CompTIA Security+ SY0-701 Exam Cram, 7/e, 7th edition

Published by Pearson IT Certification (September 9, 2024) © 2025

  • Robert Shimonski
  • Martin M. Weiss
Products list

Access details

  • Instant access once purchased
  • Fulfilled by VitalSource
Products list

Access details

  • Instant access once purchased
  • Fulfilled by VitalSource

Title overview

CompTIA Security+ SY0-701 Exam Cram is an all-inclusive study guide designed to help you pass the updated version of the CompTIA Security+ exam. Prepare for test day success with complete coverage of exam objectives and topics, plus hundreds of realistic practice questions. Extensive prep tools include quizzes, Exam Alerts, and our essential last-minute review Cram Sheet. The powerful Pearson Test Prep practice software provides real-time assessment and feedback with two complete exams.

This edition comes with a Pearson Test Prep Practice Test access code that is delivered upon product registration. Follow the instructions in the book's introduction to register your product.

Covers the critical information needed to score higher on your Security+ SY0-701 exam!

  • General security concepts
  • Threats, vulnerabilities, and mitigations
  • Security architecture
  • Security operations
  • Security program management and oversight

Prepare for your exam with Pearson Test Prep

  • Realistic practice questions and answers
  • Comprehensive reporting and feedback
  • Customised testing in study, practice exam, or flash card modes
  • Complete coverage of CompTIA Security+ SY0-701 exam objectives

Table of contents

  • Introduction
  • Part 1: General Security Concepts
  • CHAPTER 1: Security Controls
  • CHAPTER 2: Fundamental Security Concepts
  • CHAPTER 3: Change Management Processes and the Impact to Security
  • CHAPTER 4: Cryptographic Solutions
  • Part 2: Threats, Vulnerabilities, and Mitigations
  • CHAPTER 5: Threat Actors and Motivations
  • CHAPTER 6: Threat Vectors and Attack Surfaces
  • CHAPTER 7: Vulnerability Types
  • CHAPTER 8: Malicious Attacks and Indicators
  • CHAPTER 9 Mitigation Techniques for Securing the Enterprise
  • Part 3: Security Architecture
  • CHAPTER 10: Security Implications of Architecture Models
  • CHAPTER 11: Enterprise Architecture Security Principles
  • CHAPTER 12: Data Protection Strategies
  • CHAPTER 13: Resilience and Recovery in Security Architecture
  • Part 4: Security Operations
  • CHAPTER 14: Securing Resources
  • CHAPTER 15: Hardware, Software, and Data Asset Management
  • CHAPTER 16: Vulnerability Management
  • CHAPTER 17: Security Alerting and Monitoring
  • CHAPTER 18: Enterprise Security Capabilities
  • CHAPTER 19: Identity and Access Management
  • CHAPTER 20: Security Automation and Orchestration
  • CHAPTER 21: Incident Response Activities
  • CHAPTER 22: Data Sources for Supporting Investigations
  • Part 5: Security Program Management and Oversigh
  • CHAPTER 23: Effective Security Governance
  • CHAPTER 24: Risk Management
  • CHAPTER 25: Third-Party Risk Assessment and Management
  • CHAPTER 26: Security Compliance
  • CHAPTER 27: Security Audits and Assessments
  • CHAPTER 28: Security Awareness Practices
  • Glossary of Essential Terms
  • Cram Sheet

Need help?Get in touch