CompTIA Security+ (SY0-601)

The Security+ Certification Study Guide will teach you the fundamental principles of installing and configuring cybersecurity controls and participating in incident response and risk mitigation. It will prepare you to take the CompTIA Security+ SY0-501 exam by providing 100% coverage of the objectives and content examples listed on the syllabus.

After reading the text, you will be able to:

  • Identify strategies developed by cyber adversaries to attack networks and hosts and the countermeasures deployed to defend them.
  • Understand the principles of organizational security and the elements of effective security policies.
  • Know the technologies and uses of cryptographic standards and products.
  • Install and configure network- and host-based security technologies.
  • Describe how wireless and remote access security is enforced.
  • Describe the standards and products used to enforce security on web and communications technologies.
  • Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery.
  • Summarize application and coding vulnerabilities and identify development and deployment methods designed to mitigate them.
  • Prerequisites

To get the most out of the CompTIA Security+ Study Guide and be able to prepare for your exam you should have successfully passed the CompTIA Network+ certification exam and have acquired 24 months of experience in networking support and IT administration. We also recommend the following skills and knowledge before starting this course:

  • Use a keyboard and mouse.
  • Know the function and basic features of PC components.
  • Able to use Windows to create and manage files and use basic administrative features (Explorer, Control Panel and Management Consoles).
  • Know basic network terminology and functions (such as OSI Model, topology, Ethernet, TCP/IP, switches and routers).
  • Understand TCP/IP addressing, core protocols and troubleshooting tools.

Kurikulum Kursus

  • Modul 1

    Comparing Security Roles and Security Controls

    • Compare and Contrast Information Security Roles
    • Cybersecurity Framework
    • Information Security Competencies
    • Information Security Roles and Responsibilities
    • Information Security Business Units
    • Compare and Contrast Security Control And Framework Types
    • Security Control Categories
    • Security Control Functional Types
    • NIST Cybersecurity Framework
    • ISO and Cloud Frameworks
    • Benchmarks and Secure Configuration Guides
    • Regulations, Standards, and Legislation
    • Lab 1 - Compare and Contrast Security Control and Framework Types (PBQ)
    • kuis 01
  • Modul 2

    Explaining Threat Actors and Threat Intelligence

    • Explain Threat Actor Types and Attack Vectors
    • Attributes of Threat Actors
    • Hackers, Script Kiddies, and Hacktivists
    • State Actors and Advanced Persistent Threats
    • Criminal Syndicates and Competitors
    • Insider Threat Actors
    • Attack Surface and Attack Vectors
    • Explain Threat Intelligence Sources
    • Threat Research Sources
    • Threat Intelligence Providers
    • Other Threat Intelligence Research Sources
    • Tactics, Techniques, and Procedures and Indicators of Compromise
    • Threat Data Feeds
    • Artificial Intelligence and Predictive Analysis
    • kuis 02
  • Modul 3

    Performing Security Assessment

    • Assess Organizational Security with Network Reconnaissance Tools
    • ipconfig, ping, and ARP
    • route and traceroute
    • IP Scanners and Nmap
    • Service Discovery and Nmap
    • netstat and nslookup
    • Other Reconnaissance and Discovery Tools
    • Packet Capture and tcpdump
    • Packet Analysis and Wireshark
    • Packet Injection and Replay
    • Exploitation Frameworks
    • Netcat
    • Explain Security Concerns with General Vulnerability Types
    • Zero-day and Legacy Platform Vulnerabilities
    • Weak Host Configurations
    • Weak Network Configurations
    • Impacts from Vulnerabilities
    • Third-Party Risks
    • Summarize Vulnerability Scanning Techniques
    • Vulnerability Scan Types
    • Common Vulnerabilities and Exposures
    • Intrusive versus Non-intrusive Scanning
    • Credentialed versus Non-Credentialed Scanning
    • False Positives, False Negatives, and Log Review
    • Configuration Review
    • Threat Hunting
    • Explain Penetration Testing Concepts
    • Rules of Engagement
    • Exercise Types
    • Passive and Active Reconnaissance
    • Pen Test Attack Life Cycle
    • Lab 3: Assess Organizational Security with Network Reconnaissance Tools (PBQ)
    • kuis 03
  • Modul 4

