus material or receive a coupon.


  • Copyright 2022
  • Pages: 1216
  • Edition: 5th
  • Premium Edition eBook
  • ISBN-10: 0-13-677023-1
  • ISBN-13: 978-0-13-677023-7

The exciting new CompTIA Security+ SY0-601 Cert Guide Premium Edition eBook and Practice Test is a digital-only certification preparation product combining an eBook with enhanced Pearson Test Prep practice test software. The Premium Edition eBook and Practice Test contains the following items:

* The CompTIA Security+ SY0-601 Premium Edition Practice Test, including four full practice exams and enhanced practice test features
* PDF and EPUB formats of the CompTIA Security+ SY0-601 Cert Guide from Pearson IT Certification, which are accessible via your PC, tablet, and smartphone

About the Premium Edition Practice Test

This Premium Edition contains an enhanced version of the Pearson Test Prep practice test software with four full practice exams. This integrated learning package

* Enables you to focus on individual topic areas or take complete, timed exams
* Includes direct links from each question to detailed tutorials to help you understand the concepts behind the questions
* Provides unique sets of exam-realistic practice questions
* Tracks your performance and provides feedback on a module-by-module basis, laying out a complete assessment of your knowledge to help you focus your study where it is needed most

Pearson Test Prep Practice Test software minimum system requirements:
Pearson Test Prep online system requirements:
Browsers: Chrome version 73 and above; Safari version 12 and above; Microsoft Edge 44 and above. Devices: Desktop and laptop computers, tablets running on Android v8.0 and iOS v13, smartphones with a minimum screen size of 4.7". Internet access required.

Pearson Test Prep offline system requirements:Windows 10, Windows 8.1; Microsoft .NET Framework 4.5 Client; Pentium-class 1 GHz processor (or equivalent); 512 MB RAM; 650 MB disk space plus 50 MB for each downloaded practice exam; access to the Internet to register and download exam databases

About the Premium Edition eBook
CompTIA Security+ SY0-601 Cert Guide from Pearson IT Certification enables you to succeed on the CompTIA Security+ SY0-601 exam by directly addressing the exam's objectives. Leading security experts Omar Santos, Ron Taylor, and Joseph Mlodzianowski share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills.

This complete study package includes

* Complete coverage of the exam objectives and a test-preparation routine proven to help you pass the exams
* Do I Know This Already? quizzes, which allow you to decide how much time you need to spend on each section
* Chapter-ending Key Topic tables, which help you drill on key concepts you must know thoroughly
* An online, interactive Flash Cards application to help you drill on Key Terms by chapter
* A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies
* Study plan suggestions and templates to help you organize and optimize your study time

Well regarded for its level of detail, study plans, assessment features, and challenging review questions and exercises, this study guide helps you master the concepts and techniques that ensure your exam success, including

* Cyber attacks, threats, and vulnerabilities
* Social engineering, wireless attacks, denial of service attacks
* Threat hunting and incident response
* Indicators of compromise and threat intelligence
* Cloud security concepts and cryptography
* Security assessments and penetration testing concepts
* Governance, risk management, and cyber resilience
* Authentication, Authorization, and Accounting (AAA)
* IoT and Industrial Control Systems (ICS) security
* Physical and administrative security controls

Sample Content

Sample Pages

Download the sample pages (includes Chapter 2)

