Chapter 0: IntroductionPassing the CompTIA Security+ ExamHow to Use This GuideEstablishing a Productive Study RoutineEffective Study Techniques and ResourcesTime Management and Sustained FocusExam Preparation TipsUnderstanding the Exam Format and Pitfalls to AvoidTest-Taking Strategies for Multiple-Choice QuestionsStrategies for Performance-Based QuestionsGeneral Test-Taking TipsMoving Forward: Final Steps Before the ExamConclusionChapter 1: Domain 1: General Security Concepts1.1 Various Types of Security Controls1.2 Summarize Fundamental Security Concepts1.3 The Importance of Change Management Processes and Impact to Security1.4 The Importance of Using Appropriate Cryptographic SolutionsConclusionDomain 1 QuestionsChapter 2: Domain 2: Threats, Vulnerabilities, and Mitigations2.1 Common Threat Actors and Motivations2.2 Common Threat Vectors and Attack Surfaces2.3 Various Types of Vulnerabilities 2.
4 Indicators of Malicious Activity2.5 Mitigation Techniques Used to Secure the EnterpriseConclusionDomain 2 QuestionsChapter 3: Domain 3: Security Architecture3.1 Security Implications of Different Architecture Models3.2 Applying Security Principles to Secure Enterprise Infrastructure3.3 Concepts and Strategies to Protect Data3.4 Resilience and Recovery in Security ArchitectureConclusionDomain 3 QuestionsChapter 4: Domain 4: Security Operations4.1 Applying Common Security Techniques to Computing Resources4.2 The Security Implications of Proper Hardware, Software, and Data Asset Management4.
3 Vulnerability Management4.4 Security Alerting and Monitoring Concepts and Tools4.5 Modify Enterprise Capabilities to Enhance Security4.6 Implement and Maintain Identity and Access Management4.7 Automation and Orchestration Related to Secure Operations4.8 Incident Response Activities4.9 Use Data Sources to Support an InvestigationConclusionDomain 4 QuestionsChapter 5: Domain 5: Security Program Management and Oversight5.1 Elements of Effective Security Governance5.
2 Elements of the Risk Management Process5.3 Third-Party Risk Assessment and Management5.4 Elements of Effective Security Compliance5.5 Types and Purposes of Audits and Assessments 5.6 Implement Security Awareness PracticesConclusionDomain 5 QuestionsAppendix A: 12-Week Study Plan for the ExamAppendix B: Answers to End-of-Chapter QuestionsAppendix C: Exam Study GuideIndex.