    Identifying Social Engineering and Malware

    • Compare and Contrast Social Engineering Techniques
    • Social Engineering Principles
    • Impersonation and Trust
    • Dumpster Diving and Tailgating
    • Identity Fraud and Invoice Scams
    • Phishing, Whaling, and Vishing
    • Spam, Hoaxes, and Prepending
    • Pharming and Credential Harvesting
    • Influence Campaigns
    • Analyze Indicators of Malware-Based Attacks
    • Malware Classification
    • Computer Viruses
    • Computer Worms and Fileless Malware
    • Spyware and Keyloggers
    • Backdoors and Remote Access Trojans
    • Rootkits
    • Ransomware, Crypto-Malware, and Logic Bombs
    • Malware Indicators
    • Process Analysis
    • Lab 4: Analyze Indicators of Malware-Based Attacks (PBQ)
    • kuis 04
  • Modul 5

    Summarizing Basic Cryptographic Concepts

    • Compare and Contrast Cryptographic Ciphers
    • Cryptographic Concepts
    • Hashing Algorithms
    • Encryption Ciphers and Keys
    • Symmetric Encryption
    • Stream and Block Ciphers
    • Asymmetric Encryption
    • Public Key Cryptography Algorithms
    • Summarize Cryptographic Modes of Operation
    • Digital Signatures
    • Digital Envelopes and Key Exchange
    • Digital Certificates
    • Perfect Forward Secrecy
    • Cipher Suites and Modes of Operation
    • Authenticated Modes of Operation
    • Summarize Cryptographic Use Cases and Weaknesses
    • Cryptography Supporting Authentication and Non-repudiation
    • Cryptography Supporting Confidentiality
    • Cryptography Supporting Integrity and Resiliency
    • Cryptographic Performance Limitations
    • Cryptographic Security Limitations
    • Longevity and Cryptographic Attacks
    • Man-in-the-Middle and Downgrade Attacks
    • Key Stretching and Salting
    • Collisions and the Birthday Attack
    • Summarize Other Cryptographic Technologies
    • Quantum and Post-quantum
    • Homomorphic Encryption
    • Steganography
    • kuis 05
  • Modul 6

    Implementing Public Key Infrastructure

    • Implement Certificates and Certificate Authorities
    • Public and Private Key Usage
    • Certificate Authorities
    • PKI Trust Models
    • Registration Authorities and CSRs
    • Digital Certificates
    • Certificate Attributes
    • Subject Name Attributes
    • Types of Certificate
    • Web Server Certificate Types
    • Other Certificate Types
    • Implement PKI Management
    • Certificate and Key Management
    • Key Recovery and Escrow
    • Certificate Expiration
    • Certificate Revocation Lists
    • Online Certificate Status Protocol Responders
    • Certificate Pinning
    • Certificate Formats
    • OpenSSL
    • Certificate Issues
    • Lab 6: Implement Certificates and Certificate Authorities (PBQ)
    • kuis 06
  • Modul 7

    Implementing Authentication Controls

    • Summarize Authentication Design Concepts
    • Identity and Access Management
    • Authentication Factors
    • Authentication Design
    • Multifactor Authentication
    • Authentication Attributes
    • Implement Knowledge-Based Authentication
    • Local, Network, and Remote Authentication
    • Kerberos Authentication
    • Kerberos Authorization
    • PAP, CHAP, and MS-CHAP Authentication
    • Password Attacks
    • Brute Force and Dictionary Attacks
    • Password Crackers
    • Authentication Management
    • Implement Authentication Technologies
    • Key Management Devices
    • Extensible Authentication Protocol/IEEE 802.1X
    • Remote Authentication Dial-in User Service
    • Terminal Access Controller Access-Control System
    • Token Keys and Static Codes
    • Open Authentication
    • 2-Step Verification
    • Summarize Biometrics Authentication Concepts
    • Fingerprint Recognition
    • Facial Recognition
    • Behavioral Technologies
    • Lab 7: Implement Knowledge-Based Authentication (PBQ)
    • kuis 07
  • Modul 8