Table of Contents

Introduction xliv
Part I: Threats, Attacks, and Vulnerabilities
Chapter 1 Comparing and Contrasting Different Types of Social Engineering Techniques 3
Do I Know This Already? Quiz 3
Foundation Topics 7
Social Engineering Fundamentals 7
    Phishing and Spear Phishing 9
    Smishing 12
    Vishing 12
    Spam and Spam over Internet Messaging (SPIM) 13
    Dumpster Diving 13
    Shoulder Surfing 14
    Pharming 14
    Piggybacking or Tailgating 15
    Eliciting Information 15
    Whaling 16
    Prepending 17
    Identity Fraud 17
    Invoice Scams 17
    Credential Harvesting 18
    Reconnaissance 18
    Hoaxes 19
    Impersonation or Pretexting 19
    Eavesdropping 19
    Baiting 20
    Watering Hole Attack 20
    Typo Squatting 20
    Influence Campaigns, Principles of Social Engineering, and Reasons for Effectiveness 21
User Security Awareness Education 22
Chapter Review Activities 24
Chapter 2 Analyzing Potential Indicators to Determine the Type of Attack 29
Do I Know This Already? Quiz 29
Foundation Topics 33
Malicious Software (Malware) 33
    Ransomware and Cryptomalware 33
    Trojans 35
    Remote Access Trojans (RATs) and Rootkits 35
    Worms 36
    Fileless Virus 37
    Command and Control, Bots, and Botnets 37
    Logic Bombs 39
    Potentially Unwanted Programs (PUPs) and Spyware 40
    Keyloggers 42
    Backdoors 43
    Malware Delivery Mechanisms 43
    You Cant Save Every Computer from Malware! 45
Password Attacks 45
    Dictionary-based and Brute-force Attacks 45
    Password Spraying 46
    Offline and Online Password Cracking 46
    Rainbow Tables 47
    Plaintext/Unencrypted 47
Physical Attacks 48
    Malicious Flash Drives 48
    Malicious Universal Serial Bus (USB) Cables 48
    Card Cloning Attacks 48
    Skimming 49
Adversarial Artificial Intelligence 50
    Tainted Training Data for Machine Learning 50
    Security of Machine Learning Algorithms 50
Supply-Chain Attacks 51
Cloud-based vs. On-premises Attacks 52
    Cloud Security Threats 52
    Cloud Computing Attacks 54
Cryptographic Attacks 55
    Collision 55
    Birthday 56
    Downgrade 56
Chapter Review Activities 57
Chapter 3 Analyzing Potential Indicators Associated with Application Attacks 61
Do I Know This Already? Quiz 61
Foundation Topics 67
Privilege Escalation 67
Cross-Site Scripting (XSS) Attacks 68
Injection Attacks 70
    Structured Query Language (SQL) Injection Attacks 70
    SQL Injection Categories 73
    Dynamic Link Library (DLL) Injection Attacks 74
    Lightweight Directory Access Protocol (LDAP) Injection Attacks 74
    Extensible Markup Language (XML) Injection Attacks 74
Pointer/Object Dereference 75
Directory Traversal 76
Buffer Overflows 77
    Arbitrary Code Execution/Remote Code Execution 78
Race Conditions 79
Error Handling 79
Improper Input Handling 80
    Compile-Time Errors vs. Runtime Errors 81
Replay Attacks 82
Request Forgeries 85
Application Programming Interface (API) Attacks 86
Resource Exhaustion 87
Memory Leaks 88
Secure Socket Layer (SSL) Stripping 88
Driver Manipulation 89
Pass the Hash 89
Chapter Review Activities 90
Chapter 4 Analyzing Potential Indicators Associated with Network Attacks 95
Do I Know This Already? Quiz 95
Foundation Topics 98
Wireless Attacks 98
    Evil Twin Attacks 98
    Rogue Access Points 99
    Bluesnarfing Attacks 99
    Bluejacking Attacks 100
    Disassociation and Deauthentication Attacks 101
    Jamming Attacks 102
    Radio Frequency Identifier (RFID) Attacks 102
    Near-Field Communication (NFC) Attacks 102
    Initialization Vector (IV) Attacks 103
On-Path Attacks 103
Layer 2 Attacks 105
    Address Resolution Protocol (ARP) Poisoning Attacks 105
    Media Access Control (MAC) Flooding Attacks 106
    MAC Cloning Attacks 106
    Best Practices to Protect Against Layer 2 Attacks 106
Domain Name System (DNS) Attacks 107
    Domain Hijacking Attacks 108
    DNS Poisoning Attacks 108
    Uniform Resource Locator (URL) Redirection Attacks 110
    Domain Reputation 110
