← Home

CompTIA Security+ Study Guide

Domain 1: General Security Concepts (12%)

This domain covers foundational security principles, control categories, and core cryptography concepts.

Security control categories: Technical (firewalls, encryption), Managerial (policies, risk assessments), Operational (training, procedures), Physical (locks, cameras)
Control types: Preventive, Detective, Corrective, Deterrent, Compensating, Directive

Zero Trust architecture: "Never trust, always verify." No implicit trust based on network location. Requires authentication and authorization for every resource request. Key pillars: verify explicitly, use least privilege, assume breach.

ConceptDefinition
AAAAuthentication, Authorization, Accounting — the security triad for access control
CIA TriadConfidentiality, Integrity, Availability — core security objectives
Non-repudiationProof that an action occurred and cannot be denied (digital signatures)
Gap analysisComparing current security posture to a desired baseline or framework

Cryptography basics:

Key lengths to know: AES-128/256 (symmetric), RSA-2048+ (asymmetric), SHA-256/384/512 (hashing). Longer = stronger.

Domain 2: Threats, Vulnerabilities & Mitigations (22%)

The second-largest domain. Know threat actor types, attack techniques, and how to counter them.

Threat actor types: Nation-state (sophisticated, APT), Organized crime (financially motivated), Hacktivist (ideological), Insider threat (authorized access misused), Script kiddie (low skill, opportunistic)

Common attack types:

Vulnerability TypeDescription
Zero-dayUnknown to vendor; no patch available yet
CVECommon Vulnerabilities and Exposures — standardized vulnerability identifiers
CVSSCommon Vulnerability Scoring System — 0–10 severity rating
Supply chain attackCompromising a vendor or software component upstream (e.g., SolarWinds)
Mitigation strategies: Patch management, network segmentation, MFA, least privilege, user training, EDR/AV, application whitelisting

Domain 3: Security Architecture (18%)

Covers secure network design, cloud security, infrastructure hardening, and resilience.

Network segmentation concepts:

Firewall types: Packet filtering (stateless), Stateful inspection, Next-gen firewall (NGFW — app-aware, IPS, deep packet inspection), Web Application Firewall (WAF)

Cloud security architecture:

ModelCustomer ResponsibilityProvider Responsibility
IaaSOS, apps, data, runtimePhysical, network, hypervisor
PaaSApps, dataOS, runtime, middleware, physical
SaaSData, access managementEverything else
Shared responsibility model: Security "in" the cloud = customer. Security "of" the cloud = provider. Misconfigurations are almost always the customer's fault.

Infrastructure resilience: HA clustering, load balancing, geographic redundancy, backup/restore (3-2-1 rule: 3 copies, 2 media types, 1 offsite), RAID for storage redundancy, UPS + generator for power.

Secure protocols: HTTPS (TLS), SFTP (SSH), LDAPS (TLS), SNMPv3 (encrypted), SSH (replaces Telnet), IPSec (VPN tunnels)

Domain 4: Security Operations (28%)

The largest domain. Covers monitoring, identity management, incident response, and operational security.

Identity and Access Management (IAM):

Authentication factors: Type 1 = something you KNOW (password, PIN) | Type 2 = something you HAVE (smart card, token, phone) | Type 3 = something you ARE (biometric)

Security monitoring tools:

ToolFunction
SIEMSecurity Information & Event Management — aggregates and correlates logs for threat detection
EDREndpoint Detection & Response — advanced endpoint monitoring, behavioral analysis, automated response
IDS/IPSIntrusion Detection/Prevention System — monitors for attack signatures (NIDS/HIDS)
DLPData Loss Prevention — prevents unauthorized data exfiltration
SOARSecurity Orchestration, Automation & Response — automates incident response playbooks
Vulnerability scannerNessus, Qualys — identifies known CVEs in systems

Incident Response lifecycle (NIST SP 800-61):

  1. Preparation: IR plan, team, tools in place
  2. Detection & Analysis: Identify and confirm the incident
  3. Containment: Limit damage (short-term + long-term containment)
  4. Eradication: Remove root cause (malware, attacker persistence)
  5. Recovery: Restore systems, verify normal operation
  6. Post-Incident Activity: Lessons learned, improve defenses
Digital forensics order of volatility: CPU registers/cache → RAM → Swap/pagefile → Hard disk → Remote logs → Archived media. Always preserve most volatile evidence first.

Hardening techniques: Disable unused services/ports, patch management, configuration baselines, remove default credentials, enable host-based firewall, application control/whitelisting, full disk encryption (BitLocker, FileVault).

Domain 5: Security Program Management & Oversight (20%)

Covers governance, risk management, compliance, data privacy, and security frameworks.

Risk management fundamentals:

Key risk calculations: SLE (Single Loss Expectancy) = Asset Value × Exposure Factor | ALE (Annual Loss Expectancy) = SLE × ARO (Annual Rate of Occurrence)

Compliance frameworks and regulations:

Framework/RegulationScope
NIST CSFCybersecurity Framework — Identify, Protect, Detect, Respond, Recover
ISO 27001International standard for information security management systems (ISMS)
PCI DSSPayment Card Industry — protects cardholder data
HIPAAHealth Insurance Portability — protects healthcare data (PHI)
GDPREU General Data Protection Regulation — personal data rights
SOXSarbanes-Oxley — financial reporting integrity for public companies

Data classification: Public → Internal/Private → Confidential → Secret/Top Secret. Drives handling requirements, encryption, and access controls.

Security policies: Acceptable Use Policy (AUP), Information Security Policy, Incident Response Policy, BYOD Policy, Change Management Policy, Data Retention Policy.

Third-party risk: Vendor assessments, right-to-audit clauses, SLAs, MOU (Memorandum of Understanding), MSA (Master Service Agreement), NDA, BPA (Business Partner Agreement)

Security awareness training: Phishing simulations, annual security training, role-based training for privileged users, social engineering red flags. Human is the weakest link — and the first line of defense.

Ready to test your knowledge?

Apply what you've learned with the realistic exam simulator. Includes hands-on scenarios — not just multiple choice.

Start the Exam Simulator →

← Back to CompTIA Security+ Home