    Implementing Identity and Account Management Controls

    • Implement Identity and Account Types
    • Identity Management Controls
    • Background Check and Onboarding Policies
    • Personnel Policies for Privilege Management
    • Offboarding Policies
    • Security Account Types and Credential Management
    • Security Group-Based Privileges
    • Administrator/Root Accounts
    • Service Accounts
    • Shared/Generic/Device Accounts and Credentials
    • Secure Shell Keys and Third-party Credentials
    • Implement Account Policies
    • Account Attributes and Access Policies
    • Account Password Policy Settings
    • Account Restrictions
    • Account Audits
    • Account Permissions
    • Usage Audits
    • Account Lockout and Disablement
    • Implement Authorization Solutions
    • Discretionary and Role-Based Access Control
    • File System Permissions
    • Mandatory and Attribute-Based Access Control
    • Rule-Based Access Control
    • Directory Services
    • Federation and Attestation
    • Security Assertions Markup Language
    • OAuth and OpenID Connect
    • Explain the Importance of Personnel Policies
    • Conduct Policies
    • User and Role-based Training
    • Diversity of Training Techniques
    • Lab 8: Implement Identity and Account Types; Implement Account Policies (PBQ)
    • kuis 08
  • Modul 9

    Implementing Secure Network Designs

    • Implement Secure Network Designs
    • Business Workflows and Network Architecture
    • Network Appliances
    • Routing and Switching Protocols
    • Network Segmentation
    • Network Topology and Zones
    • Demilitarized Zones
    • Demilitarized Zone Topologies
    • Screened Hosts
    • Implications of IPv6
    • Other Secure Network Design Considerations
    • Implement Secure Switching and Routing
    • Man-in-the-Middle and Layer 2 Attacks
    • ARP Poisoning and MAC Flooding Attacks
    • Loop Prevention
    • Physical Port Security and MAC Filtering
    • Network Access Control
    • Route Security
    • Implement Secure Wireless Infrastructure
    • Wireless Network Installation Considerations
    • Controller and Access Point Security
    • Wi-Fi Protected Access
    • Wi-Fi Authentication Methods
    • Wi-Fi Protected Setup
    • Open Authentication and Captive Portals
    • Enterprise/IEEE 802.1X Authentication
    • Extensible Authentication Protocol
    • PEAP, EAP-TTLS, and EAP-FAST
    • RADIUS Federation
    • Rogue Access Points and Evil Twins
    • Disassociation and Replay Attacks
    • Jamming Attacks
    • Implement Load Balancers
    • Distributed Denial of Service Attacks
    • Amplification, Application, and OT Attacks
    • Distributed Denial of Service Attack Mitigation
    • Load Balancing
    • Clustering
    • Quality of Service (QoS)
    • Lab 9: Implement Secure Switching and Routing (PBQ)
    • kuis 09
  • Modul 10

    Implementing Network Security Appliances

    • Implement Firewalls and Proxy Servers
    • Packet Filtering Firewalls
    • Stateful Inspection Firewalls
    • iptables
    • Firewall Implementation
    • Proxies and Gateways
    • Access Control Lists
    • Network Address Translation
    • Virtual Firewalls
    • Open-source versus Proprietary Firewalls
    • Implement Network Security Monitoring
    • Network-Based Intrusion Detection Systems
    • TAPs and Port Mirrors
    • Network-Based Intrusion Prevention Systems
    • Signature-Based Detection
    • Behavior and Anomaly-Based Detection
    • Next-generation Firewalls and Content Filters
    • Host-Based Intrusion Detection Systems
    • Web Application Firewalls
    • Summarize the Use of SIEM
    • Monitoring Services
    • Security Information and Event Management
    • Analysis and Report Review
    • File Manipulation
    • Regular Expressions and grep
    • Lab 10: Implement Firewalls and Proxy Servers (PBQ)
    • kuis 10
  • Modul 11

    Implementing Secure Network Protocols

    • Implement Secure Network Operations Protocols
    • DOMAIN NAME RESOLUTION
    • DNS POISONING
    • DNS SECURITY
    • SECURE DIRECTORY SERVICES
    • TIME SYNCHRONIZATION
    • Implement Secure Application Protocols
    • TRANSPORT LAYER SECURITY
    • API CONSIDERATIONS
    • FILE TRANSFER SERVICES
    • EMAIL SERVICES
    • SECURE/MULTIPURPOSE INTERNET MAIL EXTENSIONS
    • VOICE AND VIDEO SERVICES
    • Implement Secure Remote Access Protocols
    • TRANSPORT LAYER SECURITY VPN
    • INTERNET PROTOCOL SECURITY
    • IPSEC TRANSPORT AND TUNNEL MODES
    • INTERNET KEY EXCHANGE
    • LAYER 2 TUNNELING PROTOCOL AND IKE V2
    • VPN CLIENT CONFIGURATION
    • REMOTE DESKTOP
    • OUT-OF-BAND MANAGEMENT AND JUMP SERVERS
    • SECURE SHELL
    • Lab 11: Implement Secure Remote Access Protocols (PBQ)
    • kuis 11
  • Modul 12