Distributed Denial-of-Service (DDoS) Attacks 111
Malicious Code or Script Execution Attacks 113
Chapter Review Activities 114
Chapter 5 Understanding Different Threat Actors, Vectors, and Intelligence Sources 117
Do I Know This Already? Quiz 117
Foundation Topics 120
Actors and Threats 120
Attributes of Threat Actors 122
Attack Vectors 122
Threat Intelligence and Threat Intelligence Sources 123
    Structured Threat Information eXpression (STIX) and the Trusted Automated eXchange of Indicator Information (TAXII) 125
Research Sources 127
    The MITRE ATT&CK Framework 128
Chapter Review Activities 129
Chapter 6 Understanding the Security Concerns Associated with Various Types of Vulnerabilities 133
Do I Know This Already? Quiz 133
Foundation Topics 137
Cloud-based vs. On-premises Vulnerabilities 137
    Other Cloud-based Concerns 143
    Server Defense 144
Zero-day Vulnerabilities 149
Weak Configurations 150
Third-party Risks 155
Improper or Weak Patch Management 160
    Patches and Hotfixes 161
    Patch Management 163
Legacy Platforms 165
The Impact of Cybersecurity Attacks and Breaches 165
Chapter Review Activities 166
Chapter 7 Summarizing the Techniques Used in Security Assessments 171
Do I Know This Already? Quiz 171
Foundation Topics 175
Threat Hunting 175
    Security Advisories and Bulletins 177
Vulnerability Scans 180
    Credentialed vs. Noncredentialed 182
    Intrusive vs. Nonintrusive 182
    Common Vulnerability Scoring System (CVSS) 182
Logs and Security Information and Event Management (SIEM) 186
Security Orchestration, Automation, and Response (SOAR) 188
Chapter Review Activities 189
Chapter 8 Understanding the Techniques Used in Penetration Testing 193
Do I Know This Already? Quiz 193
Foundation Topics 197
Penetration Testing 197
    Bug Bounties vs. Penetration Testing 202
Passive and Active Reconnaissance 203
Exercise Types 205
Chapter Review Activities 206
Part II: Architecture and Design
Chapter 9
Understanding the Importance of Security Concepts in an Enterprise Environment 209
Do I Know This Already? Quiz 209
Foundation Topics 213
Configuration Management 213
Data Sovereignty and Data Protection 214
    Secure Sockets Layer (SSL)/Transport Layer Security (TLS) Inspection 215
    API Considerations 216
    Data Masking and Obfuscation 216
    Encryption at Rest, in Transit/Motion, and in Processing 218
    Hashing 218
    Rights Management 219
    Geographical Considerations 220
    Data Breach Response and Recovery Controls 220
Site Resiliency 221
Deception and Disruption 222
    Fake Telemetry 223
    DNS Sinkhole 223
Chapter Review Activities 224
Chapter 10 Summarizing Virtualization and Cloud Computing Concepts 227
Do I Know This Already? Quiz 227
Foundation Topics 231
Cloud Models 231
    Public, Private, Hybrid, and Community Clouds 232
Cloud Service Providers 233
Cloud Architecture Components 234
    Fog and Edge Computing 234
    Thin Clients 235
    Containers 236
    Microservices and APIs 240
    Infrastructure as Code 241
    Serverless Architecture 243
    Services Integration 246
    Resource Policies 246
    Transit Gateway 246
Virtual Machine (VM) Sprawl Avoidance and VM Escape Protection 247
    Understanding and Avoiding VM Sprawl 247
    Protecting Against VM Escape Attacks 248
Chapter Review Activities 250
Chapter 11 Summarizing Secure Application Development, Deployment, and Automation Concepts 253
Do I Know This Already? Quiz 253
Foundation Topics 257
Software Development Environments and Methodologies 257
Application Provisioning and Deprovisioning 260
Software Integrity Measurement 261
Secure Coding Techniques 261
    Core SDLC and DevOps Principles 263
    Programming Testing Methods 266
    Programming Vulnerabilities and Attacks 270
Open Web Application Security Project (OWASP) 276
Software Diversity 278
Automation/Scripting 278
Elasticity and Scalability 279
Chapter Review Activities 280
Chapter 12 Summarizing Authentication and Authorization Design Concepts 285
