CompTIA Security+ SY0-701 Cert Guide, 1/e, 1st edition

Published by Pearson IT Certification (April 10, 2024) © 2024

  • Lewis Heuermann
Products list
Products list

This product is expected to ship within 5-7 business days for Australian customers.

Title overview

Learn, prepare, and practice for CompTIA Security+ SY0-701 exam success

CompTIA Security+ SY0-701 Cert Guide from Pearson IT Certification helps you prepare to succeed on the CompTIA Security+ SY0-701 exam by directly addressing the exam's objectives as stated by CompTIA. Leading instructor and cybersecurity professional Lewis Heuermann shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills.

This complete study package includes

  • Complete coverage of the exam objectives and a test-preparation routine designed to help you pass the exams
  • Do I Know This Already? quizzes, which allow you to decide how much time you need to spend on each section
  • Chapter-ending Key Topic tables, which help you drill on key concepts you must know thoroughly
  • The powerful Pearson Test Prep Practice Test software, complete with hundreds of well-reviewed, exam-realistic questions, customisation options, and detailed performance reports
  • An online, interactive Flash Cards application to help you drill on Key Terms by chapter
  • A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies
  • Study plan suggestions and templates to help you organise and optimise your study time

Well regarded for its level of detail, study plans, assessment features, and challenging review questions and exercises, this study guide helps you master the concepts and techniques that ensure your exam success.

This study guide helps you master all the topics on the CompTIA Security+ SY0-701 exam, deepening your knowledge of

  • General Security Concepts: Security controls, security concepts, change management process, cryptographic solutions
  • Threats, Vulnerabilities, and Mitigations: Threat actors and motivations, attack surfaces, types of vulnerabilities, indicators of malicious activity, mitigation techniques
  • Security Architecture: Security implications of architecture models, secure enterprise infrastructure, protect data, resilience and recovery in security architecture
  • Security Operations: Security techniques to computing resources, security implications, vulnerability management, monitoring concepts, enterprise capabilities to enhance security, access management, automation related to secure operations, incident response activities
  • Security Program Management and Oversight: Security governance, risk management, third-party risk assessment and management, security compliance, audits and assessments, security awareness practices

Table of contents

  • Part I: General Security Concepts
  • Chapter 1 Comparing and Contrasting the Various Types of Controls
  • Chapter 2 Summarizing Fundamental Security Concepts
  • Chapter 3 Understanding Change Management's Security Impact
  • Chapter 4 Understanding the Importance of Using Appropriate Cryptographic Solutions
  • Part II: Threats, Vulnerabilities, and Mitigations
  • Chapter 5 Comparing and Contrasting Common Threat Actors and Motivations
  • Chapter 6 Understanding Common Threat Vectors and Attack Surfaces
  • Chapter 7 Understanding Various Types of Vulnerabilities
  • Chapter 8 Understanding Indicators of Malicious Activity
  • Chapter 9 Understanding the Purpose of Mitigation Techniques Used to Secure the Enterprise 
  • Part III: Security Architecture
  • Chapter 10 Comparing and Contrasting Security Implications of Different Architecture Models
  • Chapter 11 Applying Security Principles to Secure Enterprise Infrastructure
  • Chapter 12 Comparing and Contrasting Concepts and Strategies to Protect Data
  • Chapter 13 Understanding the Importance of Resilience and Recovery in Security Architecture
  • Part IV: Security Operations
  • Chapter 14 Applying Common Security Techniques to Computing Resources
  • Chapter 15 Understanding the Security Implications of Hardware, Software, and Data Asset Management
  • Chapter 16 Understanding Various Activities Associated with Vulnerability Management
  • Chapter 17 Understanding Security Alerting and Monitoring Concepts and Tools
  • Chapter 18 Modifying Enterprise Capabilities to Enhance Security
  • Chapter 19 Implementing and Maintaining Identity and Access Management
  • Chapter 20 Understanding the Importance of Automation and Orchestration Related to Secure Operations
  • Chapter 21 Understanding Appropriate Incident Response Activities
  • Chapter 22 Using Data Sources to Support an Investigation
  • Part V: Security Program Management and Oversight
  • Chapter 23 Summarizing Elements of Effective Security Governance
  • Chapter 24 Understanding Elements of the Risk Management Process
  • Chapter 25 Understanding the Processes Associated with Third-Party Risk Assessment and Management
  • Chapter 26 Summarizing Elements of Effective Security Compliance
  • Chapter 27 Understanding Types and Purposes of Audits and Assessments
  • Chapter 28 Implementing Security Awareness Practices
  • Part VI: Final Preparation
  • Chapter 29 Final Preparation
  • Appendix A Answers to the 'Do I Know This Already?' Quizzes and Review Questions

Need help?Get in touch