- Security Fundamentals
- Threat Management and Cybersecurity Resources
- Threats and Attacks on Endpoints
- Endpoint and Application Development Security
- Cryptography
- Public Key Infrastructure and Cryptographic Protocols
- Mobile, Embedded, and Specialized Device Security
- Networking Threats, Assessments, and Defenses
- Network Security Appliances and Technologies
- Cloud and Virtualization Security
- Network Threats, Assessments, and Defenses
- Authentication
- Incident Preparation, Response, and Investigation
- Cybersecurity Resilience
- Risk Management and Data Privacy
- Preparing for the Certificate Exam
CompTIA Security+ Certification Exam Details
EXAM OBJECTIVES (DOMAINS) | PERCENTAGE OF EXAMINATION |
---|---|
General Security Concepts | 12% |
Threats, Vulnerabilities & Mitigations | 22% |
Security Architecture | 18% |
Security Operations | 28% |
Security Program Management & Oversight | 20% |
TOTAL: 100%
General Security Concepts 12%
- Compare and contrast various types of security controls.
- Summarise fundamental security concepts.
- Explain the importance of change management processes and the impact to security.
- Explain the importance of using appropriate cryptographic solutions.
Threats, Vulnerabilities & Mitigations 22%
- Compare and contrast common threat actors and motivations.
- Explain common threat vectors and attack surfaces.
- Explain various types of vulnerabilities.
- Given a scenario, analyse indicators of malicious activity.
- Explain the purpose of mitigation techniques used to secure the enterprise.
Security Architecture 18%
- Compare and contrast security implications of different architecture models.
- Given a scenario, apply security principles to secure enterprise infrastructure.
- Compare and contrast concepts and strategies to protect data.
- Explain the importance of resilience and recovery in security architecture.
Security Operations 28%
- Given a scenario, apply common security techniques to computing resources.
- Explain the security implications of proper hardware, software, and data asset management.
- Explain various activities associated with vulnerability management.
- Explain security alerting and monitoring concepts and tools.
- Given a scenario, modify Enterprise capabilities to enhance security.
- Given a scenario, implement and maintain identity and access management.
- Explain the importance of automation and orchestration related to secure operations.
- Explain appropriate incident response activities.
- Given a scenario, use data sources to support an investigation.
Security Program Management & Oversight 20%
- Summarize elements of effective security governance.
- Explain elements of the risk management process.
- Explain the processes associated with third-party risk assessment and management.
- Summarise elements of effective security compliance.
- Explain types and purposes of audits and assessments.
- Given a scenario, implement security awareness practices.