Do I Know This Already? Quiz 285
Foundation Topics 289
Authentication Methods 289
    Directory Services 291
    Federations 292
    Attestation 294
    Authentication Methods and Technologies 295
Biometrics 300
    Fingerprints 300
    Retina 301
    Iris 301
    Facial 301
    Voice 302
    Vein 302
    Gait Analysis 302
    Efficacy Rates 302
    False Acceptance 303
    False Rejection 303
    Crossover Error Rate 304
Multifactor Authentication (MFA) Factors and Attributes 304
Authentication, Authorization, and Accounting (AAA) 306
Cloud vs. On-premises Requirements 306
Chapter Review Activities 308
Chapter 13 Implementing Cybersecurity Resilience 311
Do I Know This Already? Quiz 311
Foundation Topics 315
Redundancy 315
    Geographic Dispersal 315
    Disk Redundancy 315
    Network Resilience 319
    Power Resilience 320
Replication 323
    Storage Area Network 323
    Virtual Machines 324
On-premises vs. Cloud 325
Backup Types 326
    Full Backup 328
    Differential Backup 328
    Incremental Backup 328
Non-persistence 328
High Availability 329
Restoration Order 330
Diversity 331
    Technologies 331
    Vendors 331
    Crypto 331
    Controls 332
Chapter Review Activities 332
Chapter 14 Understanding the Security Implications of Embedded and Specialized Systems 335
Do I Know This Already? Quiz 335
Foundation Topics 339
Embedded Systems 339
Supervisory Control and Data Acquisition (SCADA)/Industrial Control Systems (ICS) 341
Internet of Things (IoT) 344
Specialized Systems 346
    Medical Systems 347
    Vehicles 347
    Aircraft 348
    Smart Meters 350
Voice over IP (VoIP) 351
Heating, Ventilation, and Air Conditioning (HVAC) 352
Drones 353
Multifunction Printers (MFP) 354
Real-Time Operating Systems (RTOS) 355
Surveillance Systems 355
System on a Chip (SoC) 356
Communication Considerations 357
    5G 357
    NarrowBand 358
    Baseband Radio 359
    Subscriber Identity Module (SIM) Cards 360
    Zigbee 360
Embedded System Constraints 361
    Power 361
    Compute 361
    Network 362
    Crypto 362
    Inability to Patch 362
    Authentication 363
    Range 363
    Cost 363
    Implied Trust 363
Chapter Review Activities 364
Chapter 15 Understanding the Importance of Physical Security Controls 367
Do I Know This Already? Quiz 367
Foundation Topics 370
Bollards/Barricades 370
Access Control Vestibules 372
Badges 373
Alarms 374
Signage 374
Cameras 375
Closed-Circuit Television (CCTV) 376
Industrial Camouflage 377
Personnel 377
Locks 378
USB Data Blockers 379
Lighting 380
Fencing 380
Fire Suppression 381
Sensors 381
Drones 382
Visitor Logs 383
Faraday Cages 383
Air Gap 384
Screened Subnet (Previously Known as Demilitarized Zone [DMZ]) 384
Protected Cable Distribution 385
Secure Areas 385
Secure Data Destruction 386
Chapter Review Activities 387
Chapter 16 Summarizing the Basics of Cryptographic Concepts 391
Do I Know This Already? Quiz 391
Foundation Topics 395
Digital Signatures 395
Key Length 396
Key Stretching 397
Salting 397
Hashing 398
Key Exchange 399
Elliptic-Curve Cryptography 399
Perfect Forward Secrecy 400
Quantum 401
    Communications 401
    Computing 402
Post-Quantum 402
Ephemeral 403
Modes of Operation 403
    Electronic Code Book Mode 404
    Cipher Block Chaining Mode 405
    Cipher Feedback Mode 406
    Output Feedback Mode 407
    Counter Mode 408
Blockchain 409
Cipher Suites 410
Symmetric vs. Asymmetric Encryption 411
Lightweight Cryptography 414
Steganography 415
    Audio Steganography 415
    Video Steganography 416
    Image Steganography 416
Homomorphic Encryption 417
Common Use Cases 417
Limitations 418
Chapter Review Activities 420
Part III: Implementation
Chapter 17 Implementing Secure Protocols 423
Do I Know This Already? Quiz 423
Foundation Topics 426
Protocols 426
    Domain Name System Security Extensions 426
    SSH 427
    Secure/Multipurpose Internet Mail Extensions 428
    Secure Real-Time Transport Protocol 430
    Lightweight Directory Access Protocol over SSL 432
    File Transfer Protocol, Secure 432