    Implementing Host Security Solutions

    • Implement Secure Firmware
    • HARDWARE ROOT OF TRUST
    • BOOT INTEGRITY
    • DISK ENCRYPTION
    • USB AND FLASH DRIVE SECURITY
    • THIRD-PARTY RISK MANAGEMENT
    • END OF LIFE SYSTEMS
    • Implement Endpoint Security
    • BASELINE CONFIGURATION AND REGISTRY SETTINGS
    • PATCH MANAGEMENT
    • ENDPOINT PROTECTION
    • NEXT-GENERATION ENDPOINT PROTECTION
    • ANTIVIRUS RESPONSE
    • Explain Embedded System Security Implications
    • LOGIC CONTROLLERS FOR EMBEDDED SYSTEMS
    • EMBEDDED SYSTEMS COMMUNICATIONS CONSIDERATIONS
    • INDUSTRIAL CONTROL SYSTEMS
    • INTERNET OF THINGS
    • SPECIALIZED SYSTEMS FOR FACILITY AUTOMATION
    • SPECIALIZED SYSTEMS IN IT
    • SPECIALIZED SYSTEMS FOR VEHICLES AND DRONES
    • SECURITY FOR EMBEDDED SYSTEMS
    • kuis 12
  • Modul 13

    Implementing Secure Mobile Solutions

    • Implement Mobile Device Management
    • ENTERPRISE MOBILITY MANAGEMENT
    • IOS IN THE ENTERPRISE
    • ANDROID IN THE ENTERPRISE
    • MOBILE ACCESS CONTROL SYSTEMS
    • REMOTE WIPE
    • LOCATION SERVICES
    • APPLICATION MANAGEMENT
    • CONTENT MANAGEMENT
    • Implement Secure Mobile Device Connections
    • CELLULAR AND GPS CONNECTION METHODS
    • WI-FI AND TETHERING CONNECTION METHODS
    • BLUETOOTH CONNECTION METHODS
    • INFRARED AND RFID CONNECTION METHODS
    • NEAR FIELD COMMUNICATIONS AND MOBILE PAYMENT SERVICES
    • USB CONNECTION METHODS
    • FIRMWARE OVER-THE-AIR UPDATES
    • Lab 13: Implement Mobile Device Management (PBQ)
    • kuis 13
  • Modul 14

    Summarizing Secure Application Concepts

    • Analyze Indicators of Application Attacks
    • APPLICATION ATTACKS
    • OVERFLOW VULNERABILITIES
    • NULL POINTER DEREFERENCING AND RACE CONDITIONS
    • MEMORY LEAKS AND RESOURCE EXHAUSTION
    • DLL INJECTION AND DRIVER MANIPULATION
    • PASS THE HASH ATTACK
    • Analyze Indicators of Web Application Attacks
    • UNIFORM RESOURCE LOCATOR ANALYSIS
    • APPLICATION PROGRAMMING INTERFACE ATTACKS
    • REPLAY ATTACKS
    • SESSION HIJACKING AND CROSS-SITE REQUEST FORGERY
    • CROSS-SITE SCRIPTING
    • STRUCTURED QUERY LANGUAGE INJECTION ATTACKS
    • XML AND LDAP INJECTION ATTACKS
    • DIRECTORY TRAVERSAL AND COMMAND INJECTION ATTACKS
    • SERVER-SIDE REQUEST FORGERY
    • Summarize Secure Coding Practices
    • SECURE CODING TECHNIQUES
    • SERVER-SIDE VERSUS CLIENT-SIDE VALIDATION
    • DATA EXPOSURE AND MEMORY MANAGEMENT
    • SECURE CODE USAGE
    • STATIC CODE ANALYSIS
    • Implement Secure Script Environments
    • SCRIPTING
    • PYTHON SCRIPT ENVIRONMENT
    • POWERSHELL SCRIPT ENVIRONMENT
    • EXECUTION CONTROL
    • MALICIOUS CODE INDICATORS
    • POWERSHELL MALICIOUS INDICATORS
    • BASH AND PYTHON MALICIOUS INDICATORS
    • MACROS AND VISUAL BASIC FOR APPLICATIONS (VBA)
    • MAN-IN-THE-BROWSER ATTACK
    • Summarize Deployment and Automation Concepts
    • SECURE APPLICATION DEVELOPMENT ENVIRONMENTS
    • PROVISIONING, DEPROVISIONING, AND VERSION CONTROL
    • AUTOMATION/SCRIPTING RELEASE PARADIGMS
    • SOFTWARE DIVERSITY
    • Lab 14: Implement Secure Script Environments (PBQ)
    • kuis 14
  • Modul 15