    Secure (or SSH) File Transfer Protocol 434
    Simple Network Management Protocol Version 3 434
    Hypertext Transfer Protocol over SSL/TLS 436
    IPsec 437
    Post Office Protocol/Internet Message Access Protocol 438
Use Cases 439
    Voice and Video 440
    Time Synchronization 440
    Email and Web 441
    File Transfer 441
    Directory Services 442
    Remote Access 442
    Domain Name Resolution 442
    Routing and Switching 443
    Network Address Allocation 443
    Subscription Services 444
Chapter Review Activities 444
Chapter 18 Implementing Host or Application Security Solutions 447
Do I Know This Already? Quiz 447
Foundation Topics 451
Endpoint Protection 451
    Antivirus 451
Antimalware 452
    Endpoint Detection and Response 452
    Data Loss Prevention 453
Next-Generation Firewall 453
Host-based Intrusion Prevention System 454
Host-based Intrusion Detection System 456
Host-based Firewall 457
Boot Integrity 458
    Boot Security/Unified Extensible Firmware Interface 459
    Measured Boot 459
    Boot Attestation 460
Database 461
    Tokenization 461
    Salting 462
    Hashing 463
Application Security 463
    Input Validations 464
    Secure Cookies 465
    Hypertext Transfer Protocol Headers 465
    Code Signing 466
    Allow List 467
    Block List/Deny List 467
    Secure Coding Practices 468
    Static Code Analysis 468
    Manual Code Review 470
    Dynamic Code Analysis 470
    Fuzzing 471
Hardening 471
    Open Ports and Services 471
    Registry 472
    Disk Encryption 473
    Operating System 473
    Patch Management 474
Self-Encrypting Drive/Full-Disk Encryption 475
    OPAL 476
Hardware Root of Trust 476
Trusted Platform Module 477
Sandboxing 478
Chapter Review Activities 479
Chapter 19 Implementing Secure Network Designs 483
Do I Know This Already? Quiz 483
Foundation Topics 488
Load Balancing 488
    Active/Active 488
    Active/Passive 488
    Scheduling 488
    Virtual IP 488
    Persistence 489
Network Segmentation 489
    Application-Based Segmentation and Microsegmentation 489
    Virtual Local Area Network 490
    Screened Subnet 491
    East-West Traffic 492
    Intranets and Extranets 492
    Zero Trust 494
Virtual Private Network 494
    Remote Access vs. Site-to-Site 496
    IPsec 497
    SSL/TLS 505
    HTML5 508
    Layer 2 Tunneling Protocol 508
DNS 509
Network Access Control 510
Out-of-Band Management 510
Port Security 511
    Broadcast Storm Prevention 512
    Bridge Protocol Data Unit Guard 512
    Loop Prevention 512
    Dynamic Host Configuration Protocol Snooping 512
    Media Access Control Filtering 513
Network Appliances 513
    Jump Servers 514
    Proxy Servers 514
    Network-Based Intrusion Detection System/Network-Based Intrusion
    Prevention System 516
    Summary of NIDS vs. NIPS 519
    HSM 524
    Sensors 524
    Collectors 525
    Aggregators 526
    Firewalls 526
    Hardware vs. Software 534
    Appliance vs. Host-based vs. Virtual 534
Access Control List 535
Route Security 535
Quality of Service 536
Implications of IPv6 536
Port Spanning/Port Mirroring 537
Monitoring Services 538
    Performance Baselining 539
File Integrity Monitors 542
Chapter Review Activities 542
Chapter 20 Installing and Configuring Wireless Security Settings 547
Do I Know This Already? Quiz 547
Foundation Topics 551
Cryptographic Protocols 551
    Wi-Fi Protected Access 2 (WPA2) 551
    Wi-Fi Protected Access 3 (WPA3) 551
    Counter-mode/CBC-MAC Protocol (CCMP) 552
    Simultaneous Authentication of Equals 552
    Wireless Cryptographic Protocol Summary 552
Authentication Protocols 553
    802.1X and EAP 553
    IEEE 802.1x 556
    Remote Authentication Dial-In User Service (RADIUS) Federation 556
Methods 557
    Wi-Fi Protected Setup 558
    Captive Portals 559
Installation Considerations 559
    Controller and Access Point Security 562
    Wireless Access Point Vulnerabilities 563
Chapter Review Activities 564
Chapter 21 Implementing Secure Mobile Solutions 567
Do I Know This Already? Quiz 567
Foundation Topics 570
Connection Methods and Receivers 570
    RFID and NFC 571
    More Wireless Connection Methods and Receivers 572
    Secure Implementation Best Practices 573
Mobile Device Management 574
    MDM Security Feature Concerns: Application and Content Management 576
    MDM Security Feature Concerns: Remote Wipe, Geofencing, Geolocation, Screen Locks, Passwords and PINs, Full Device Encryption 578
Mobile Device Management Enforcement and Monitoring 581
Mobile Devices 585
    MDM/Unified Endpoint Management 587
    SEAndroid 588
Deployment Models 588
    Secure Implementation of BYOD, CYOD, and COPE 589
Chapter Review Activities 591
Chapter 22 Applying Cybersecurity Solutions to the Cloud 595
Do I Know This Already? Quiz 595
Foundation Topics 598
Cloud Security Controls 598
    Security Assessment in the Cloud 598
    Understanding the Different Cloud Security Threats 598
    Cloud Computing Attacks 601
    High Availability Across Zones 603
    Resource Policies 603
    Integration and Auditing 604
    Secrets Management 604
    Storage 605
    Network 606
    Compute 607
    Summary of Cloud Security Controls 609
Solutions 611
    CASB 611
    Application Security 612
    Next-Generation Secure Web Gateway 613
    Firewall Considerations in a Cloud Environment 613
    Summary of Cybersecurity Solutions to the Cloud 614
Cloud Native Controls vs. Third-Party Solutions 615
Chapter Review Activities 615
Chapter 23 Implementing Identity and Account Management Controls 619
Do I Know This Already? Quiz 619
Foundation Topics 623
Identity 623
    Identity Provider (IdP) 623
    Authentication 625
    Certificates 626
    Tokens 627
    SSH Keys 628
    Smart Cards 629
Account Types 629
Account Policies 633
    Introduction to Identity and Access Management 633
    Attribute-Based Access Control (ABAC) 638
    Rights, Permissions, and Policies 640
    Permission Inheritance and Propagation 645
Chapter Review Activities 647
Chapter 24 Implementing Authentication and Authorization Solutions 651
Do I Know This Already? Quiz 651
Foundation Topics 655
Authentication Management 655
    Password Keys 655
    Password Vaults 655
    Trusted Platform Module 656
    Hardware Security Modules 656
    Knowledge-Based Authentication 656
Authentication/Authorization 657
    Security Assertion Markup Language 659
    OAuth 661
    OpenID and OpenID Connect 663
    Remote Authentication Technologies 670
Access Control Schemes 674
    Discretionary Access Control 674
    Mandatory Access Control 676
    Role-Based Access Control 677
    Attribute-Based Access Control 678
    Rule-Based Access Control 678
    Conditional Access 678
    Privileged Access Management 678
    Summary of Access Control Models 679
    Access Control Wise Practices 680
Chapter Review Activities 681
Chapter 25 Implementing Public Key Infrastructure 685
Do I Know This Already? Quiz 685
Foundation Topics 688
Public Key Infrastructure 688
    Key Management 688
    Certificate Authorities 689
    Certificate Attributes 691
    Subject Alternative Name 693
    Expiration 693
Types of Certificates 694
    SSL Certificate Types 694
    Certificate Chaining 696
Certificate Formats 697
PKI Concepts 698
    Trust Model 698
    Certificate Pinning 698
    Stapling, Key Escrow, Certificate Chaining, Online vs. Offline CA 698
Chapter Review Activities 700
Part IV: Operations and Incident Response
Chapter 26 Using the Appropriate Tool to Assess Organizational Security 703
Do I Know This Already? Quiz 703
Foundation Topics 707
Network Reconnaissance and Discovery 707
    tracert/traceroute 707
    nslookup/dig 709
    ipconfig/ifconfig 710
    nmap 711
    ping/pathping 714
    hping 717
    netstat 718
    netcat 720
    IP Scanners 721
    arp 721
    route 723
    curl 724
    theHarvester 725
    sn1per 726
    scanless 727
    dnsenum 728
    Nessus 730
    Cuckoo 731
File Manipulation 732
    head 733
    tail 734
    cat 734
    grep 735
    chmod 736
    Logger 737