    Implementing Secure Cloud Solutions

    • Summarize Secure Cloud and Virtualization Services
    • CLOUD DEPLOYMENT MODELS
    • CLOUD SERVICE MODELS
    • ANYTHING AS A SERVICE
    • SECURITY AS A SERVICE
    • VIRTUALIZATION TECHNOLOGIES AND HYPERVISOR TYPES
    • VIRTUAL DESKTOP INFRASTRUCTURE AND THIN CLIENTS
    • APPLICATION VIRTUALIZATION AND CONTAINER VIRTUALIZATION
    • VM ESCAPE PROTECTION
    • VM SPRAWL AVOIDANCE
    • Apply Cloud Security Solutions
    • CLOUD SECURITY INTEGRATION AND AUDITING
    • CLOUD SECURITY CONTROLS
    • CLOUD COMPUTE SECURITY
    • CLOUD STORAGE SECURITY
    • HIGH AVAILABILITY
    • CLOUD NETWORKING SECURITY
    • VPCS AND TRANSIT GATEWAYS
    • VPC ENDPOINTS
    • CLOUD FIREWALL SECURITY
    • SECURITY GROUPS
    • CLOUD ACCESS SECURITY BROKERS
    • Summarize Infrastructure as Code Concepts
    • SERVICES INTEGRATION AND MICROSERVICES
    • APPLICATION PROGRAMMING INTERFACES
    • SERVERLESS ARCHITECTURE
    • INFRASTRUCTURE AS CODE
    • SOFTWARE-DEFINED NETWORKING
    • SOFTWARE-DEFINED VISIBILITY
    • FOG AND EDGE COMPUTING
    • Lab 15: Apply Cloud Security Solutions (PBQ)
    • kuis 15
  • Modul 16

    Explaining Data Privacy and Protection Concepts

    • Explain Privacy and Data Sensitivity Concepts
    • PRIVACY AND SENSITIVE DATA CONCEPTS
    • DATA ROLES AND RESPONSIBILITIES
    • DATA CLASSIFICATIONS
    • DATA TYPES
    • PRIVACY NOTICES AND DATA RETENTION
    • DATA SOVEREIGNTY AND GEOGRAPHICAL CONSIDERATIONS
    • PRIVACY BREACHES AND DATA BREACHES
    • DATA SHARING AND PRIVACY TERMS OF AGREEMENT
    • Explain Privacy and Data Protection Controls
    • DATA PROTECTION
    • DATA EXFILTRATION
    • DATA LOSS PREVENTION
    • RIGHTS MANAGEMENT SERVICES
    • PRIVACY ENHANCING TECHNOLOGIES
    • DATABASE DEIDENTIFICATION METHODS
    • Lab 16: Explain Privacy and Data Sensitivity Concepts (PBQ)
    • kuis 16
  • Modul 17

    Performing Incident Response

    • Summarize Incident Response Procedures
    • INCIDENT RESPONSE PROCESS
    • CYBER INCIDENT RESPONSE TEAM
    • COMMUNICATION PLAN AND STAKEHOLDER MANAGEMENT
    • INCIDENT RESPONSE PLAN
    • CYBER KILL CHAIN ATTACK FRAMEWORK
    • OTHER ATTACK FRAMEWORKS
    • INCIDENT RESPONSE EXERCISES
    • INCIDENT RESPONSE, DISASTER RECOVERY, AND RETENTION POLICY
    • Utilize Appropriate Data Sources for Incident Response
    • INCIDENT IDENTIFICATION
    • SECURITY AND INFORMATION EVENT MANAGEMENT
    • SIEM DASHBOARDS
    • TREND ANALYSIS
    • LOGGING PLATFORMS
    • NETWORK, OS, AND SECURITY LOG FILES
    • APPLICATION LOG FILES
    • METADATA
    • NETWORK DATA SOURCES
    • Apply Mitigation Controls
    • INCIDENT CONTAINMENT
    • INCIDENT ERADICATION AND RECOVERY
    • FIREWALL CONFIGURATION CHANGES
    • CONTENT FILTER CONFIGURATION CHANGES
    • ENDPOINT CONFIGURATION CHANGES
    • SECURITY ORCHESTRATION, AUTOMATION, AND RESPONSE
    • ADVERSARIAL ARTIFICIAL INTELLIGENCE
    • Lab 17: Summarize Incident Response Procedures (PBQ)
    • quiz 17
  • Modul 18