Shell and Script Environments 738
    SSH 739
    PowerShell 740
    Python 741
    OpenSSL 741
Packet Capture and Replay 742
    Tcpreplay 742
    Tcpdump 742
    Wireshark 743
Forensics 744
    dd 744
    Memdump 745
    WinHex 746
    FTK Imager 747
    Autopsy 747
Exploitation Frameworks 747
Password Crackers 748
Data Sanitization 750
Chapter Review Activities 750
Chapter 27 Summarizing the Importance of Policies, Processes, and Procedures for Incident Response 755
Do I Know This Already? Quiz 755
Foundation Topics 760
Incident Response Plans 760
Incident Response Process 761
    Preparation 762
    Identification 763
    Containment 763
    Eradication 764
    Recovery 764
    Lessons Learned 764
Exercises 765
    Tabletop 765
    Walkthroughs 766
    Simulations 766
Attack Frameworks 767
    MITRE ATT&CK 767
    The Diamond Model of Intrusion Analysis 768
    Cyber Kill Chain 770
Stakeholder Management 771
Communication Plan 771
Disaster Recovery Plan 772
Business Continuity Plan 773
Continuity of Operations Planning (COOP) 774
Incident Response Team 775
Retention Policies 776
Chapter Review Activities 776
Chapter 28 Using Appropriate Data Sources to Support an Investigation 781
Do I Know This Already? Quiz 781
Foundation Topics 785
Vulnerability Scan Output 785
SIEM Dashboards 786
    Sensors 787
    Sensitivity 788
    Trends 788
    Alerts 788
    Correlation 788
Log Files 789
    Network 790
    System 791
    Application 792
    Security 793
    Web 794
    DNS 795
    Authentication 796
    Dump Files 797
    VoIP and Call Managers 799
    Session Initiation Protocol Traffic 800
syslog/rsyslog/syslog-ng 800
journalctl 802
NXLog 803
Bandwidth Monitors 804
Metadata 805
    Email 808
    Mobile 808
    Web 808
    File 809
NetFlow/sFlow 809
    NetFlow 809
    sFlow 810
    IPFIX 811
Protocol Analyzer Output 813
Chapter Review Activities 814
Chapter 29 Applying Mitigation Techniques or Controls to Secure an Environment 819
Do I Know This Already? Quiz 819
Foundation Topics 822
Reconfigure Endpoint Security Solutions 822
    Application Approved Lists 822
    Application Block List/Deny List 822
    Quarantine 823
Configuration Changes 824
    Firewall Rules 825
    MDM 825
    Data Loss Prevention 828
    Content Filter/URL Filter 828
    Update or Revoke Certificates 829
Isolation 830
Containment 830
Segmentation 831
SOAR 832
    Runbooks 833
    Playbooks 834
Chapter Review Activities 834
Chapter 30 Understanding the Key Aspects of Digital Forensics 837
Do I Know This Already? Quiz 837
Foundation Topics 842
Documentation/Evidence 842
    Legal Hold 842
    Video 842
    Admissibility 843
    Chain of Custody 844
    Timelines of Sequence of Events 844
    Tags 845
    Reports 846
    Event Logs 846
    Interviews 846
Acquisition 847
    Order of Volatility 848
    Disk 848
    Random-Access Memory 848
    Swap/Pagefile 849
    Operating System 850
    Device 850
    Firmware 851
    Snapshot 851
    Cache 852
    Network 852
    Artifacts 853
On-premises vs. Cloud 853
    Right-to-Audit Clauses 854
    Regulatory/Jurisdiction 855
    Data Breach Notification Laws 855
Integrity 856
    Hashing 856
    Checksums 857
    Provenance 857
Preservation 858
E-discovery 858
Data Recovery 859
Nonrepudiation 859
Strategic Intelligence/Counterintelligence 860
Chapter Review Activities 860
Part V: Governance, Risk, and Compliance
Chapter 31 Comparing and Contrasting the Various Types of Controls 865
Do I Know This Already? Quiz 865
Foundation Topics 868
Control Category 868
    Managerial Controls 868
    Operational Controls 868
    Technical Controls 868
    Summary of Control Categories 869
Control Types 869
    Preventative Controls 869
    Detective Controls 869
    Corrective Controls 870
    Deterrent Controls 870
    Compensating Controls 871
    Physical Controls 871
    Summary of Control Types 872
Chapter Review Activities 873
Chapter 32 Understanding the Importance of Applicable Regulations, Standards, or Frameworks That Impact Organizational Security Posture 875
Do I Know This Already? Quiz 875
Foundation Topics 878
Regulations, Standards, and Legislation 878
    General Data Protection Regulation 879
    National, Territory, or State Laws 879
    Payment Card Industry Data Security Standard (PCI DSS) 881
Key Frameworks 881
Benchmarks and Secure Configuration Guides 885
    Security Content Automation Protocol 885
Chapter Review Activities 889
Chapter 33 Understanding the Importance of Policies to Organizational Security 893
Do I Know This Already? Quiz 894
Foundation Topics 897
Personnel Policies 897
    Privacy Policies 897
    Acceptable Use 898
    Separation of Duties/Job Rotation 898
    Mandatory Vacations 898
    Onboarding and Offboarding 899
    Personnel Security Policies 900
Diversity of Training Techniques 900
    User Education and Awareness Training 901
Third-Party Risk Management 902
Data Concepts 904
    Understanding Classification and Governance 904
    Data Retention 906
Credential Policies 906
Organizational Policies 908
    Change Management and Change Control 909
    Asset Management 909
Chapter Review Activities 910
Chapter 34 Summarizing Risk Management Processes and Concepts 913
Do I Know This Already? Quiz 913
Foundation Topics 917
Risk Types 917
Risk Management Strategies 918
Risk Analysis 919
    Qualitative Risk Assessment 921
    Quantitative Risk Assessment 922
Disaster Analysis 924
Business Impact Analysis 926
    Disaster Recovery Planning 928
Chapter Review Activities 930
Chapter 35 Understanding Privacy and Sensitive Data Concepts in Relation to Security 935
Do I Know This Already? Quiz 935
Foundation Topics 940
Organizational Consequences of Privacy and Data Breaches 940
Notifications of Breaches 941
Data Types and Asset Classification 941
    Personally Identifiable Information and Protected Health Information 943
Privacy Enhancing Technologies 944
Roles and Responsibilities 945
Information Lifecycle 947
Impact Assessment 948
Terms of Agreement 948
Privacy Notice 949
Chapter Review Activities 949
Part VI: Final Preparation
Chapter 36 Final Preparation 953
Hands-on Activities 953
Suggested Plan for Final Review and Study 953
Summary 954
Glossary of Key Terms 955
Appendix A Answers to the Do I Know This Already? Quizzes and Review Questions 1023
Appendix B CompTIA Security+ (SY0-601) Cert Guide Exam Updates 1087

Online Elements:
Appendix C Study Planner
Glossary of Key Terms

9780136770312   TOC   6/19/2021



We've made every effort to ensure the accuracy of this book and its companion content. Any errors that have been confirmed since this book was published can be downloaded below.

Download the errata (57 KB .doc)

Submit Errata

More Information

Pearson IT Certification Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Pearson IT Certification and its family of brands. I can unsubscribe at any time.


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Pearson IT Certification products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information

To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.


Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.


If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information

Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.


This site is not directed to children under the age of 13.


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information

If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.


Users can always make an informed choice as to whether they should proceed with certain services offered by Adobe Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.pearsonitcertification.com/u.aspx.

Sale of Personal Information

Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents

California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure

Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact

Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice

We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020