    Explaining Digital Forensics

    • Explain Key Aspects of Digital Forensics Documentation
    • KEY ASPECTS OF DIGITAL FORENSICS
    • DIGITAL FORENSICS REPORTS AND E-DISCOVERY
    • VIDEO AND WITNESS INTERVIEWS
    • TIMELINES
    • EVENT LOGS AND NETWORK TRAFFIC
    • STRATEGIC INTELLIGENCE AND COUNTERINTELLIGENCE
    • Explain Key Aspects of Digital Forensics Evidence Acquisition
    • DATA ACQUISITION AND ORDER OF VOLATILITY
    • DIGITAL FORENSICS SOFTWARE
    • SYSTEM MEMORY ACQUISITION
    • DISK IMAGE ACQUISITION
    • PRESERVATION AND INTEGRITY OF EVIDENCE
    • ACQUISITION OF OTHER DATA
    • DIGITAL FORENSICS FOR CLOUD
    • kuis 18
  • Modul 19

    Summarizing Risk Management Concepts

    • Explain Risk Management Processes and Concepts
    • RISK MANAGEMENT PROCESSES
    • RISK TYPES
    • QUANTITATIVE RISK ASSESSMENT
    • QUALITATIVE RISK ASSESSMENT
    • RISK MANAGEMENT STRATEGIES
    • RISK AVOIDANCE AND RISK TRANSFERENCE
    • RISK ACCEPTANCE AND RISK APPETITE
    • RISK AWARENESS
    • Explain Business Impact Analysis Concepts
    • MISSION ESSENTIAL FUNCTIONS
    • IDENTIFICATION OF CRITICAL SYSTEMS
    • SINGLE POINTS OF FAILURE
    • DISASTERS
    • DISASTER RECOVERY PLANS And FUNCTIONAL RECOVERY PLANS
    • kuis 19
  • Modul 20

    Implementing Cybersecurity Resilience

    • Implement Redundancy Strategies
    • HIGH AVAILABILITY
    • POWER REDUNDANCY
    • NETWORK REDUNDANCY
    • DISK REDUNDANCY
    • GEOGRAPHICAL REDUNDANCY AND REPLICATION
    • Implement Backup Strategies
    • BACKUPS AND RETENTION POLICY
    • BACKUP TYPES
    • SNAPSHOTS AND IMAGES
    • BACKUP STORAGE ISSUES
    • BACKUP MEDIA TYPES
    • RESTORATION ORDER And NONPERSISTENCE
    • Implement Cybersecurity Resiliency Strategies
    • CONFIGURATION MANAGEMENT
    • ASSET MANAGEMENT
    • CHANGE CONTROL AND CHANGE MANAGEMENT
    • SITE RESILIENCY
    • DIVERSITY AND DEFENSE IN DEPTH
    • DECEPTION AND DISRUPTION STRATEGIES
    • Lab 20: Implement Redundancy Strategies (PBQ)
    • kuis 20
  • Modul 21

    Explaining Physical Security

    • Explain the Importance of Physical Site Security Controls
    • SITE LAYOUT, FENCING, AND LIGHTING
    • GATEWAYS AND LOCKS
    • PHYSICAL ATTACKS AGAINST SMART CARDS AND USB
    • ALARM SYSTEMS AND SENSORS
    • SECURITY GUARDS AND CAMERAS
    • RECEPTION PERSONNEL AND ID BADGES
    • Explain the Importance of Physical Host Security Controls
    • SECURE AREAS
    • PROTECTED DISTRIBUTION AND FARADAY CAGES
    • HEATING, VENTILATION, AIR CONDITIONING
    • HOT AND COLD AISLES
    • FIRE DETECTION AND SUPPRESSION
    • SECURE DATA DESTRUCTION
    • DATA SANITIZATION TOOLS
    • kuis 21

Level Menengah
Instruktur Batch 01
20 Jan. 2021 - 30 April 2021

Kategori

security pentest